mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-29 02:38:22 -05:00
b586054f95
The Linux kernel commit 113f3aaa81bd ("cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces") broke the regulatory clearing attempt in many test cases since cfg80211_is_all_idle() is now returning false due to the AP interface being up and that results in the Country IE -based regulatory information not getting cleared back to defaults. Work around this by stopping the AP interface first so that when the station interface receives the disconnection, there are no other active interfaces in the system. In addition, wait for REGDOM event for the Country IE hint after association to avoid disconnection before the regulatory events have been fully processed. Signed-off-by: Jouni Malinen <j@w1.fi>
1966 lines
82 KiB
Python
1966 lines
82 KiB
Python
# Radio measurement
|
|
# Copyright(c) 2013 - 2016 Intel Mobile Communications GmbH.
|
|
# Copyright(c) 2011 - 2016 Intel Corporation. All rights reserved.
|
|
# Copyright (c) 2017, Jouni Malinen <j@w1.fi>
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
import binascii
|
|
import re
|
|
import logging
|
|
logger = logging.getLogger()
|
|
import struct
|
|
import subprocess
|
|
import time
|
|
|
|
import hostapd
|
|
from wpasupplicant import WpaSupplicant
|
|
from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger
|
|
from test_ap_ht import clear_scan_cache
|
|
from remotehost import remote_compatible
|
|
from test_ap_vht import vht_supported
|
|
|
|
def check_rrm_support(dev):
|
|
rrm = int(dev.get_driver_status_field("capa.rrm_flags"), 16)
|
|
if rrm & 0x5 != 0x5 and rrm & 0x10 != 0x10:
|
|
raise HwsimSkip("Required RRM capabilities are not supported")
|
|
|
|
def check_tx_power_support(dev):
|
|
rrm = int(dev.get_driver_status_field("capa.rrm_flags"), 16)
|
|
if rrm & 0x8 != 0x8:
|
|
raise HwsimSkip("Required RRM capabilities are not supported")
|
|
|
|
nr="00112233445500000000510107"
|
|
lci="01000800101298c0b512926666f6c2f1001c00004104050000c00012"
|
|
civic="01000b0011223344556677889900998877665544332211aabbccddeeff"
|
|
|
|
def check_nr_results(dev, bssids=None, lci=False, civic=False):
|
|
if bssids is None:
|
|
ev = dev.wait_event(["RRM-NEIGHBOR-REP-REQUEST-FAILED" ], timeout=10)
|
|
if ev is None:
|
|
raise Exception("RRM neighbor report failure not received")
|
|
return
|
|
|
|
received = []
|
|
for bssid in bssids:
|
|
ev = dev.wait_event(["RRM-NEIGHBOR-REP-RECEIVED"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("RRM report result not indicated")
|
|
received.append(ev)
|
|
|
|
for bssid in bssids:
|
|
found = False
|
|
for r in received:
|
|
if "RRM-NEIGHBOR-REP-RECEIVED bssid=" + bssid in r:
|
|
if lci and "lci=" not in r:
|
|
raise Exception("LCI data not reported for %s" % bssid)
|
|
if civic and "civic=" not in r:
|
|
raise Exception("civic data not reported for %s" % bssid)
|
|
received.remove(r)
|
|
found = True
|
|
break
|
|
if not found:
|
|
raise Exception("RRM report result for %s not indicated" % bssid)
|
|
|
|
def test_rrm_neighbor_db(dev, apdev):
|
|
"""hostapd ctrl_iface SET_NEIGHBOR"""
|
|
params = { "ssid": "test", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
# Bad BSSID
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:gg ssid=\"test1\" nr=" + nr):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# Bad SSID
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=test1 nr=" + nr):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# No SSID
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 nr=" + nr):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# No NR
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# Odd length of NR
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr[:-1]):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# Invalid lci
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=1"):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# Invalid civic
|
|
if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " civic=1"):
|
|
raise Exception("Set neighbor succeeded unexpectedly")
|
|
|
|
# No entry yet in database
|
|
if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
|
|
raise Exception("Remove neighbor succeeded unexpectedly")
|
|
|
|
# Add a neighbor entry
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=" + lci + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
# Another BSSID with the same SSID
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:56 ssid=\"test1\" nr=" + nr + " lci=" + lci + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
# Fewer parameters
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
# SSID in hex format
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=7465737431 nr=" + nr):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
# With more parameters
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
# With all parameters
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=" + lci + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
# Another SSID on the same BSSID
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test2\" nr=" + nr + " lci=" + lci):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
|
|
raise Exception("Remove neighbor failed")
|
|
|
|
if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:56 ssid=\"test1\""):
|
|
raise Exception("Remove neighbor failed")
|
|
|
|
if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test2\""):
|
|
raise Exception("Remove neighbor failed")
|
|
|
|
# Double remove
|
|
if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""):
|
|
raise Exception("Remove neighbor succeeded unexpectedly")
|
|
|
|
# Stationary AP
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test3\" nr=" + nr + " lci=" + lci + " civic=" + civic + " stat"):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
if "OK" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test3\""):
|
|
raise Exception("Remove neighbor failed")
|
|
|
|
# Invalid remove - bad BSSID
|
|
if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:5 ssid=\"test1\""):
|
|
raise Exception("Remove neighbor succeeded unexpectedly")
|
|
|
|
# Invalid remove - bad SSID
|
|
if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1"):
|
|
raise Exception("Remove neighbor succeeded unexpectedly")
|
|
|
|
# Invalid remove - missing SSID
|
|
if "FAIL" not in hapd.request("REMOVE_NEIGHBOR 00:11:22:33:44:55"):
|
|
raise Exception("Remove neighbor succeeded unexpectedly")
|
|
|
|
def test_rrm_neighbor_rep_req(dev, apdev):
|
|
"""wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST"""
|
|
check_rrm_support(dev[0])
|
|
|
|
nr1="00112233445500000000510107"
|
|
nr2="00112233445600000000510107"
|
|
nr3="dd112233445500000000510107"
|
|
|
|
params = { "ssid": "test" }
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
params = { "ssid": "test2", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
bssid1 = apdev[1]['bssid']
|
|
|
|
dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request succeeded unexpectedly (AP without RRM)")
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"abcdef\""):
|
|
raise Exception("Request succeeded unexpectedly (AP without RRM 2)")
