2 # Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
7 from remotehost import remote_compatible
13 logger = logging.getLogger()
20 from utils import HwsimSkip, skip_with_fips, alloc_fail, wait_fail_trigger
22 from tshark import run_tshark
23 from wlantest import Wlantest
24 from wpasupplicant import WpaSupplicant
25 from test_ap_eap import check_eap_capa, check_domain_match_full
26 from test_gas import gas_rx, parse_gas, action_response, anqp_initial_resp, send_gas_resp, ACTION_CATEG_PUBLIC, GAS_INITIAL_RESPONSE
28 def hs20_ap_params(ssid="test-hs20"):
29 params = hostapd.wpa2_params(ssid=ssid)
30 params['wpa_key_mgmt'] = "WPA-EAP"
31 params['ieee80211w'] = "1"
32 params['ieee8021x'] = "1"
33 params['auth_server_addr'] = "127.0.0.1"
34 params['auth_server_port'] = "1812"
35 params['auth_server_shared_secret'] = "radius"
36 params['interworking'] = "1"
37 params['access_network_type'] = "14"
38 params['internet'] = "1"
42 params['venue_group'] = "7"
43 params['venue_type'] = "1"
44 params['venue_name'] = [ "eng:Example venue", "fin:Esimerkkipaikka" ]
45 params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
47 params['domain_name'] = "example.com,another.example.com"
48 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
49 "0,another.example.com" ]
51 params['hs20_wan_metrics'] = "01:8000:1000:80:240:3000"
52 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0" ]
53 params['hs20_operating_class'] = "5173"
54 params['anqp_3gpp_cell_net'] = "244,91"
57 def check_auto_select(dev, bssid):
58 dev.scan_for_bss(bssid, freq="2412")
59 dev.request("INTERWORKING_SELECT auto freq=2412")
60 ev = dev.wait_connected(timeout=15)
62 raise Exception("Connected to incorrect network")
63 dev.request("REMOVE_NETWORK all")
64 dev.wait_disconnected()
67 def interworking_select(dev, bssid, type=None, no_match=False, freq=None):
69 if bssid and freq and not no_match:
70 dev.scan_for_bss(bssid, freq=freq)
71 freq_extra = " freq=" + str(freq) if freq else ""
72 dev.request("INTERWORKING_SELECT" + freq_extra)
73 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
76 raise Exception("Network selection timed out")
78 if "INTERWORKING-NO-MATCH" not in ev:
79 raise Exception("Unexpected network match")
81 if "INTERWORKING-NO-MATCH" in ev:
82 logger.info("Matching network not found - try again")
84 dev.request("INTERWORKING_SELECT" + freq_extra)
85 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
88 raise Exception("Network selection timed out")
89 if "INTERWORKING-NO-MATCH" in ev:
90 raise Exception("Matching network not found")
91 if bssid and bssid not in ev:
92 raise Exception("Unexpected BSSID in match")
93 if type and "type=" + type not in ev:
94 raise Exception("Network type not recognized correctly")
96 def check_sp_type(dev, sp_type):
97 type = dev.get_status_field("sp_type")
99 raise Exception("sp_type not available")
101 raise Exception("sp_type did not indicate home network")
103 def hlr_auc_gw_available():
104 if not os.path.exists("/tmp/hlr_auc_gw.sock"):
105 raise HwsimSkip("No hlr_auc_gw socket available")
106 if not os.path.exists("../../hostapd/hlr_auc_gw"):
107 raise HwsimSkip("No hlr_auc_gw available")
109 def interworking_ext_sim_connect(dev, bssid, method):
110 dev.request("INTERWORKING_CONNECT " + bssid)
111 interworking_ext_sim_auth(dev, method)
113 def interworking_ext_sim_auth(dev, method):
114 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
116 raise Exception("Network connected timed out")
117 if "(" + method + ")" not in ev:
118 raise Exception("Unexpected EAP method selection")
120 ev = dev.wait_event(["CTRL-REQ-SIM"], timeout=15)
122 raise Exception("Wait for external SIM processing request timed out")
124 if p[1] != "GSM-AUTH":
125 raise Exception("Unexpected CTRL-REQ-SIM type")
126 id = p[0].split('-')[3]
127 rand = p[2].split(' ')[0]
129 res = subprocess.check_output(["../../hostapd/hlr_auc_gw",
131 "auth_serv/hlr_auc_gw.milenage_db",
132 "GSM-AUTH-REQ 232010000000000 " + rand])
133 if "GSM-AUTH-RESP" not in res:
134 raise Exception("Unexpected hlr_auc_gw response")
135 resp = res.split(' ')[2].rstrip()
137 dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp)
138 dev.wait_connected(timeout=15)
140 def interworking_connect(dev, bssid, method):
141 dev.request("INTERWORKING_CONNECT " + bssid)
142 interworking_auth(dev, method)
144 def interworking_auth(dev, method):
145 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
147 raise Exception("Network connected timed out")
148 if "(" + method + ")" not in ev:
149 raise Exception("Unexpected EAP method selection")
151 dev.wait_connected(timeout=15)
153 def check_probe_resp(wt, bssid_unexpected, bssid_expected):
155 count = wt.get_bss_counter("probe_response", bssid_unexpected)
157 raise Exception("Unexpected Probe Response frame from AP")
160 count = wt.get_bss_counter("probe_response", bssid_expected)
162 raise Exception("No Probe Response frame from AP")
164 def test_ap_anqp_sharing(dev, apdev):
165 """ANQP sharing within ESS and explicit unshare"""
166 check_eap_capa(dev[0], "MSCHAPV2")
167 dev[0].flush_scan_cache()
169 bssid = apdev[0]['bssid']
170 params = hs20_ap_params()
171 params['hessid'] = bssid
172 hostapd.add_ap(apdev[0], params)
174 bssid2 = apdev[1]['bssid']
175 params = hs20_ap_params()
176 params['hessid'] = bssid
177 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
178 hostapd.add_ap(apdev[1], params)
181 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
182 'password': "secret",
183 'domain': "example.com" })
184 logger.info("Normal network selection with shared ANQP results")
185 dev[0].scan_for_bss(bssid, freq="2412")
186 dev[0].scan_for_bss(bssid2, freq="2412")
187 interworking_select(dev[0], None, "home", freq="2412")
188 dev[0].dump_monitor()
190 logger.debug("BSS entries:\n" + dev[0].request("BSS RANGE=ALL"))
191 res1 = dev[0].get_bss(bssid)
192 res2 = dev[0].get_bss(bssid2)
193 if 'anqp_nai_realm' not in res1:
194 raise Exception("anqp_nai_realm not found for AP1")
195 if 'anqp_nai_realm' not in res2:
196 raise Exception("anqp_nai_realm not found for AP2")
197 if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
198 raise Exception("ANQP results were not shared between BSSes")
200 logger.info("Explicit ANQP request to unshare ANQP results")
201 dev[0].request("ANQP_GET " + bssid + " 263")
202 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
