Updated through tag hostap_2_5 from git://w1.fi/hostap.git
[mech_eap.git] / libeap / tests / hwsim / test_connect_cmd.py
1 # cfg80211 connect command (SME in the driver/firmware)
2 # Copyright (c) 2013, Jouni Malinen <j@w1.fi>
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import time
10
11 import hwsim_utils
12 import hostapd
13 from wpasupplicant import WpaSupplicant
14 from test_p2p_grpform import go_neg_pin_authorized
15 from test_p2p_grpform import check_grpform_results
16 from test_p2p_grpform import remove_group
17
18 def test_connect_cmd_open(dev, apdev):
19     """Open connection using cfg80211 connect command"""
20     params = { "ssid": "sta-connect",
21                "manage_p2p": "1",
22                "allow_cross_connection": "1" }
23     hostapd.add_ap(apdev[0]['ifname'], params)
24
25     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
26     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
27     wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412",
28                  bg_scan_period="1")
29     wpas.request("DISCONNECT")
30
31 def test_connect_cmd_wep(dev, apdev):
32     """WEP Open System using cfg80211 connect command"""
33     params = { "ssid": "sta-connect-wep", "wep_key0": '"hello"' }
34     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
35
36     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
37     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
38     wpas.connect("sta-connect-wep", key_mgmt="NONE", scan_freq="2412",
39                  wep_key0='"hello"')
40     hwsim_utils.test_connectivity(wpas, hapd)
41     wpas.request("DISCONNECT")
42
43 def test_connect_cmd_wep_shared(dev, apdev):
44     """WEP Shared key using cfg80211 connect command"""
45     params = { "ssid": "sta-connect-wep", "wep_key0": '"hello"',
46                "auth_algs": "2" }
47     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
48
49     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
50     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
51     id = wpas.connect("sta-connect-wep", key_mgmt="NONE", scan_freq="2412",
52                       auth_alg="SHARED", wep_key0='"hello"')
53     hwsim_utils.test_connectivity(wpas, hapd)
54     wpas.request("DISCONNECT")
55     wpas.remove_network(id)
56     wpas.connect("sta-connect-wep", key_mgmt="NONE", scan_freq="2412",
57                  auth_alg="OPEN SHARED", wep_key0='"hello"')
58     hwsim_utils.test_connectivity(wpas, hapd)
59     wpas.request("DISCONNECT")
60
61 def test_connect_cmd_p2p_management(dev, apdev):
62     """Open connection using cfg80211 connect command and AP using P2P management"""
63     params = { "ssid": "sta-connect",
64                "manage_p2p": "1",
65                "allow_cross_connection": "0" }
66     hostapd.add_ap(apdev[0]['ifname'], params)
67
68     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
69     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
70     wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412")
71     wpas.request("DISCONNECT")
72
73 def test_connect_cmd_wpa2_psk(dev, apdev):
74     """WPA2-PSK connection using cfg80211 connect command"""
75     params = hostapd.wpa2_params(ssid="sta-connect", passphrase="12345678")
76     hostapd.add_ap(apdev[0]['ifname'], params)
77
78     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
79     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
80     wpas.connect("sta-connect", psk="12345678", scan_freq="2412")
81     wpas.request("DISCONNECT")
82
83 def test_connect_cmd_concurrent_grpform_while_connecting(dev, apdev):
84     """Concurrent P2P group formation while connecting to an AP using cfg80211 connect command"""
85     logger.info("Start connection to an infrastructure AP")
86     hapd = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "test-open" })
87
88     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
89     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
90     wpas.connect("test-open", key_mgmt="NONE", wait_connect=False)
91
92     logger.info("Form a P2P group while connecting to an AP")
93     wpas.request("SET p2p_no_group_iface 0")
94
95     [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_freq=2412,
96                                            r_dev=wpas, r_freq=2412)
97     check_grpform_results(i_res, r_res)
98     remove_group(dev[0], wpas)
99
100     logger.info("Confirm AP connection after P2P group removal")
101     hwsim_utils.test_connectivity(wpas, hapd)
102
103 def test_connect_cmd_reject_assoc(dev, apdev):
104     """Connection using cfg80211 connect command getting rejected"""
105     params = { "ssid": "sta-connect",
106                "require_ht": "1" }
107     hostapd.add_ap(apdev[0]['ifname'], params)
108
109     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
110     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
111     wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412",
112                  disable_ht="1", wait_connect=False)
113     # Reject event gets reported twice since we force connect command to be used
114     # with a driver that supports auth+assoc for testing purposes.
115     for i in range(0, 2):
116         ev = wpas.wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=15)
117         if ev is None:
118             raise Exception("Association rejection timed out")
119         if "status_code=27" not in ev:
120             raise Exception("Unexpected rejection status code")
121
122 def test_connect_cmd_disconnect_event(dev, apdev):
123     """Connection using cfg80211 connect command getting disconnected by the AP"""
124     params = { "ssid": "sta-connect" }
125     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
126
127     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
128     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
129     wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412")
130
131     if "OK" not in hapd.request("DEAUTHENTICATE " + wpas.p2p_interface_addr()):
132         raise Exception("DEAUTHENTICATE command failed")
133     ev = wpas.wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5)
134     if ev is None:
135         raise Exception("Disconnection event timed out")
136     # This event was actually based on deauthenticate event since we force
137     # connect command to be used with a driver that supports auth+assoc for
138     # testing purposes. Anyway, wait some time to allow the debug log to capture
139     # the following NL80211_CMD_DISCONNECT event.
140     time.sleep(0.1)
141
142 def test_connect_cmd_roam(dev, apdev):
143     """cfg80211 connect command to trigger roam"""
144     params = { "ssid": "sta-connect" }
145     hostapd.add_ap(apdev[0]['ifname'], params)
146
147     wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
148     wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
149     wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412")
150
151     hostapd.add_ap(apdev[1]['ifname'], params)
152     wpas.scan_for_bss(apdev[1]['bssid'], freq=2412)
153     wpas.roam(apdev[1]['bssid'])