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], [bssid1])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST lci"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], [bssid1])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST lci civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], [bssid1])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\""):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" lci civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0])
|
|
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test3\" nr=" + nr1 + " lci=" + lci + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:56 ssid=\"test3\" nr=" + nr2 + " lci=" + lci + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:56 ssid=\"test4\" nr=" + nr2 + " lci=" + lci + " civic=" + civic):
|
|
raise Exception("Set neighbor failed")
|
|
if "OK" not in hapd.request("SET_NEIGHBOR dd:11:22:33:44:55 ssid=\"test5\" nr=" + nr3 + " lci=" + lci):
|
|
raise Exception("Set neighbor failed")
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\""):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" lci"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"],
|
|
lci=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"],
|
|
civic=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test3\" lci civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:55", "00:11:22:33:44:56"],
|
|
lci=True, civic=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\""):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:56"])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\" lci"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:56"], lci=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\" civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:56"], civic=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test4\" lci civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["00:11:22:33:44:56"], lci=True, civic=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\""):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["dd:11:22:33:44:55"])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\" lci"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["dd:11:22:33:44:55"], lci=True)
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\" civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["dd:11:22:33:44:55"])
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST ssid=\"test5\" lci civic"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], ["dd:11:22:33:44:55"], lci=True)
|
|
|
|
def test_rrm_neighbor_rep_oom(dev, apdev):
|
|
"""hostapd neighbor report OOM"""
|
|
check_rrm_support(dev[0])
|
|
|
|
nr1="00112233445500000000510107"
|
|
nr2="00112233445600000000510107"
|
|
nr3="dd112233445500000000510107"
|
|
|
|
params = { "ssid": "test", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
with alloc_fail(hapd, 1, "hostapd_send_nei_report_resp"):
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
ev = dev[0].wait_event(["RRM-NEIGHBOR-REP-REQUEST-FAILED"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("Neighbor report failure not reported")
|
|
|
|
def test_rrm_lci_req(dev, apdev):
|
|
"""hostapd lci request"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
# station not specified
|
|
if "FAIL" not in hapd.request("REQ_LCI "):
|
|
raise Exception("REQ_LCI with no station succeeded unexpectedly")
|
|
|
|
# station that is not connected specified
|
|
if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI succeeded unexpectedly (station not connected)")
|
|
|
|
dev[0].request("SET LCI ")
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
# station connected without LCI
|
|
if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI succeeded unexpectedly (station without lci)")
|
|
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].wait_disconnected(timeout=2)
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
# station connected with LCI
|
|
if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI failed unexpectedly")
|
|
|
|
def test_rrm_lci_req_timeout(dev, apdev):
|
|
"""hostapd lci request timeout"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
if "OK" not in hapd.request("REQ_LCI " + addr):
|
|
raise Exception("REQ_LCI failed unexpectedly")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No response seen at the AP")
|
|
# Ignore response and wait for HOSTAPD_RRM_REQUEST_TIMEOUT
|
|
time.sleep(5.1)
|
|
# Process response after timeout
|
|
if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % ev.split(' ')[1]):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
for i in range(257):
|
|
if "OK" not in hapd.request("REQ_LCI " + addr):
|
|
raise Exception("REQ_LCI failed unexpectedly")
|
|
dev[0].dump_monitor()
|
|
hapd.dump_monitor()
|
|
hapd.set("ext_mgmt_frame_handling", "0")
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].wait_disconnected()
|
|
|
|
def test_rrm_lci_req_oom(dev, apdev):
|
|
"""LCI report generation OOM"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_rrm_build_lci_report"):
|
|
if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI failed unexpectedly")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
|
|
dev[0].request("SET LCI ")
|
|
# This in in wpas_rrm_build_lci_report(), but backtrace may not always work
|
|
# for the "reject" label there.
|
|
with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_rrm_handle_msr_req_element"):
|
|
if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI failed unexpectedly")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
|
|
def test_rrm_lci_req_ap_oom(dev, apdev):
|
|
"""LCI report generation AP OOM and failure"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_send_lci_req"):
|
|
if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI succeeded during OOM")
|
|
|
|
with fail_test(hapd, 1, "nl80211_send_frame_cmd;hostapd_send_lci_req"):
|
|
if "FAIL" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI succeeded during failure testing")
|
|
|
|
def test_rrm_lci_req_get_reltime_failure(dev, apdev):
|
|
"""LCI report generation and os_get_reltime() failure"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
with fail_test(dev[0], 1, "os_get_reltime;wpas_rrm_build_lci_report"):
|
|
if "OK" not in hapd.request("REQ_LCI " + dev[0].own_addr()):
|
|
raise Exception("REQ_LCI failed unexpectedly")
|
|
wait_fail_trigger(dev[0], "GET_FAIL")
|
|
|
|
def test_rrm_neighbor_rep_req_from_conf(dev, apdev):
|
|
"""wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST and hostapd config"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "test2", "rrm_neighbor_report": "1",
|
|
"stationary_ap": "1", "lci": lci, "civic": civic }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
bssid = apdev[0]['bssid']
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
check_nr_results(dev[0], [bssid])
|
|
|
|
def test_rrm_neighbor_rep_req_timeout(dev, apdev):
|
|
"""wpa_supplicant behavior on NEIGHBOR_REP_REQUEST response timeout"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "test2", "rrm_neighbor_report": "1",
|
|
"stationary_ap": "1", "lci": lci, "civic": civic }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
msg = hapd.mgmt_rx()
|
|
if msg is None:
|
|
raise Exception("Neighbor report request not seen")
|
|
check_nr_results(dev[0])
|
|
|
|
def test_rrm_neighbor_rep_req_oom(dev, apdev):
|
|
"""wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST OOM"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "test2", "rrm_neighbor_report": "1",
|
|
"stationary_ap": "1", "lci": lci, "civic": civic }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