204 raise Exception("ANQP operation timed out")
206 dev[0].request("ANQP_GET " + bssid2 + " 263")
207 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
209 raise Exception("ANQP operation timed out")
211 res1 = dev[0].get_bss(bssid)
212 res2 = dev[0].get_bss(bssid2)
213 if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
214 raise Exception("ANQP results were not unshared")
216 def test_ap_anqp_no_sharing_diff_ess(dev, apdev):
217 """ANQP no sharing between ESSs"""
218 check_eap_capa(dev[0], "MSCHAPV2")
219 dev[0].flush_scan_cache()
221 bssid = apdev[0]['bssid']
222 params = hs20_ap_params()
223 params['hessid'] = bssid
224 hostapd.add_ap(apdev[0], params)
226 bssid2 = apdev[1]['bssid']
227 params = hs20_ap_params(ssid="test-hs20-another")
228 params['hessid'] = bssid
229 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
230 hostapd.add_ap(apdev[1], params)
233 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
234 'password': "secret",
235 'domain': "example.com" })
236 logger.info("Normal network selection with shared ANQP results")
237 dev[0].scan_for_bss(bssid, freq="2412")
238 dev[0].scan_for_bss(bssid2, freq="2412")
239 interworking_select(dev[0], None, "home", freq="2412")
241 def test_ap_anqp_no_sharing_missing_info(dev, apdev):
242 """ANQP no sharing due to missing information"""
243 check_eap_capa(dev[0], "MSCHAPV2")
244 dev[0].flush_scan_cache()
246 bssid = apdev[0]['bssid']
247 params = hs20_ap_params()
248 params['hessid'] = bssid
249 del params['roaming_consortium']
250 del params['domain_name']
251 del params['anqp_3gpp_cell_net']
252 del params['nai_realm']
253 hostapd.add_ap(apdev[0], params)
255 bssid2 = apdev[1]['bssid']
256 params = hs20_ap_params()
257 params['hessid'] = bssid
258 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
259 hostapd.add_ap(apdev[1], params)
262 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
263 'password': "secret",
264 'domain': "example.com" })
265 logger.info("Normal network selection with shared ANQP results")
266 dev[0].scan_for_bss(bssid, freq="2412")
267 dev[0].scan_for_bss(bssid2, freq="2412")
268 interworking_select(dev[0], None, "home", freq="2412")
270 def test_ap_anqp_sharing_oom(dev, apdev):
271 """ANQP sharing within ESS and explicit unshare OOM"""
272 check_eap_capa(dev[0], "MSCHAPV2")
273 dev[0].flush_scan_cache()
275 bssid = apdev[0]['bssid']
276 params = hs20_ap_params()
277 params['hessid'] = bssid
278 hostapd.add_ap(apdev[0], params)
280 bssid2 = apdev[1]['bssid']
281 params = hs20_ap_params()
282 params['hessid'] = bssid
283 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
284 hostapd.add_ap(apdev[1], params)
287 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
288 'password': "secret",
289 'domain': "example.com" })
290 dev[0].scan_for_bss(bssid, freq="2412")
291 dev[0].scan_for_bss(bssid2, freq="2412")
292 interworking_select(dev[0], None, "home", freq="2412")
293 dev[0].dump_monitor()
295 with alloc_fail(dev[0], 1, "wpa_bss_anqp_clone"):
296 dev[0].request("ANQP_GET " + bssid + " 263")
297 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
299 raise Exception("ANQP operation timed out")
301 def test_ap_nai_home_realm_query(dev, apdev):
302 """NAI Home Realm Query"""
303 check_eap_capa(dev[0], "MSCHAPV2")
304 bssid = apdev[0]['bssid']
305 params = hs20_ap_params()
306 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
307 "0,another.example.org" ]
308 hostapd.add_ap(apdev[0], params)
310 dev[0].scan(freq="2412")
311 dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " realm=example.com")
312 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
314 raise Exception("ANQP operation timed out")
315 nai1 = dev[0].get_bss(bssid)['anqp_nai_realm']
316 dev[0].dump_monitor()
318 dev[0].request("ANQP_GET " + bssid + " 263")
319 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
321 raise Exception("ANQP operation timed out")
322 nai2 = dev[0].get_bss(bssid)['anqp_nai_realm']
324 if len(nai1) >= len(nai2):
325 raise Exception("Unexpected NAI Realm list response lengths")
326 if "example.com".encode('hex') not in nai1:
327 raise Exception("Home realm not reported")
328 if "example.org".encode('hex') in nai1:
329 raise Exception("Non-home realm reported")
330 if "example.com".encode('hex') not in nai2:
331 raise Exception("Home realm not reported in wildcard query")
332 if "example.org".encode('hex') not in nai2:
333 raise Exception("Non-home realm not reported in wildcard query ")
336 "00:11:22:33:44:55 123",
337 "00:11:22:33:44:55 qq" ]
339 if "FAIL" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + cmd):
340 raise Exception("Invalid HS20_GET_NAI_HOME_REALM_LIST accepted: " + cmd)
342 dev[0].dump_monitor()
343 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
344 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
345 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
347 raise Exception("ANQP operation timed out")
348 ev = dev[0].wait_event(["RX-ANQP"], timeout=0.1)
350 raise Exception("Unexpected ANQP response: " + ev)
352 dev[0].dump_monitor()
353 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " 01000b6578616d706c652e636f6d"):
354 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
355 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
357 raise Exception("No ANQP response")
358 if "NAI Realm list" not in ev:
359 raise Exception("Missing NAI Realm list: " + ev)
361 dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
362 'password': "secret",
363 'domain': "example.com" })
364 dev[0].dump_monitor()
365 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
366 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
367 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
369 raise Exception("No ANQP response")
370 if "NAI Realm list" not in ev:
371 raise Exception("Missing NAI Realm list: " + ev)
374 def test_ap_interworking_scan_filtering(dev, apdev):
375 """Interworking scan filtering with HESSID and access network type"""
377 _test_ap_interworking_scan_filtering(dev, apdev)
379 dev[0].request("SET hessid 00:00:00:00:00:00")
380 dev[0].request("SET access_network_type 15")
382 def _test_ap_interworking_scan_filtering(dev, apdev):
383 bssid = apdev[0]['bssid']
384 params = hs20_ap_params()
385 ssid = "test-hs20-ap1"
386 params['ssid'] = ssid
387 params['hessid'] = bssid
388 hapd0 = hostapd.add_ap(apdev[0], params)