with alloc_fail(dev[0], 1, "wpabuf_alloc;wpas_rrm_process_neighbor_rep"):
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
|
|
with fail_test(dev[0], 1,
|
|
"wpa_driver_nl80211_send_action;wpas_rrm_send_neighbor_rep_request"):
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request succeeded unexpectedly")
|
|
|
|
with alloc_fail(dev[0], 1,
|
|
"wpabuf_alloc;wpas_rrm_send_neighbor_rep_request"):
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request succeeded unexpectedly")
|
|
|
|
def test_rrm_neighbor_rep_req_disconnect(dev, apdev):
|
|
"""wpa_supplicant behavior on disconnection during NEIGHBOR_REP_REQUEST"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "test2", "rrm_neighbor_report": "1",
|
|
"stationary_ap": "1", "lci": lci, "civic": civic }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request accepted while disconnected")
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
msg = hapd.mgmt_rx()
|
|
if msg is None:
|
|
raise Exception("Neighbor report request not seen")
|
|
dev[0].request("DISCONNECT")
|
|
check_nr_results(dev[0])
|
|
|
|
def test_rrm_neighbor_rep_req_not_supported(dev, apdev):
|
|
"""NEIGHBOR_REP_REQUEST for AP not supporting neighbor report"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "test2", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request accepted unexpectedly")
|
|
|
|
def test_rrm_neighbor_rep_req_busy(dev, apdev):
|
|
"""wpa_supplicant and concurrent NEIGHBOR_REP_REQUEST commands"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "test2", "rrm_neighbor_report": "1",
|
|
"stationary_ap": "1", "lci": lci, "civic": civic }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
dev[0].connect("test2", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
|
|
if "OK" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request failed")
|
|
msg = hapd.mgmt_rx()
|
|
if msg is None:
|
|
raise Exception("Neighbor report request not seen")
|
|
|
|
if "FAIL" not in dev[0].request("NEIGHBOR_REP_REQUEST"):
|
|
raise Exception("Request accepted while disconnected")
|
|
|
|
def test_rrm_ftm_range_req(dev, apdev):
|
|
"""hostapd FTM range request command"""
|
|
check_rrm_support(dev[0])
|
|
try:
|
|
run_rrm_ftm_range_req(dev, apdev)
|
|
finally:
|
|
dev[1].request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
def run_rrm_ftm_range_req(dev, apdev):
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
# station not specified
|
|
if "FAIL" not in hapd.request("REQ_RANGE "):
|
|
raise Exception("REQ_RANGE with no station succeeded unexpectedly")
|
|
|
|
# station that is not connected specified
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr()):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (station not connected)")
|
|
|
|
# No responders specified
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (no responder)")
|
|
|
|
# Bad responder address
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10 00:11:22:33:44:"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (bad responder address)")
|
|
|
|
# Bad responder address
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10 00:11:22:33:44:55 00:11:22:33:44"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (bad responder address 2)")
|
|
|
|
# Bad min_ap value
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 300 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (invalid min_ap value)")
|
|
|
|
# Bad rand value
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " -1 10 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (invalid rand value)")
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 65536 10 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (invalid rand value)")
|
|
|
|
# Missing min_ap value
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (missing min_ap value)")
|
|
|
|
# Too many responders
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10" + 20*" 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (too many responders)")
|
|
# Wrong min AP count
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 10 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
# Override RM capabilities to include FTM range report
|
|
dev[1].request("VENDOR_ELEM_ADD 13 46057100000004")
|
|
dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
# Request range: Destination address is not connected
|
|
if "FAIL" not in hapd.request("REQ_RANGE 11:22:33:44:55:66 10 1 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
|
|
|
|
# Responder not in database
|
|
# Note: this check would pass since the station does not support FTM range
|
|
# request and not because the responder is not in the database.
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[0].own_addr() + " 10 1 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
|
|
|
|
# Missing neighbor report for 00:11:22:33:44:55
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 00:11:22:33:44:55"):
|
|
raise Exception("REQ_RANGE succeeded unexpectedly (responder not in database)")
|
|
|
|
# Send request
|
|
if "OK" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 " + bssid):
|
|
raise Exception("REQ_RANGE failed unexpectedly")
|
|
|
|
# Too long range request
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1" + 16*(" " + bssid)):
|
|
raise Exception("REQ_RANGE accepted for too long range request")
|
|
|
|
time.sleep(0.1)
|
|
dev[0].request("DISCONNECT")
|
|
dev[1].request("DISCONNECT")
|
|
dev[1].wait_disconnected()
|
|
|
|
def test_rrm_ftm_range_req_timeout(dev, apdev):
|
|
"""hostapd FTM range request timeout"""
|
|
check_rrm_support(dev[0])
|
|
try:
|
|
run_rrm_ftm_range_req_timeout(dev, apdev)
|
|
finally:
|
|
dev[1].request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
def run_rrm_ftm_range_req_timeout(dev, apdev):
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
# Override RM capabilities to include FTM range report
|
|
dev[1].request("VENDOR_ELEM_ADD 13 46057100000004")
|
|
dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[1].own_addr()
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
if "OK" not in hapd.request("REQ_RANGE " + addr + " 10 1 " + bssid):
|
|
raise Exception("REQ_RANGE failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No response seen at the AP")
|
|
# Ignore response and wait for HOSTAPD_RRM_REQUEST_TIMEOUT
|
|
time.sleep(5.1)
|
|
# Process response after timeout
|
|
if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % ev.split(' ')[1]):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
for i in range(257):
|
|
if "OK" not in hapd.request("REQ_RANGE " + addr + " 10 1 " + bssid):
|
|
raise Exception("REQ_RANGE failed")
|
|
dev[1].dump_monitor()
|
|
hapd.dump_monitor()
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "0")
|
|
dev[1].request("DISCONNECT")
|
|
dev[1].wait_disconnected()
|
|
|
|
def test_rrm_ftm_range_req_failure(dev, apdev):
|
|
"""hostapd FTM range request failure"""
|
|
check_rrm_support(dev[0])
|
|
try:
|
|
run_rrm_ftm_range_req_failure(dev, apdev)
|
|
finally:
|
|
dev[1].request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
def run_rrm_ftm_range_req_failure(dev, apdev):
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
# Override RM capabilities to include FTM range report
|
|
dev[1].request("VENDOR_ELEM_ADD 13 46057100000004")
|
|
dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_send_range_req"):
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 " + bssid):
|
|