390 bssid2 = apdev[1]['bssid']
391 params = hs20_ap_params()
392 ssid2 = "test-hs20-ap2"
393 params['ssid'] = ssid2
394 params['hessid'] = bssid2
395 params['access_network_type'] = "1"
396 del params['venue_group']
397 del params['venue_type']
398 hostapd.add_ap(apdev[1], params)
402 Wlantest.setup(hapd0)
406 logger.info("Check probe request filtering based on HESSID")
408 dev[0].request("SET hessid " + bssid2)
409 dev[0].scan(freq="2412")
411 check_probe_resp(wt, bssid, bssid2)
413 logger.info("Check probe request filtering based on access network type")
415 wt.clear_bss_counters(bssid)
416 wt.clear_bss_counters(bssid2)
417 dev[0].request("SET hessid 00:00:00:00:00:00")
418 dev[0].request("SET access_network_type 14")
419 dev[0].scan(freq="2412")
421 check_probe_resp(wt, bssid2, bssid)
423 wt.clear_bss_counters(bssid)
424 wt.clear_bss_counters(bssid2)
425 dev[0].request("SET hessid 00:00:00:00:00:00")
426 dev[0].request("SET access_network_type 1")
427 dev[0].scan(freq="2412")
429 check_probe_resp(wt, bssid, bssid2)
431 logger.info("Check probe request filtering based on HESSID and ANT")
433 wt.clear_bss_counters(bssid)
434 wt.clear_bss_counters(bssid2)
435 dev[0].request("SET hessid " + bssid)
436 dev[0].request("SET access_network_type 14")
437 dev[0].scan(freq="2412")
439 check_probe_resp(wt, bssid2, bssid)
441 wt.clear_bss_counters(bssid)
442 wt.clear_bss_counters(bssid2)
443 dev[0].request("SET hessid " + bssid2)
444 dev[0].request("SET access_network_type 14")
445 dev[0].scan(freq="2412")
447 check_probe_resp(wt, bssid, None)
448 check_probe_resp(wt, bssid2, None)
450 wt.clear_bss_counters(bssid)
451 wt.clear_bss_counters(bssid2)
452 dev[0].request("SET hessid " + bssid)
453 dev[0].request("SET access_network_type 1")
454 dev[0].scan(freq="2412")
456 check_probe_resp(wt, bssid, None)
457 check_probe_resp(wt, bssid2, None)
459 def test_ap_hs20_select(dev, apdev):
460 """Hotspot 2.0 network selection"""
461 bssid = apdev[0]['bssid']
462 params = hs20_ap_params()
463 params['hessid'] = bssid
464 hostapd.add_ap(apdev[0], params)
467 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
468 'password': "secret",
469 'domain': "example.com" })
470 interworking_select(dev[0], bssid, "home")
472 dev[0].remove_cred(id)
473 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
474 'password': "secret",
475 'domain': "no.match.example.com" })
476 interworking_select(dev[0], bssid, "roaming", freq="2412")
478 dev[0].set_cred_quoted(id, "realm", "no.match.example.com")
479 interworking_select(dev[0], bssid, no_match=True, freq="2412")
481 res = dev[0].request("SCAN_RESULTS")
482 if "[HS20]" not in res:
483 raise Exception("HS20 flag missing from scan results: " + res)
485 bssid2 = apdev[1]['bssid']
486 params = hs20_ap_params()
487 params['nai_realm'] = [ "0,example.org,21" ]
488 params['hessid'] = bssid2
489 params['domain_name'] = "example.org"
490 hostapd.add_ap(apdev[1], params)
491 dev[0].remove_cred(id)
492 id = dev[0].add_cred_values({ 'realm': "example.org", 'username': "test",
493 'password': "secret",
494 'domain': "example.org" })
495 interworking_select(dev[0], bssid2, "home", freq="2412")
497 def hs20_simulated_sim(dev, ap, method):
499 params = hs20_ap_params()
500 params['hessid'] = bssid
501 params['anqp_3gpp_cell_net'] = "555,444"
502 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
503 hostapd.add_ap(ap, params)
506 dev.add_cred_values({ 'imsi': "555444-333222111", 'eap': method,
507 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
508 interworking_select(dev, bssid, "home", freq="2412")
509 interworking_connect(dev, bssid, method)
510 check_sp_type(dev, "home")
512 def test_ap_hs20_sim(dev, apdev):
513 """Hotspot 2.0 with simulated SIM and EAP-SIM"""
514 hlr_auc_gw_available()
515 hs20_simulated_sim(dev[0], apdev[0], "SIM")
516 dev[0].request("INTERWORKING_SELECT auto freq=2412")
517 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
519 raise Exception("Timeout on already-connected event")
521 def test_ap_hs20_sim_invalid(dev, apdev):
522 """Hotspot 2.0 with simulated SIM and EAP-SIM - invalid IMSI"""
523 hlr_auc_gw_available()
524 bssid = apdev[0]['bssid']
525 params = hs20_ap_params()
526 params['hessid'] = bssid
527 params['anqp_3gpp_cell_net'] = "555,444"
528 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
529 hostapd.add_ap(apdev[0], params)
532 dev[0].add_cred_values({ 'imsi': "555444-3332221110", 'eap': "SIM",
533 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
534 # This hits "No valid IMSI available" in build_root_nai()
535 interworking_select(dev[0], bssid, freq="2412")
537 def test_ap_hs20_sim_oom(dev, apdev):
538 """Hotspot 2.0 with simulated SIM and EAP-SIM - OOM"""
539 hlr_auc_gw_available()
540 bssid = apdev[0]['bssid']
541 params = hs20_ap_params()
542 params['hessid'] = bssid
543 params['anqp_3gpp_cell_net'] = "555,444"
544 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
545 hostapd.add_ap(apdev[0], params)
548 dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "SIM",
549 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
550 dev[0].scan_for_bss(bssid, freq=2412)
551 interworking_select(dev[0], bssid, freq="2412")
553 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect_3gpp"):
554 dev[0].request("INTERWORKING_CONNECT " + bssid)
555 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
557 with alloc_fail(dev[0], 1, "=interworking_connect_3gpp"):
558 dev[0].request("INTERWORKING_CONNECT " + bssid)
559 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
561 def test_ap_hs20_aka(dev, apdev):
562 """Hotspot 2.0 with simulated USIM and EAP-AKA"""
563 hlr_auc_gw_available()
564 hs20_simulated_sim(dev[0], apdev[0], "AKA")
566 def test_ap_hs20_aka_prime(dev, apdev):
567 """Hotspot 2.0 with simulated USIM and EAP-AKA'"""
568 hlr_auc_gw_available()
569 hs20_simulated_sim(dev[0], apdev[0], "AKA'")
571 def test_ap_hs20_ext_sim(dev, apdev):
572 """Hotspot 2.0 with external SIM processing"""
573 hlr_auc_gw_available()
574 bssid = apdev[0]['bssid']
575 params = hs20_ap_params()
576 params['hessid'] = bssid
577 params['anqp_3gpp_cell_net'] = "232,01"
578 params['domain_name'] = "wlan.mnc001.mcc232.3gppnetwork.org"
579 hostapd.add_ap(apdev[0], params)
583 dev[0].request("SET external_sim 1")
584 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
585 interworking_select(dev[0], bssid, "home", freq="2412")
586 interworking_ext_sim_connect(dev[0], bssid, "SIM")
587 check_sp_type(dev[0], "home")
589 dev[0].request("SET external_sim 0")
591 def test_ap_hs20_ext_sim_roaming(dev, apdev):
592 """Hotspot 2.0 with external SIM processing in roaming network"""
593 hlr_auc_gw_available()
594 bssid = apdev[0]['bssid']
595 params = hs20_ap_params()
596 params['hessid'] = bssid
597 params['anqp_3gpp_cell_net'] = "244,91;310,026;232,01;234,56"
598 params['domain_name'] = "wlan.mnc091.mcc244.3gppnetwork.org"
599 hostapd.add_ap(apdev[0], params)
603 dev[0].request("SET external_sim 1")
604 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
605 interworking_select(dev[0], bssid, "roaming", freq="2412")
606 interworking_ext_sim_connect(dev[0], bssid, "SIM")
607 check_sp_type(dev[0], "roaming")
609 dev[0].request("SET external_sim 0")
611 def test_ap_hs20_username(dev, apdev):
612 """Hotspot 2.0 connection in username/password credential"""
613 check_eap_capa(dev[0], "MSCHAPV2")
614 bssid = apdev[0]['bssid']
615 params = hs20_ap_params()
616 params['hessid'] = bssid
617 params['disable_dgaf'] = '1'
618 hostapd.add_ap(apdev[0], params)
621 id = dev[0].add_cred_values({ 'realm': "example.com",
622 'username': "hs20-test",
623 'password': "password",
624 'ca_cert': "auth_serv/ca.pem",
625 'domain': "example.com",
626 'update_identifier': "1234" })
627 interworking_select(dev[0], bssid, "home", freq="2412")
628 interworking_connect(dev[0], bssid, "TTLS")
629 check_sp_type(dev[0], "home")
630 status = dev[0].get_status()
631 if status['pairwise_cipher'] != "CCMP":
632 raise Exception("Unexpected pairwise cipher")
633 if status['hs20'] != "2":
634 raise Exception("Unexpected HS 2.0 support indication")
636 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
637 identity="hs20-test", password="password",
638 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
641 def test_ap_hs20_connect_api(dev, apdev):
642 """Hotspot 2.0 connection with connect API"""
643 check_eap_capa(dev[0], "MSCHAPV2")
644 bssid = apdev[0]['bssid']
645 params = hs20_ap_params()
646 params['hessid'] = bssid
647 params['disable_dgaf'] = '1'
648 hostapd.add_ap(apdev[0], params)
650 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
651 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
653 wpas.flush_scan_cache()
654 id = wpas.add_cred_values({ 'realm': "example.com",
655 'username': "hs20-test",
656 'password': "password",
657 'ca_cert': "auth_serv/ca.pem",
658 'domain': "example.com",
659 'update_identifier': "1234" })
660 interworking_select(wpas, bssid, "home", freq="2412")
661 interworking_connect(wpas, bssid, "TTLS")
662 check_sp_type(wpas, "home")
663 status = wpas.get_status()
664 if status['pairwise_cipher'] != "CCMP":
665 raise Exception("Unexpected pairwise cipher")
666 if status['hs20'] != "2":
667 raise Exception("Unexpected HS 2.0 support indication")
669 def test_ap_hs20_auto_interworking(dev, apdev):
670 """Hotspot 2.0 connection with auto_interworking=1"""
671 check_eap_capa(dev[0], "MSCHAPV2")
672 bssid = apdev[0]['bssid']
673 params = hs20_ap_params()
674 params['hessid'] = bssid
675 params['disable_dgaf'] = '1'
676 hostapd.add_ap(apdev[0], params)
678 dev[0].hs20_enable(auto_interworking=True)
679 id = dev[0].add_cred_values({ 'realm': "example.com",
680 'username': "hs20-test",
681 'password': "password",
682 'ca_cert': "auth_serv/ca.pem",
683 'domain': "example.com",
684 'update_identifier': "1234" })
685 dev[0].request("REASSOCIATE")
686 dev[0].wait_connected(timeout=15)
687 check_sp_type(dev[0], "home")
688 status = dev[0].get_status()
689 if status['pairwise_cipher'] != "CCMP":
690 raise Exception("Unexpected pairwise cipher")
691 if status['hs20'] != "2":
692 raise Exception("Unexpected HS 2.0 support indication")
695 def test_ap_hs20_auto_interworking_no_match(dev, apdev):
696 """Hotspot 2.0 connection with auto_interworking=1 and no matching network"""
697 hapd = hostapd.add_ap(apdev[0], { "ssid": "mismatch" })
699 dev[0].hs20_enable(auto_interworking=True)
700 id = dev[0].connect("mismatch", psk="12345678", scan_freq="2412",
701 only_add_network=True)
702 dev[0].request("ENABLE_NETWORK " + str(id) + " no-connect")
704 id = dev[0].add_cred_values({ 'realm': "example.com",
705 'username': "hs20-test",
706 'password': "password",
707 'ca_cert': "auth_serv/ca.pem",
708 'domain': "example.com",
709 'update_identifier': "1234" })
710 dev[0].request("INTERWORKING_SELECT auto freq=2412")
712 dev[0].dump_monitor()
714 logger.info("start ping")
715 if "PONG" not in dev[0].ctrl.request("PING", timeout=2):
716 raise Exception("PING failed")
717 logger.info("ping done")
721 ev = dev[0].wait_event([ "ANQP fetch completed",
722 "CTRL-EVENT-SCAN-RESULTS" ], timeout=0.05)
725 if "ANQP fetch completed" in ev:
729 if fetch > 2 * scan + 3:
730 raise Exception("Too many ANQP fetch iterations")
731 dev[0].dump_monitor()
732 dev[0].request("DISCONNECT")
735 def test_ap_hs20_auto_interworking_no_cred_match(dev, apdev):
736 """Hotspot 2.0 connection with auto_interworking=1 but no cred match"""
737 bssid = apdev[0]['bssid']
738 params = { "ssid": "test" }
739 hostapd.add_ap(apdev[0], params)
741 dev[0].hs20_enable(auto_interworking=True)
742 dev[0].add_cred_values({ 'realm': "example.com",
743 'username': "hs20-test",
744 'password': "password",
745 'ca_cert': "auth_serv/ca.pem",
746 'domain': "example.com" })
748 id = dev[0].connect("test", psk="12345678", only_add_network=True)
749 dev[0].request("ENABLE_NETWORK %s" % id)
750 logger.info("Verify that scanning continues when there is partial network block match")
751 for i in range(0, 2):
752 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
754 raise Exception("Scan timed out")
755 logger.info("Scan completed")
757 def eap_test(dev, ap, eap_params, method, user):
759 params = hs20_ap_params()
760 params['nai_realm'] = [ "0,example.com," + eap_params ]
761 hostapd.add_ap(ap, params)
764 dev.add_cred_values({ 'realm': "example.com",
765 'ca_cert': "auth_serv/ca.pem",
767 'password': "password" })
768 interworking_select(dev, bssid, freq="2412")
769 interworking_connect(dev, bssid, method)
772 def test_ap_hs20_eap_unknown(dev, apdev):
773 """Hotspot 2.0 connection with unknown EAP method"""
774 bssid = apdev[0]['bssid']
775 params = hs20_ap_params()
776 params['nai_realm'] = "0,example.com,99"
777 hostapd.add_ap(apdev[0], params)
780 dev[0].add_cred_values(default_cred())