raise Exception("REQ_RANGE succeeded during OOM")
|
|
|
|
with fail_test(hapd, 1, "nl80211_send_frame_cmd;hostapd_send_range_req"):
|
|
if "FAIL" not in hapd.request("REQ_RANGE " + dev[1].own_addr() + " 10 1 " + bssid):
|
|
raise Exception("REQ_RANGE succeeded during failure testing")
|
|
|
|
dev[1].request("DISCONNECT")
|
|
dev[1].wait_disconnected()
|
|
|
|
def test_rrm_ftm_capa_indication(dev, apdev):
|
|
"""FTM capability indication"""
|
|
try:
|
|
_test_rrm_ftm_capa_indication(dev, apdev)
|
|
finally:
|
|
dev[0].request("SET ftm_initiator 0")
|
|
dev[0].request("SET ftm_responder 0")
|
|
|
|
def _test_rrm_ftm_capa_indication(dev, apdev):
|
|
params = { "ssid": "ftm",
|
|
"ftm_responder": "1",
|
|
"ftm_initiator": "1", }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
if "OK" not in dev[0].request("SET ftm_initiator 1"):
|
|
raise Exception("could not set ftm_initiator")
|
|
if "OK" not in dev[0].request("SET ftm_responder 1"):
|
|
raise Exception("could not set ftm_responder")
|
|
dev[0].scan_for_bss(apdev[0]['bssid'], freq=2412, force_scan=True)
|
|
|
|
class BeaconReport:
|
|
def __init__(self, report):
|
|
self.opclass, self.channel, self.start, self.duration, self.frame_info, self.rcpi, self.rsni = struct.unpack("<BBQHBBB", report[0:15])
|
|
report = report[15:]
|
|
self.bssid = report[0:6]
|
|
self.bssid_str = "%02x:%02x:%02x:%02x:%02x:%02x" % (struct.unpack('6B', self.bssid))
|
|
report = report[6:]
|
|
self.antenna_id, self.parent_tsf = struct.unpack("<BI", report[0:5])
|
|
report = report[5:]
|
|
self.subelems = report
|
|
self.frame_body = None
|
|
while len(report) >= 2:
|
|
eid,elen = struct.unpack('BB', report[0:2])
|
|
report = report[2:]
|
|
if len(report) < elen:
|
|
raise Exception("Invalid subelement in beacon report")
|
|
if eid == 1:
|
|
# Reported Frame Body
|
|
# Contents depends on the reporting detail request:
|
|
# 0 = no Reported Frame Body subelement
|
|
# 1 = all fixed fields and any elements identified in Request
|
|
# element
|
|
# 2 = all fixed fields and all elements
|
|
# Fixed fields: Timestamp[8] BeaconInt[2] CapabInfo[2]
|
|
self.frame_body = report[0:elen]
|
|
report = report[elen:]
|
|
def __str__(self):
|
|
txt = "opclass={} channel={} start={} duration={} frame_info={} rcpi={} rsni={} bssid={} antenna_id={} parent_tsf={}".format(self.opclass, self.channel, self.start, self.duration, self.frame_info, self.rcpi, self.rsni, self.bssid_str, self.antenna_id, self.parent_tsf)
|
|
if self.frame_body:
|
|
txt += " frame_body=" + binascii.hexlify(self.frame_body)
|
|
return txt
|
|
|
|
def run_req_beacon(hapd, addr, request):
|
|
token = hapd.request("REQ_BEACON " + addr + " " + request)
|
|
if "FAIL" in token:
|
|
raise Exception("REQ_BEACON failed")
|
|
|
|
ev = hapd.wait_event(["BEACON-REQ-TX-STATUS"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No TX status event for beacon request received")
|
|
fields = ev.split(' ')
|
|
if fields[1] != addr:
|
|
raise Exception("Unexpected STA address in TX status: " + fields[1])
|
|
if fields[2] != token:
|
|
raise Exception("Unexpected dialog token in TX status: " + fields[2] + " (expected " + token + ")")
|
|
if fields[3] != "ack=1":
|
|
raise Exception("Unexected ACK status in TX status: " + fields[3])
|
|
return token
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table(dev, apdev):
|
|
"""Beacon request - beacon table mode"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
|
|
|
|
tests = [ "REQ_BEACON ",
|
|
"REQ_BEACON q",
|
|
"REQ_BEACON 11:22:33:44:55:66 1",
|
|
"REQ_BEACON 11:22:33:44:55:66 1q",
|
|
"REQ_BEACON 11:22:33:44:55:66 11223344556677889900aabbccddeeff" ]
|
|
for t in tests:
|
|
if "FAIL" not in hapd.request(t):
|
|
raise Exception("Invalid command accepted: " + t)
|
|
|
|
dev[0].scan_for_bss(apdev[1]['bssid'], freq=2412)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff")
|
|
|
|
for i in range(1, 3):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
if fields[1] != addr:
|
|
raise Exception("Unexpected STA address in beacon report response: " + fields[1])
|
|
if fields[2] != token:
|
|
raise Exception("Unexpected dialog token in beacon report response: " + fields[2] + " (expected " + token + ")")
|
|
if fields[3] != "00":
|
|
raise Exception("Unexpected measurement report mode")
|
|
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
|
|
# Default reporting detail is 2, i.e., all fixed fields and elements.
|
|
if not report.frame_body:
|
|
raise Exception("Reported Frame Body subelement missing")
|
|
if len(report.frame_body) <= 12:
|
|
raise Exception("Too short Reported Frame Body subelement")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_detail(dev, apdev):
|
|
"""Beacon request - beacon table mode - reporting detail"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
logger.info("Reporting Detail 0")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020100")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.frame_body:
|
|
raise Exception("Reported Frame Body subelement included with Reporting Detail 0")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Reporting Detail 1")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if not report.frame_body:
|
|
raise Exception("Reported Frame Body subelement missing")
|
|
if len(report.frame_body) != 12:
|
|
raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 1")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Reporting Detail 2")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020102")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if not report.frame_body:
|
|
raise Exception("Reported Frame Body subelement missing")
|
|
if len(report.frame_body) <= 12:
|
|
raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 2")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Reporting Detail 3 (invalid)")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020103")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response to invalid reporting detail 3")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Reporting Detail (too short)")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0200")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response to invalid reporting detail")
|
|
hapd.dump_monitor()
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_request(dev, apdev):
|
|
"""Beacon request - beacon table mode - request element"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if not report.frame_body:
|
|
raise Exception("Reported Frame Body subelement missing")
|
|
if len(report.frame_body) != 12 + 5 + 10:
|
|
raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 1 and requested elements SSID + SuppRates")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Incorrect reporting detail with request subelement")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020102" + "0a03000106")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response (invalid reporting detail)")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Invalid request subelement length")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a00")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response (invalid request subelement length)")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Multiple request subelements")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a0100" + "0a0101")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response (multiple request subelements)")
|
|
hapd.dump_monitor()
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_request_oom(dev, apdev):
|
|
"""Beacon request - beacon table mode - request element OOM"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
with alloc_fail(dev[0], 1,
|
|
"bitfield_alloc;wpas_rm_handle_beacon_req_subelem"):
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response received (OOM)")
|
|
|
|
with alloc_fail(dev[0], 1,
|
|
"wpabuf_alloc;wpas_rrm_send_msr_report_mpdu"):
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response received (OOM)")
|
|
|
|
with fail_test(dev[0], 1,
|
|
"wpa_driver_nl80211_send_action;wpas_rrm_send_msr_report_mpdu"):
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response received (OOM)")
|
|
|
|
with alloc_fail(dev[0], 1,
|
|
"wpabuf_resize;wpas_add_beacon_rep"):
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a03000106")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received (OOM -> empty report)")
|
|
fields = ev.split(' ')
|
|
if len(fields[4]) > 0:
|
|
raise Exception("Unexpected beacon report received")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_bssid(dev, apdev):
|
|
"""Beacon request - beacon table mode - specific BSSID"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
bssid2 = hapd2.own_addr()
|
|
token = run_req_beacon(hapd, addr, "51000000000002" + bssid2.replace(':', ''))
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if "bssid=" + bssid2 not in str(report):
|
|
raise Exception("Report for unexpect BSS")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_ssid(dev, apdev):
|
|
"""Beacon request - beacon table mode - specific SSID"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
bssid2 = hapd2.own_addr()
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0007" + "another".encode('hex'))
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if "bssid=" + bssid2 not in str(report):
|
|
raise Exception("Report for unexpect BSS")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Wildcard SSID")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0000")
|
|
for i in range(2):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Too long SSID")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0021" + 33*"00")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response (invalid SSID subelement in request)")
|
|
hapd.dump_monitor()
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_info(dev, apdev):
|
|
"""Beacon request - beacon table mode - Reporting Information subelement"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
logger.info("Unsupported reporting information 1")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "01020100")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response (incapable) is not received")
|
|
|
|
fields = ev.split(' ')
|
|
if fields[3] != "02":
|
|
raise Exception("Beacon report response - unexpected mode (" + fields[3] + ")")
|
|
hapd.dump_monitor()
|
|
|
|
logger.info("Invalid reporting information length")
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "010100")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response (invalid reporting information length)")
|
|
hapd.dump_monitor()
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_unknown_subelem(dev, apdev):
|
|
"""Beacon request - beacon table mode - unknown subelement"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "330101" + "fe00")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_truncated_subelem(dev, apdev):
|
|
"""Beacon request - beacon table mode - Truncated subelement"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "0001")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response (truncated subelement)")
|
|
hapd.dump_monitor()
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_table_rsne(dev, apdev):
|
|
"""Beacon request - beacon table mode - RSNE truncation"""
|
|
params = hostapd.wpa2_params(ssid="rrm-rsn", passphrase="12345678")
|
|
params["rrm_beacon_report"] = "1"
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm-rsn", psk="12345678", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000000002ffffffffffff" + "020101" + "0a0130")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if not report.frame_body:
|
|
raise Exception("Reported Frame Body subelement missing")
|
|
if len(report.frame_body) != 12 + 6:
|
|
raise Exception("Unexpected Reported Frame Body subelement length with Reporting Detail 1 and requested element RSNE")
|
|
if binascii.unhexlify("30040100000f") not in report.frame_body:
|
|
raise Exception("Truncated RSNE not found")
|
|
|
|
def test_rrm_beacon_req_table_vht(dev, apdev):
|
|
"""Beacon request - beacon table mode - VHT"""
|
|
clear_scan_cache(apdev[0])
|
|
try:
|
|
hapd = None
|
|
params = { "ssid": "rrm-vht",
|
|
"country_code": "FI",
|
|
"hw_mode": "a",
|
|
"channel": "36",
|
|
"ht_capab": "[HT40+]",
|
|
"ieee80211n": "1",
|
|
"ieee80211ac": "1",
|
|
"vht_oper_chwidth": "1",
|
|
"vht_oper_centr_freq_seg0_idx": "42",
|
|
"rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
params = { "ssid": "test-vht40",
|
|
"country_code": "FI",
|
|
"hw_mode": "a",
|
|
"channel": "48",
|
|
"ieee80211n": "1",
|
|
"ieee80211ac": "1",
|
|
"ht_capab": "[HT40-]",
|
|
"vht_capab": "",
|
|
"vht_oper_chwidth": "0",
|
|
"vht_oper_centr_freq_seg0_idx": "0",
|
|
}
|
|
hapd2 = hostapd.add_ap(apdev[1], params)
|
|
|
|
dev[0].scan_for_bss(apdev[1]['bssid'], freq=5240)
|
|
dev[0].connect("rrm-vht", key_mgmt="NONE", scan_freq="5180")
|
|
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "f0000000000002ffffffffffff")
|
|
for i in range(2):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.bssid_str == apdev[0]['bssid']:
|
|
if report.opclass != 128 or report.channel != 36:
|
|
raise Exception("Incorrect opclass/channel for AP0")
|
|
elif report.bssid_str == apdev[1]['bssid']:
|
|
if report.opclass != 117 or report.channel != 48:
|
|
raise Exception("Incorrect opclass/channel for AP1")
|
|
except Exception, e:
|
|
if isinstance(e, Exception) and str(e) == "AP startup failed":
|
|
if not vht_supported():
|
|
raise HwsimSkip("80 MHz channel not supported in regulatory information")
|
|
raise
|
|
finally:
|
|
dev[0].request("DISCONNECT")
|
|
if hapd:
|
|
hapd.request("DISABLE")
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].flush_scan_cache()
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active(dev, apdev):
|
|
"""Beacon request - active scan mode"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000640001ffffffffffff")
|
|
|
|
for i in range(1, 3):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.bssid_str == apdev[0]['bssid']:
|
|
if report.opclass != 81 or report.channel != 1:
|
|
raise Exception("Incorrect opclass/channel for AP0")
|
|
elif report.bssid_str == apdev[1]['bssid']:
|
|
if report.opclass != 81 or report.channel != 11:
|
|
raise Exception("Incorrect opclass/channel for AP1")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_ignore_old_result(dev, apdev):
|
|
"""Beacon request - active scan mode and old scan result"""
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another" })
|
|
dev[0].scan_for_bss(apdev[1]['bssid'], freq=2412)
|
|
hapd2.disable()
|
|
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51010000640001ffffffffffff")
|
|
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.bssid_str == apdev[1]['bssid']:
|
|
raise Exception("Old BSS reported")
|
|
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response")