781 interworking_select(dev[0], None, no_match=True, freq="2412")
783 def test_ap_hs20_eap_peap_mschapv2(dev, apdev):
784 """Hotspot 2.0 connection with PEAP/MSCHAPV2"""
785 check_eap_capa(dev[0], "MSCHAPV2")
786 eap_test(dev[0], apdev[0], "25[3:26]", "PEAP", "user")
788 def test_ap_hs20_eap_peap_default(dev, apdev):
789 """Hotspot 2.0 connection with PEAP/MSCHAPV2 (as default)"""
790 check_eap_capa(dev[0], "MSCHAPV2")
791 eap_test(dev[0], apdev[0], "25", "PEAP", "user")
793 def test_ap_hs20_eap_peap_gtc(dev, apdev):
794 """Hotspot 2.0 connection with PEAP/GTC"""
795 eap_test(dev[0], apdev[0], "25[3:6]", "PEAP", "user")
798 def test_ap_hs20_eap_peap_unknown(dev, apdev):
799 """Hotspot 2.0 connection with PEAP/unknown"""
800 bssid = apdev[0]['bssid']
801 params = hs20_ap_params()
802 params['nai_realm'] = "0,example.com,25[3:99]"
803 hostapd.add_ap(apdev[0], params)
806 dev[0].add_cred_values(default_cred())
807 interworking_select(dev[0], None, no_match=True, freq="2412")
809 def test_ap_hs20_eap_ttls_chap(dev, apdev):
810 """Hotspot 2.0 connection with TTLS/CHAP"""
811 skip_with_fips(dev[0])
812 eap_test(dev[0], apdev[0], "21[2:2]", "TTLS", "chap user")
814 def test_ap_hs20_eap_ttls_mschap(dev, apdev):
815 """Hotspot 2.0 connection with TTLS/MSCHAP"""
816 skip_with_fips(dev[0])
817 eap_test(dev[0], apdev[0], "21[2:3]", "TTLS", "mschap user")
819 def test_ap_hs20_eap_ttls_default(dev, apdev):
820 """Hotspot 2.0 connection with TTLS/default"""
821 skip_with_fips(dev[0])
822 eap_test(dev[0], apdev[0], "21", "TTLS", "hs20-test")
824 def test_ap_hs20_eap_ttls_eap_mschapv2(dev, apdev):
825 """Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2"""
826 check_eap_capa(dev[0], "MSCHAPV2")
827 eap_test(dev[0], apdev[0], "21[3:26][6:7][99:99]", "TTLS", "user")
830 def test_ap_hs20_eap_ttls_eap_unknown(dev, apdev):
831 """Hotspot 2.0 connection with TTLS/EAP-unknown"""
832 bssid = apdev[0]['bssid']
833 params = hs20_ap_params()
834 params['nai_realm'] = "0,example.com,21[3:99]"
835 hostapd.add_ap(apdev[0], params)
838 dev[0].add_cred_values(default_cred())
839 interworking_select(dev[0], None, no_match=True, freq="2412")
842 def test_ap_hs20_eap_ttls_eap_unsupported(dev, apdev):
843 """Hotspot 2.0 connection with TTLS/EAP-OTP(unsupported)"""
844 bssid = apdev[0]['bssid']
845 params = hs20_ap_params()
846 params['nai_realm'] = "0,example.com,21[3:5]"
847 hostapd.add_ap(apdev[0], params)
850 dev[0].add_cred_values(default_cred())
851 interworking_select(dev[0], None, no_match=True, freq="2412")
854 def test_ap_hs20_eap_ttls_unknown(dev, apdev):
855 """Hotspot 2.0 connection with TTLS/unknown"""
856 bssid = apdev[0]['bssid']
857 params = hs20_ap_params()
858 params['nai_realm'] = "0,example.com,21[2:5]"
859 hostapd.add_ap(apdev[0], params)
862 dev[0].add_cred_values(default_cred())
863 interworking_select(dev[0], None, no_match=True, freq="2412")
865 def test_ap_hs20_eap_fast_mschapv2(dev, apdev):
866 """Hotspot 2.0 connection with FAST/EAP-MSCHAPV2"""
867 check_eap_capa(dev[0], "FAST")
868 eap_test(dev[0], apdev[0], "43[3:26]", "FAST", "user")
870 def test_ap_hs20_eap_fast_gtc(dev, apdev):
871 """Hotspot 2.0 connection with FAST/EAP-GTC"""
872 check_eap_capa(dev[0], "FAST")
873 eap_test(dev[0], apdev[0], "43[3:6]", "FAST", "user")
875 def test_ap_hs20_eap_tls(dev, apdev):
876 """Hotspot 2.0 connection with EAP-TLS"""
877 bssid = apdev[0]['bssid']
878 params = hs20_ap_params()
879 params['nai_realm'] = [ "0,example.com,13[5:6]" ]
880 hostapd.add_ap(apdev[0], params)
883 dev[0].add_cred_values({ 'realm': "example.com",
884 'username': "certificate-user",
885 'ca_cert': "auth_serv/ca.pem",
886 'client_cert': "auth_serv/user.pem",
887 'private_key': "auth_serv/user.key"})
888 interworking_select(dev[0], bssid, freq="2412")
889 interworking_connect(dev[0], bssid, "TLS")
892 def test_ap_hs20_eap_cert_unknown(dev, apdev):
893 """Hotspot 2.0 connection with certificate, but unknown EAP method"""
894 bssid = apdev[0]['bssid']
895 params = hs20_ap_params()
896 params['nai_realm'] = [ "0,example.com,99[5:6]" ]
897 hostapd.add_ap(apdev[0], params)
900 dev[0].add_cred_values({ 'realm': "example.com",
901 'username': "certificate-user",
902 'ca_cert': "auth_serv/ca.pem",
903 'client_cert': "auth_serv/user.pem",
904 'private_key': "auth_serv/user.key"})
905 interworking_select(dev[0], None, no_match=True, freq="2412")
908 def test_ap_hs20_eap_cert_unsupported(dev, apdev):
909 """Hotspot 2.0 connection with certificate, but unsupported TTLS"""
910 bssid = apdev[0]['bssid']
911 params = hs20_ap_params()
912 params['nai_realm'] = [ "0,example.com,21[5:6]" ]
913 hostapd.add_ap(apdev[0], params)
916 dev[0].add_cred_values({ 'realm': "example.com",
917 'username': "certificate-user",
918 'ca_cert': "auth_serv/ca.pem",
919 'client_cert': "auth_serv/user.pem",
920 'private_key': "auth_serv/user.key"})
921 interworking_select(dev[0], None, no_match=True, freq="2412")
924 def test_ap_hs20_eap_invalid_cred(dev, apdev):
925 """Hotspot 2.0 connection with invalid cred configuration"""
926 bssid = apdev[0]['bssid']
927 params = hs20_ap_params()
928 hostapd.add_ap(apdev[0], params)
931 dev[0].add_cred_values({ 'realm': "example.com",
932 'username': "certificate-user",
933 'client_cert': "auth_serv/user.pem" })
934 interworking_select(dev[0], None, no_match=True, freq="2412")
936 def test_ap_hs20_nai_realms(dev, apdev):
937 """Hotspot 2.0 connection and multiple NAI realms and TTLS/PAP"""
938 bssid = apdev[0]['bssid']
939 params = hs20_ap_params()
940 params['hessid'] = bssid
941 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]" ]
942 hostapd.add_ap(apdev[0], params)
945 id = dev[0].add_cred_values({ 'realm': "example.com",
946 'ca_cert': "auth_serv/ca.pem",
947 'username': "pap user",
948 'password': "password",
949 'domain': "example.com" })
950 interworking_select(dev[0], bssid, "home", freq="2412")
951 interworking_connect(dev[0], bssid, "TTLS")
952 check_sp_type(dev[0], "home")
954 def test_ap_hs20_roaming_consortium(dev, apdev):
955 """Hotspot 2.0 connection based on roaming consortium match"""
956 bssid = apdev[0]['bssid']
957 params = hs20_ap_params()
958 params['hessid'] = bssid
959 hostapd.add_ap(apdev[0], params)
962 for consortium in [ "112233", "1020304050", "010203040506", "fedcba" ]:
963 id = dev[0].add_cred_values({ 'username': "user",
964 'password': "password",