|
|
|
|
def start_ap(dev):
|
|
id = dev.add_network()
|
|
dev.set_network(id, "mode", "2")
|
|
dev.set_network_quoted(id, "ssid", 32*'A')
|
|
dev.set_network_quoted(id, "psk", "1234567890")
|
|
dev.set_network(id, "frequency", "2412")
|
|
dev.set_network(id, "scan_freq", "2412")
|
|
dev.select_network(id)
|
|
dev.wait_connected()
|
|
|
|
def test_rrm_beacon_req_active_many(dev, apdev):
|
|
"""Beacon request - active scan mode and many BSSs"""
|
|
for i in range(1, 7):
|
|
ifname = apdev[0]['ifname'] if i == 1 else apdev[0]['ifname'] + "-%d" % i
|
|
hapd1 = hostapd.add_bss(apdev[0], ifname, 'bss-%i.conf' % i)
|
|
hapd1.set('vendor_elements', "dd50" + 80*'bb')
|
|
hapd1.request("UPDATE_BEACON")
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add("wlan5")
|
|
wpas.request("SET device_name " + 20*'a')
|
|
start_ap(wpas)
|
|
start_ap(dev[1])
|
|
start_ap(dev[2])
|
|
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
params['vendor_elements'] = "dd50" + 80*'aa'
|
|
hapd = hostapd.add_ap(apdev[1]['ifname'], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
ok = False
|
|
for j in range(3):
|
|
token = run_req_beacon(hapd, addr, "51010000640001ffffffffffff")
|
|
|
|
for i in range(10):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
if len(fields[4]) == 0:
|
|
break
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if i == 9:
|
|
ok = True
|
|
if ok:
|
|
break
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_ap_channels(dev, apdev):
|
|
"""Beacon request - active scan mode with AP Channel Report subelement"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "dd0111" + "330351010b" + "dd0111")
|
|
|
|
for i in range(1, 3):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.bssid_str == apdev[0]['bssid']:
|
|
if report.opclass != 81 or report.channel != 1:
|
|
raise Exception("Incorrect opclass/channel for AP0")
|
|
elif report.bssid_str == apdev[1]['bssid']:
|
|
if report.opclass != 81 or report.channel != 11:
|
|
raise Exception("Incorrect opclass/channel for AP1")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_passive_ap_channels(dev, apdev):
|
|
"""Beacon request - passive scan mode with AP Channel Report subelement"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51ff0000640000ffffffffffff" + "330351010b" + "3300" + "dd00")
|
|
|
|
for i in range(1, 3):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.bssid_str == apdev[0]['bssid']:
|
|
if report.opclass != 81 or report.channel != 1:
|
|
raise Exception("Incorrect opclass/channel for AP0")
|
|
elif report.bssid_str == apdev[1]['bssid']:
|
|
if report.opclass != 81 or report.channel != 11:
|
|
raise Exception("Incorrect opclass/channel for AP1")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_single_channel(dev, apdev):
|
|
"""Beacon request - active scan mode with single channel"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "510b0000640001ffffffffffff")
|
|
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_ap_channels_unknown_opclass(dev, apdev):
|
|
"""Beacon request - active scan mode with AP Channel Report subelement and unknown opclass"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "3303ff010b")
|
|
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response (refused) not received")
|
|
|
|
fields = ev.split(' ')
|
|
if fields[3] != "04":
|
|
raise Exception("Unexpected beacon report mode: " + fields[3])
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_ap_channel_oom(dev, apdev):
|
|
"""Beacon request - AP Channel Report subelement and OOM"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
with alloc_fail(dev[0], 1, "wpas_add_channels"):
|
|
token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "330351010b")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
# allow either not to respond or send refused response
|
|
if ev is not None:
|
|
fields = ev.split(' ')
|
|
if fields[3] != "04":
|
|
raise Exception("Unexpected Beacon report during OOM with mode: " + fields[3])
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_scan_fail(dev, apdev):
|
|
"""Beacon request - Active scan failure"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
with alloc_fail(dev[0], 1, "wpa_supplicant_trigger_scan"):
|
|
token = run_req_beacon(hapd, addr, "51ff0000640001ffffffffffff" + "330351010b")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("No Beacon report")
|
|
fields = ev.split(' ')
|
|
if fields[3] != "04":
|
|
raise Exception("Unexpected Beacon report contents: " + ev)
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_zero_duration(dev, apdev):
|
|
"""Beacon request - Action scan and zero duration"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000000001ffffffffffff")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected Beacon report")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_fail_random(dev, apdev):
|
|
"""Beacon request - active scan mode os_get_random failure"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
with fail_test(dev[0], 1, "os_get_random;wpas_rm_handle_beacon_req"):
|
|
token = run_req_beacon(hapd, addr, "51000000640001ffffffffffff")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_passive(dev, apdev):
|
|
"""Beacon request - passive scan mode"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
hapd2 = hostapd.add_ap(apdev[1], { "ssid": "another", "channel": "11" })
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51000000640000ffffffffffff")
|
|
|
|
for i in range(1, 3):
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.bssid_str == apdev[0]['bssid']:
|
|
if report.opclass != 81 or report.channel != 1:
|
|
raise Exception("Incorrect opclass/channel for AP0")
|
|
elif report.bssid_str == apdev[1]['bssid']:
|
|
if report.opclass != 81 or report.channel != 11:
|
|
raise Exception("Incorrect opclass/channel for AP1")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_passive_no_match(dev, apdev):
|
|
"""Beacon request - passive scan mode and no matching BSS"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "51010000640000021122334455")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
if len(fields[4]) > 0:
|
|
raise Exception("Unexpected beacon report BSS")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_passive_no_match_oom(dev, apdev):
|
|
"""Beacon request - passive scan mode and no matching BSS (OOM)"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_beacon_rep_scan_process"):
|
|
token = run_req_beacon(hapd, addr, "51010000640000021122334455")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected Beacon report response during OOM")
|
|
|
|
# verify reporting is still functional
|
|
token = run_req_beacon(hapd, addr, "51010000640000021122334455")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report %d response not received" % i)
|
|
fields = ev.split(' ')
|
|
if len(fields[4]) > 0:
|
|
raise Exception("Unexpected beacon report BSS")
|
|
|
|
@remote_compatible
|
|
def test_rrm_beacon_req_active_duration_mandatory(dev, apdev):
|
|
"""Beacon request - Action scan and duration mandatory"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "req_mode=10 51000000640001ffffffffffff")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("No Beacon report response")
|
|
fields = ev.split(' ')
|
|
rrm = int(dev[0].get_driver_status_field("capa.rrm_flags"), 16)
|
|
if rrm & 0x20 == 0x20:
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
else:
|
|
# Driver does not support scan dwell time setting, so wpa_supplicant
|
|
# rejects the measurement request due to the mandatory duration using
|
|
# Measurement Report Mode field Incapable=1.
|
|
if fields[3] != '02':
|
|
raise Exception("Unexpected Measurement Report Mode: " + fields[3])
|
|
if len(fields[4]) > 0:
|
|
raise Exception("Unexpected beacon report received")
|
|
|
|
def test_rrm_beacon_req_passive_scan_vht(dev, apdev):
|
|
"""Beacon request - passive scan mode - VHT"""
|
|
clear_scan_cache(apdev[0])
|
|
try:
|
|
hapd = None
|
|
params = { "ssid": "rrm-vht",
|
|
"country_code": "FI",
|
|
'ieee80211d': '1',
|
|
"hw_mode": "a",
|
|
"channel": "36",
|
|
"ht_capab": "[HT40+]",
|
|
"ieee80211n": "1",
|
|
"ieee80211ac": "1",
|
|
"vht_oper_chwidth": "1",
|
|
"vht_oper_centr_freq_seg0_idx": "42",
|
|
"rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].scan_for_bss(apdev[0]['bssid'], freq=5180)
|
|
dev[0].connect("rrm-vht", key_mgmt="NONE", scan_freq="5180")
|
|
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "80000000640000ffffffffffff")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.opclass != 128 or report.channel != 36:
|
|
raise Exception("Incorrect opclass/channel for AP")
|
|
|
|
token = run_req_beacon(hapd, addr, "82000000640000ffffffffffff")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.opclass != 128 or report.channel != 36:
|
|
raise Exception("Incorrect opclass/channel for AP")
|
|
except Exception, e:
|
|
if isinstance(e, Exception) and str(e) == "AP startup failed":
|
|
if not vht_supported():
|
|
raise HwsimSkip("80 MHz channel not supported in regulatory information")
|
|
raise
|
|
finally:
|
|
if hapd:
|
|
hapd.request("DISABLE")
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].request("ABORT_SCAN")
|
|
dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=0.5)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=0.5)
|
|
dev[0].flush_scan_cache()
|
|
|
|
def test_rrm_beacon_req_passive_scan_vht160(dev, apdev):
|
|
"""Beacon request - passive scan mode - VHT160"""
|
|
clear_scan_cache(apdev[0])
|
|
try:
|
|
hapd = None
|
|
params = { "ssid": "rrm-vht",
|
|
"country_code": "ZA",
|
|
'ieee80211d': '1',
|
|
"hw_mode": "a",
|
|
"channel": "104",
|
|
"ht_capab": "[HT40-]",
|
|
"ieee80211n": "1",
|
|
"ieee80211ac": "1",
|
|
"vht_oper_chwidth": "2",
|
|
"vht_oper_centr_freq_seg0_idx": "114",
|
|
"rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
dev[0].scan_for_bss(apdev[0]['bssid'], freq=5520)
|
|
dev[0].connect("rrm-vht", key_mgmt="NONE", scan_freq="5520")
|
|
sig = dev[0].request("SIGNAL_POLL").splitlines()
|
|
if "WIDTH=160 MHz" not in sig:
|
|
raise Exception("Unexpected SIGNAL_POLL value: " + str(sig))
|
|
|
|
addr = dev[0].own_addr()
|
|
|
|
token = run_req_beacon(hapd, addr, "81000000640000ffffffffffff")
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received")
|
|
fields = ev.split(' ')
|
|
report = BeaconReport(binascii.unhexlify(fields[4]))
|
|
logger.info("Received beacon report: " + str(report))
|
|
if report.opclass != 129 or report.channel != 104:
|
|
raise Exception("Incorrect opclass/channel for AP")
|
|
except Exception, e:
|
|
if isinstance(e, Exception) and str(e) == "AP startup failed":
|
|
raise HwsimSkip("ZA regulatory rule likely did not have DFS requirement removed")
|
|
raise
|
|
finally:
|
|
if hapd:
|
|
hapd.request("DISABLE")
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].request("ABORT_SCAN")
|
|
dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=0.5)
|
|
subprocess.call(['iw', 'reg', 'set', '00'])
|
|
dev[0].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=0.5)
|
|
dev[0].flush_scan_cache()
|
|
|
|
def test_rrm_beacon_req_ap_errors(dev, apdev):
|
|
"""Beacon request - AP error cases"""
|
|
try:
|
|
run_rrm_beacon_req_ap_errors(dev, apdev)
|
|
finally:
|
|
dev[1].request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
def run_rrm_beacon_req_ap_errors(dev, apdev):
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
dev[0].scan_for_bss(bssid, freq=2412)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
# Override RM capabilities (remove all)
|
|
dev[1].request("VENDOR_ELEM_ADD 13 46050000000000")
|
|
dev[1].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr1 = dev[1].own_addr()
|
|
|
|
# Beacon request: Too short request data
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr + " 11"):
|
|
raise Exception("Invalid REQ_BEACON accepted")
|
|
|
|
# Beacon request: 02:00:00:00:01:00 does not support table beacon report
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 51000000000002ffffffffffff"):
|
|
raise Exception("Invalid REQ_BEACON accepted")
|
|
|
|
# Beacon request: 02:00:00:00:01:00 does not support active beacon report
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 51000000640001ffffffffffff"):
|
|
raise Exception("Invalid REQ_BEACON accepted")
|
|
|
|
# Beacon request: 02:00:00:00:01:00 does not support passive beacon report
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 510b0000640000ffffffffffff"):
|
|
raise Exception("Invalid REQ_BEACON accepted")
|
|
|
|
# Beacon request: Unknown measurement mode 3
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr1 + " 510b0000640003ffffffffffff"):
|
|
raise Exception("Invalid REQ_BEACON accepted")
|
|
|
|
for i in range(257):
|
|
if "FAIL" in hapd.request("REQ_BEACON " + addr + " 510b0000640000ffffffffffff"):
|
|
raise Exception("REQ_BEACON failed")
|
|
dev[0].dump_monitor()
|
|
hapd.dump_monitor()
|
|
|
|
with alloc_fail(hapd, 1, "wpabuf_alloc;hostapd_send_beacon_req"):
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr + " 510b0000640000ffffffffffff"):
|
|
raise Exception("REQ_BEACON accepted during OOM")
|
|
|
|
with fail_test(hapd, 1, "nl80211_send_frame_cmd;hostapd_send_beacon_req"):
|
|
if "FAIL" not in hapd.request("REQ_BEACON " + addr + " 510b0000640000ffffffffffff"):
|
|
raise Exception("REQ_BEACON accepted during failure testing")
|
|
|
|
def test_rrm_req_reject_oom(dev, apdev):
|
|
"""Radio measurement request - OOM while rejecting a request"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
|
|
with alloc_fail(dev[0], 1, "wpabuf_resize;wpas_rrm_handle_msr_req_element"):
|
|
# "RRM: Parallel measurements are not supported, reject"
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "05000100002603010105"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response during OOM")
|
|
|
|
def test_rrm_req_when_rrm_not_used(dev, apdev):
|
|
"""Radio/link measurement request for non-RRM association"""
|
|
params = { "ssid": "rrm" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "050001000026030100fe"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response when RRM is disabled")
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
dev[0].wait_disconnected()
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "050001000026030100fe"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
@remote_compatible
|
|
def test_rrm_req_proto(dev, apdev):
|
|
"""Radio measurement request - protocol testing"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].request("SET LCI ")