965 'domain': "example.com",
966 'ca_cert': "auth_serv/ca.pem",
967 'roaming_consortium': consortium,
969 interworking_select(dev[0], bssid, "home", freq="2412")
970 interworking_connect(dev[0], bssid, "PEAP")
971 check_sp_type(dev[0], "home")
972 dev[0].request("INTERWORKING_SELECT auto freq=2412")
973 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
975 raise Exception("Timeout on already-connected event")
976 dev[0].remove_cred(id)
978 def test_ap_hs20_roaming_consortium_invalid(dev, apdev):
979 """Hotspot 2.0 connection and invalid roaming consortium ANQP-element"""
980 bssid = apdev[0]['bssid']
981 params = hs20_ap_params()
982 params['hessid'] = bssid
983 # Override Roaming Consortium ANQP-element with an incorrectly encoded
985 params['anqp_elem'] = "261:04fedcba"
986 hostapd.add_ap(apdev[0], params)
989 id = dev[0].add_cred_values({ 'username': "user",
990 'password': "password",
991 'domain': "example.com",
992 'ca_cert': "auth_serv/ca.pem",
993 'roaming_consortium': "fedcba",
995 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
997 def test_ap_hs20_roaming_consortium_element(dev, apdev):
998 """Hotspot 2.0 connection and invalid roaming consortium element"""
999 bssid = apdev[0]['bssid']
1000 params = hs20_ap_params()
1001 params['hessid'] = bssid
1002 del params['roaming_consortium']
1003 params['vendor_elements'] = '6f00'
1004 hapd = hostapd.add_ap(apdev[0], params)
1006 dev[0].hs20_enable()
1007 dev[0].scan_for_bss(bssid, freq="2412")
1008 id = dev[0].add_cred_values({ 'username': "user",
1009 'password': "password",
1010 'domain': "example.com",
1011 'ca_cert': "auth_serv/ca.pem",
1012 'roaming_consortium': "112233",
1014 interworking_select(dev[0], bssid, freq="2412", no_match=True)
1016 hapd.set('vendor_elements', '6f020001')
1017 if "OK" not in hapd.request("UPDATE_BEACON"):
1018 raise Exception("UPDATE_BEACON failed")
1019 dev[0].request("BSS_FLUSH 0")
1020 dev[0].scan_for_bss(bssid, freq="2412", force_scan=True)
1021 interworking_select(dev[0], bssid, freq="2412", no_match=True)
1023 def test_ap_hs20_roaming_consortium_constraints(dev, apdev):
1024 """Hotspot 2.0 connection and roaming consortium constraints"""
1025 bssid = apdev[0]['bssid']
1026 params = hs20_ap_params()
1027 params['hessid'] = bssid
1028 params['bss_load_test'] = "12:200:20000"
1029 hostapd.add_ap(apdev[0], params)
1031 dev[0].hs20_enable()
1033 vals = { 'username': "user",
1034 'password': "password",
1035 'domain': "example.com",
1036 'ca_cert': "auth_serv/ca.pem",
1037 'roaming_consortium': "fedcba",
1040 vals2['required_roaming_consortium'] = "223344"
1041 id = dev[0].add_cred_values(vals2)
1042 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
1043 dev[0].remove_cred(id)
1046 vals2['min_dl_bandwidth_home'] = "65500"
1047 id = dev[0].add_cred_values(vals2)
1048 dev[0].request("INTERWORKING_SELECT freq=2412")
1049 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1051 raise Exception("No AP found")
1052 if "below_min_backhaul=1" not in ev:
1053 raise Exception("below_min_backhaul not reported")
1054 dev[0].remove_cred(id)
1057 vals2['max_bss_load'] = "100"
1058 id = dev[0].add_cred_values(vals2)
1059 dev[0].request("INTERWORKING_SELECT freq=2412")
1060 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1062 raise Exception("No AP found")
1063 if "over_max_bss_load=1" not in ev:
1064 raise Exception("over_max_bss_load not reported")
1065 dev[0].remove_cred(id)
1068 vals2['req_conn_capab'] = "6:1234"
1069 vals2['domain'] = 'example.org'
1070 id = dev[0].add_cred_values(vals2)
1072 dev[0].request("INTERWORKING_SELECT freq=2412")
1073 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1075 raise Exception("No AP found")
1076 if "conn_capab_missing=1" not in ev:
1077 raise Exception("conn_capab_missing not reported")
1078 dev[0].remove_cred(id)
1080 values = default_cred()
1081 values['roaming_consortium'] = "fedcba"
1082 id3 = dev[0].add_cred_values(values)
1085 vals2['roaming_consortium'] = "fedcba"
1086 vals2['priority'] = "2"
1087 id = dev[0].add_cred_values(vals2)
1089 values = default_cred()
1090 values['roaming_consortium'] = "fedcba"
1091 id2 = dev[0].add_cred_values(values)
1093 dev[0].request("INTERWORKING_SELECT freq=2412")
1094 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1096 raise Exception("No AP found")
1097 dev[0].remove_cred(id)
1098 dev[0].remove_cred(id2)
1099 dev[0].remove_cred(id3)
1101 def test_ap_hs20_3gpp_constraints(dev, apdev):
1102 """Hotspot 2.0 connection and 3GPP credential constraints"""
1103 bssid = apdev[0]['bssid']
1104 params = hs20_ap_params()
1105 params['hessid'] = bssid
1106 params['anqp_3gpp_cell_net'] = "555,444"
1107 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
1108 params['bss_load_test'] = "12:200:20000"
1109 hapd = hostapd.add_ap(apdev[0], params)
1111 dev[0].hs20_enable()
1113 vals = { 'imsi': "555444-333222111",
1115 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
1117 vals2['required_roaming_consortium'] = "223344"
1118 id = dev[0].add_cred_values(vals2)
1119 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
1120 dev[0].remove_cred(id)
1123 vals2['min_dl_bandwidth_home'] = "65500"
1124 id = dev[0].add_cred_values(vals2)
1125 dev[0].request("INTERWORKING_SELECT freq=2412")
1126 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1128 raise Exception("No AP found")
1129 if "below_min_backhaul=1" not in ev:
1130 raise Exception("below_min_backhaul not reported")
1131 dev[0].remove_cred(id)
1134 vals2['max_bss_load'] = "100"
1135 id = dev[0].add_cred_values(vals2)
1136 dev[0].request("INTERWORKING_SELECT freq=2412")
1137 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1139 raise Exception("No AP found")
1140 if "over_max_bss_load=1" not in ev:
1141 raise Exception("over_max_bss_load not reported")
1142 dev[0].remove_cred(id)
1144 values = default_cred()
1145 values['roaming_consortium'] = "fedcba"
1146 id3 = dev[0].add_cred_values(values)
1149 vals2['roaming_consortium'] = "fedcba"
1150 vals2['priority'] = "2"
1151 id = dev[0].add_cred_values(vals2)
1153 values = default_cred()
1154 values['roaming_consortium'] = "fedcba"
1155 id2 = dev[0].add_cred_values(values)
1157 dev[0].request("INTERWORKING_SELECT freq=2412")
1158 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1160 raise Exception("No AP found")
1161 dev[0].remove_cred(id)
1162 dev[0].remove_cred(id2)