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
|
|
tests = []
|
|
# "RRM: Ignoring too short radio measurement request"
|
|
tests += [ "0500", "050001", "05000100" ]
|
|
# No measurement request element at all
|
|
tests += [ "0500010000" ]
|
|
# "RRM: Truncated element"
|
|
tests += [ "050001000026" ]
|
|
# "RRM: Element length too short"
|
|
tests += [ "05000100002600", "0500010000260111", "050001000026021122" ]
|
|
# "RRM: Element length too long"
|
|
tests += [ "05000100002603", "0500010000260311", "050001000026031122" ]
|
|
# "RRM: Enable bit not supported, ignore"
|
|
tests += [ "05000100002603010200" ]
|
|
# "RRM: Measurement report failed. TX power insertion not supported"
|
|
# OR
|
|
# "RRM: Link measurement report failed. Request too short"
|
|
tests += [ "0502" ]
|
|
# Too short LCI request
|
|
tests += [ "05000100002603010008" ]
|
|
# Too short neighbor report response
|
|
tests += [ "0505" ]
|
|
# Unexpected neighbor report response
|
|
tests += [ "050500", "050501", "050502", "050503", "050504", "050505" ]
|
|
# Too short beacon request
|
|
tests += [ "05000100002603010005",
|
|
"0500010000260f010005112233445566778899aabbcc" ]
|
|
# Unknown beacon report mode
|
|
tests += [ "05000100002610010005112233445566778899aabbccdd" ]
|
|
# "RRM: Expected Measurement Request element, but EID is 0"
|
|
tests += [ "05000100000000" ]
|
|
for t in tests:
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected response seen at the AP: " + ev)
|
|
|
|
tests = []
|
|
# "RRM: Parallel measurements are not supported, reject"
|
|
tests += [ "05000100002603010105" ]
|
|
# "RRM: Unsupported radio measurement type 254"
|
|
tests += [ "050001000026030100fe" ]
|
|
# Reject LCI request
|
|
tests += [ "0500010000260701000811223344" ]
|
|
# Beacon report info subelement; no valid channels
|
|
tests += [ "05000100002614010005112233445566008899aabbccdd01020000" ]
|
|
for t in tests:
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No response seen at the AP")
|
|
hapd.dump_monitor()
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
tests = []
|
|
# "Not building LCI report - bad location subject"
|
|
tests += [ "0500010000260701000811223344" ]
|
|
for t in tests:
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=0.2)
|
|
if ev is not None:
|
|
raise Exception("Unexpected response seen at the AP: " + ev)
|
|
|
|
tests = []
|
|
# LCI report or reject
|
|
tests += [ "0500010000260701000801223344",
|
|
"05000100002607010008010402ff",
|
|
"05000100002608010008010402ffff" ]
|
|
for t in tests:
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No response seen at the AP")
|
|
hapd.dump_monitor()
|
|
|
|
# Verify rejection of a group-addressed request frame
|
|
hdr = "d0003a01" + "ffffffffffff" + 2*bssid.replace(':', '') + "1000"
|
|
# "RRM: Parallel measurements are not supported, reject"
|
|
t = "05000100002603010105"
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected response seen at the AP (broadcast request rejected)")
|
|
hapd.dump_monitor()
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "0")
|
|
dev[0].request("SET ext_mgmt_frame_handling 0")
|
|
dev[0].request("SET LCI ")
|
|
|
|
def test_rrm_link_measurement(dev, apdev):
|
|
"""Radio measurement request - link measurement"""
|
|
check_tx_power_support(dev[0])
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=5)
|
|
if ev is None:
|
|
raise Exception("No link measurement report seen")
|
|
|
|
def test_rrm_link_measurement_oom(dev, apdev):
|
|
"""Radio measurement request - link measurement OOM"""
|
|
check_tx_power_support(dev[0])
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + addr.replace(':', '') + 2*bssid.replace(':', '') + "1000"
|
|
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
dev[0].request("SET ext_mgmt_frame_handling 1")
|
|
|
|
with alloc_fail(dev[0], 1, "wpabuf_alloc;wpas_rrm_handle_link_measurement_request"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
|
|
|
|
with fail_test(dev[0], 1, "wpas_rrm_handle_link_measurement_request"):
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0502000000"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
wait_fail_trigger(dev[0], "GET_FAIL")
|
|
|
|
ev = hapd.wait_event(["MGMT-RX"], timeout=0.1)
|
|
if ev is not None:
|
|
raise Exception("Unexpected beacon report response during OOM")
|
|
|
|
def test_rrm_rep_parse_proto(dev, apdev):
|
|
"""hostapd rrm report parsing protocol testing"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].request("SET LCI " + lci)
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + bssid.replace(':', '') + addr.replace(':', '') + bssid.replace(':', '') + "1000"
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
|
|
tests = [ "0501",
|
|
"05ff01",
|
|
"0501012703fffffe2700",
|
|
"0501012703ffff05",
|
|
"05010127ffffff05" + 252*"00",
|
|
"0504012603ffffff2600",
|
|
"0504012603ffff08",
|
|
"0504012608ffff08ffffffffff",
|
|
"0504012608ffff08ff04021234",
|
|
"0504012608ffff08ff04020100",
|
|
"0504012608ffff08ff0402ffff" ]
|
|
for t in tests:
|
|
if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed for " + t)
|
|
|
|
if "OK" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"rrm\" nr=" + nr + " lci=" + lci):
|
|
raise Exception("Set neighbor failed")
|
|
if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + "0504012608ffff08ff04021000"):
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
def test_rrm_unexpected(dev, apdev):
|
|
"""hostapd unexpected rrm"""
|
|
check_rrm_support(dev[0])
|
|
|
|
params = { "ssid": "rrm", "rrm_neighbor_report": "0" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
addr = dev[0].own_addr()
|
|
|
|
hdr = "d0003a01" + bssid.replace(':', '') + addr.replace(':', '') + bssid.replace(':', '') + "1000"
|
|
hapd.set("ext_mgmt_frame_handling", "1")
|
|
|
|
tests = [ "050401" ]
|
|
for t in tests:
|
|
if "OK" not in hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + t):
|
|
raise Exception("MGMT_RX_PROCESS failed for " + t)
|
|
|
|
def check_beacon_req(hapd, addr, idx):
|
|
request = "51000000000002ffffffffffff" + "020100"
|
|
token = hapd.request("REQ_BEACON " + addr + " " + request)
|
|
if "FAIL" in token:
|
|
raise Exception("REQ_BEACON failed (%d)" % idx)
|
|
ev = hapd.wait_event(["BEACON-RESP-RX"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Beacon report response not received (%d)" % idx)
|
|
|
|
def test_rrm_reassociation(dev, apdev):
|
|
"""Radio measurement request - reassociation"""
|
|
params = { "ssid": "rrm", "rrm_beacon_report": "1" }
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
addr = dev[0].own_addr()
|
|
dev[0].connect("rrm", key_mgmt="NONE", scan_freq="2412")
|
|
check_beacon_req(hapd, addr, 1)
|
|
|
|
dev[0].request("REASSOCIATE")
|
|
dev[0].wait_connected()
|
|
check_beacon_req(hapd, addr, 1)
|
|
|
|
hapd2 = hostapd.add_ap(apdev[1]['ifname'], params)
|
|
bssid2 = hapd2.own_addr()
|
|
dev[0].scan_for_bss(bssid2, freq=2412)
|
|
dev[0].roam(bssid2)
|
|
check_beacon_req(hapd2, addr, 2)
|
|
|
|
dev[0].scan_for_bss(bssid, freq=2412)
|
|
dev[0].roam(bssid)
|
|
check_beacon_req(hapd, addr, 3)
|