1163 dev[0].remove_cred(id3)
1166 params = hs20_ap_params()
1167 params['hessid'] = bssid
1168 params['anqp_3gpp_cell_net'] = "555,444"
1169 params['bss_load_test'] = "12:200:20000"
1170 hapd = hostapd.add_ap(apdev[0], params)
1172 vals2['req_conn_capab'] = "6:1234"
1173 id = dev[0].add_cred_values(vals2)
1174 dev[0].request("INTERWORKING_SELECT freq=2412")
1175 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1177 raise Exception("No AP found")
1178 if "conn_capab_missing=1" not in ev:
1179 raise Exception("conn_capab_missing not reported")
1180 dev[0].remove_cred(id)
1182 def test_ap_hs20_connect_no_full_match(dev, apdev):
1183 """Hotspot 2.0 connection and no full match"""
1184 bssid = apdev[0]['bssid']
1185 params = hs20_ap_params()
1186 params['hessid'] = bssid
1187 params['anqp_3gpp_cell_net'] = "555,444"
1188 hostapd.add_ap(apdev[0], params)
1190 dev[0].hs20_enable()
1192 vals = { 'username': "user",
1193 'password': "password",
1194 'domain': "example.com",
1195 'ca_cert': "auth_serv/ca.pem",
1196 'roaming_consortium': "fedcba",
1198 'min_dl_bandwidth_home': "65500" }
1199 id = dev[0].add_cred_values(vals)
1200 dev[0].request("INTERWORKING_SELECT freq=2412")
1201 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1203 raise Exception("No AP found")
1204 if "below_min_backhaul=1" not in ev:
1205 raise Exception("below_min_backhaul not reported")
1206 interworking_connect(dev[0], bssid, "TTLS")
1207 dev[0].remove_cred(id)
1208 dev[0].wait_disconnected()
1210 vals = { 'imsi': "555444-333222111", 'eap': "SIM",
1211 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1212 'min_dl_bandwidth_roaming': "65500" }
1213 id = dev[0].add_cred_values(vals)
1214 dev[0].request("INTERWORKING_SELECT freq=2412")
1215 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1217 raise Exception("No AP found")
1218 if "below_min_backhaul=1" not in ev:
1219 raise Exception("below_min_backhaul not reported")
1220 interworking_connect(dev[0], bssid, "SIM")
1221 dev[0].remove_cred(id)
1222 dev[0].wait_disconnected()
1224 def test_ap_hs20_username_roaming(dev, apdev):
1225 """Hotspot 2.0 connection in username/password credential (roaming)"""
1226 check_eap_capa(dev[0], "MSCHAPV2")
1227 bssid = apdev[0]['bssid']
1228 params = hs20_ap_params()
1229 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
1230 "0,roaming.example.com,21[2:4][5:7]",
1231 "0,another.example.com" ]
1232 params['domain_name'] = "another.example.com"
1233 params['hessid'] = bssid
1234 hostapd.add_ap(apdev[0], params)
1236 dev[0].hs20_enable()
1237 id = dev[0].add_cred_values({ 'realm': "roaming.example.com",
1238 'username': "hs20-test",
1239 'password': "password",
1240 'ca_cert': "auth_serv/ca.pem",
1241 'domain': "example.com" })
1242 interworking_select(dev[0], bssid, "roaming", freq="2412")
1243 interworking_connect(dev[0], bssid, "TTLS")
1244 check_sp_type(dev[0], "roaming")
1246 def test_ap_hs20_username_unknown(dev, apdev):
1247 """Hotspot 2.0 connection in username/password credential (no domain in cred)"""
1248 check_eap_capa(dev[0], "MSCHAPV2")
1249 bssid = apdev[0]['bssid']
1250 params = hs20_ap_params()
1251 params['hessid'] = bssid
1252 hostapd.add_ap(apdev[0], params)
1254 dev[0].hs20_enable()
1255 id = dev[0].add_cred_values({ 'realm': "example.com",
1256 'ca_cert': "auth_serv/ca.pem",
1257 'username': "hs20-test",
1258 'password': "password" })
1259 interworking_select(dev[0], bssid, "unknown", freq="2412")
1260 interworking_connect(dev[0], bssid, "TTLS")
1261 check_sp_type(dev[0], "unknown")
1263 def test_ap_hs20_username_unknown2(dev, apdev):
1264 """Hotspot 2.0 connection in username/password credential (no domain advertized)"""
1265 check_eap_capa(dev[0], "MSCHAPV2")
1266 bssid = apdev[0]['bssid']
1267 params = hs20_ap_params()
1268 params['hessid'] = bssid
1269 del params['domain_name']
1270 hostapd.add_ap(apdev[0], params)
1272 dev[0].hs20_enable()
1273 id = dev[0].add_cred_values({ 'realm': "example.com",
1274 'ca_cert': "auth_serv/ca.pem",
1275 'username': "hs20-test",
1276 'password': "password",
1277 'domain': "example.com" })
1278 interworking_select(dev[0], bssid, "unknown", freq="2412")
1279 interworking_connect(dev[0], bssid, "TTLS")
1280 check_sp_type(dev[0], "unknown")
1282 def test_ap_hs20_gas_while_associated(dev, apdev):
1283 """Hotspot 2.0 connection with GAS query while associated"""
1284 check_eap_capa(dev[0], "MSCHAPV2")
1285 bssid = apdev[0]['bssid']
1286 params = hs20_ap_params()
1287 params['hessid'] = bssid
1288 hostapd.add_ap(apdev[0], params)
1290 dev[0].hs20_enable()
1291 id = dev[0].add_cred_values({ 'realm': "example.com",
1292 'ca_cert': "auth_serv/ca.pem",
1293 'username': "hs20-test",
1294 'password': "password",
1295 'domain': "example.com" })
1296 interworking_select(dev[0], bssid, "home", freq="2412")
1297 interworking_connect(dev[0], bssid, "TTLS")
1299 logger.info("Verifying GAS query while associated")
1300 dev[0].request("FETCH_ANQP")
1301 for i in range(0, 6):
1302 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1304 raise Exception("Operation timed out")
1306 def test_ap_hs20_gas_with_another_ap_while_associated(dev, apdev):
1307 """GAS query with another AP while associated"""
1308 check_eap_capa(dev[0], "MSCHAPV2")
1309 bssid = apdev[0]['bssid']
1310 params = hs20_ap_params()
1311 params['hessid'] = bssid
1312 hostapd.add_ap(apdev[0], params)
1314 bssid2 = apdev[1]['bssid']
1315 params = hs20_ap_params()
1316 params['hessid'] = bssid2
1317 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1318 hostapd.add_ap(apdev[1], params)
1320 dev[0].hs20_enable()
1321 id = dev[0].add_cred_values({ 'realm': "example.com",
1322 'ca_cert': "auth_serv/ca.pem",
1323 'username': "hs20-test",
1324 'password': "password",
1325 'domain': "example.com" })
1326 interworking_select(dev[0], bssid, "home", freq="2412")
1327 interworking_connect(dev[0], bssid, "TTLS")
1328 dev[0].dump_monitor()
1330 logger.info("Verifying GAS query with same AP while associated")
1331 dev[0].request("ANQP_GET " + bssid + " 263")
1332 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1334 raise Exception("ANQP operation timed out")
1335 dev[0].dump_monitor()
1337 logger.info("Verifying GAS query with another AP while associated")
1338 dev[0].scan_for_bss(bssid2, 2412)
1339 dev[0].request("ANQP_GET " + bssid2 + " 263")
1340 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1342 raise Exception("ANQP operation timed out")
1344 def test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
1345 """Hotspot 2.0 connection with GAS query while associated and using PMF"""
1346 check_eap_capa(dev[0], "MSCHAPV2")
1348 _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev)
1350 dev[0].request("SET pmf 0")
1352 def _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
1353 bssid = apdev[0]['bssid']
1354 params = hs20_ap_params()
1355 params['hessid'] = bssid
1356 hostapd.add_ap(apdev[0], params)
1358 bssid2 = apdev[1]['bssid']
1359 params = hs20_ap_params()
1360 params['hessid'] = bssid2
1361 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1362 hostapd.add_ap(apdev[1], params)
1364 dev[0].hs20_enable()
1365 dev[0].request("SET pmf 2")
1366 id = dev[0].add_cred_values({ 'realm': "example.com",
1367 'ca_cert': "auth_serv/ca.pem",
1368 'username': "hs20-test",
1369 'password': "password",
1370 'domain': "example.com" })
1371 interworking_select(dev[0], bssid, "home", freq="2412")
1372 interworking_connect(dev[0], bssid, "TTLS")
1374 logger.info("Verifying GAS query while associated")
1375 dev[0].request("FETCH_ANQP")
1376 for i in range(0, 2 * 6):
1377 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1379 raise Exception("Operation timed out")
1381 def test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev):
1382 """GAS query with another AP while associated and using PMF"""
1383 check_eap_capa(dev[0], "MSCHAPV2")
1385 _test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev)
1387 dev[0].request("SET pmf 0")
1389 def _test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev):
1390 bssid = apdev[0]['bssid']
1391 params = hs20_ap_params()
1392 params['hessid'] = bssid
1393 hostapd.add_ap(apdev[0], params)
1395 bssid2 = apdev[1]['bssid']
1396 params = hs20_ap_params()
1397 params['hessid'] = bssid2
1398 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1399 hostapd.add_ap(apdev[1], params)
1401 dev[0].hs20_enable()
1402 dev[0].request("SET pmf 2")
1403 id = dev[0].add_cred_values({ 'realm': "example.com",
1404 'ca_cert': "auth_serv/ca.pem",
1405 'username': "hs20-test",
1406 'password': "password",
1407 'domain': "example.com" })
1408 interworking_select(dev[0], bssid, "home", freq="2412")
1409 interworking_connect(dev[0], bssid, "TTLS")
1410 dev[0].dump_monitor()
1412 logger.info("Verifying GAS query with same AP while associated")
1413 dev[0].request("ANQP_GET " + bssid + " 263")
1414 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1416 raise Exception("ANQP operation timed out")
1417 dev[0].dump_monitor()
1419 logger.info("Verifying GAS query with another AP while associated")
1420 dev[0].scan_for_bss(bssid2, 2412)
1421 dev[0].request("ANQP_GET " + bssid2 + " 263")
1422 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1424 raise Exception("ANQP operation timed out")
1426 def test_ap_hs20_gas_frag_while_associated(dev, apdev):
1427 """Hotspot 2.0 connection with fragmented GAS query while associated"""
1428 check_eap_capa(dev[0], "MSCHAPV2")
1429 bssid = apdev[0]['bssid']
1430 params = hs20_ap_params()
1431 params['hessid'] = bssid
1432 hapd = hostapd.add_ap(apdev[0], params)
1433 hapd.set("gas_frag_limit", "50")
1435 dev[0].hs20_enable()
1436 id = dev[0].add_cred_values({ 'realm': "example.com",
1437 'ca_cert': "auth_serv/ca.pem",
1438 'username': "hs20-test",
1439 'password': "password",
1440 'domain': "example.com" })
1441 interworking_select(dev[0], bssid, "home", freq="2412")
1442 interworking_connect(dev[0], bssid, "TTLS")
1444 logger.info("Verifying GAS query while associated")
1445 dev[0].request("FETCH_ANQP")
1446 for i in range(0, 6):
1447 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1449 raise Exception("Operation timed out")
1451 def test_ap_hs20_multiple_connects(dev, apdev):
1452 """Hotspot 2.0 connection through multiple network selections"""
1453 check_eap_capa(dev[0], "MSCHAPV2")
1454 bssid = apdev[0]['bssid']
1455 params = hs20_ap_params()
1456 params['hessid'] = bssid
1457 hostapd.add_ap(apdev[0], params)
1459 dev[0].hs20_enable()
1460 values = { 'realm': "example.com",
1461 'ca_cert': "auth_serv/ca.pem",
1462 'username': "hs20-test",
1463 'password': "password",
1464 'domain': "example.com" }
1465 id = dev[0].add_cred_values(values)
1467 dev[0].scan_for_bss(bssid, freq="2412")
1469 for i in range(0, 3):
1470 logger.info("Starting Interworking network selection")
1471 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1473 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1474 "INTERWORKING-ALREADY-CONNECTED",
1475 "CTRL-EVENT-CONNECTED"], timeout=15)
1477 raise Exception("Connection timed out")
1478 if "INTERWORKING-NO-MATCH" in ev:
1479 raise Exception("Matching AP not found")
1480 if "CTRL-EVENT-CONNECTED" in ev:
1482 if i == 2 and "INTERWORKING-ALREADY-CONNECTED" in ev:
1485 dev[0].request("DISCONNECT")
1486 dev[0].dump_monitor()
1488 networks = dev[0].list_networks()
1489 if len(networks) > 1:
1490 raise Exception("Duplicated network block detected")
1492 def test_ap_hs20_disallow_aps(dev, apdev):
1493 """Hotspot 2.0 connection and disallow_aps"""
1494 bssid = apdev[0]['bssid']
1495 params = hs20_ap_params()
1496 params['hessid'] = bssid
1497 hostapd.add_ap(apdev[0], params)
1499 dev[0].hs20_enable()
1500 values = { 'realm': "example.com",
1501 'ca_cert': "auth_serv/ca.pem",
1502 'username': "hs20-test",
1503 'password': "password",
1504 'domain': "example.com" }
1505 id = dev[0].add_cred_values(values)
1507 dev[0].scan_for_bss(bssid, freq="2412")
1509 logger.info("Verify disallow_aps bssid")
1510 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1511 dev[0].request("INTERWORKING_SELECT auto")
1512 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1514 raise Exception("Network selection timed out")
1515 dev[0].dump_monitor()
1517 logger.info("Verify disallow_aps ssid")
1518 dev[0].request("SET disallow_aps ssid 746573742d68733230")
1519 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1520 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1522 raise Exception("Network selection timed out")
1523 dev[0].dump_monitor()
1525 logger.info("Verify disallow_aps clear")
1526 dev[0].request("SET disallow_aps ")
1527 interworking_select(dev[0], bssid, "home", freq="2412")
1529 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1530 ret = dev[0].request("INTERWORKING_CONNECT " + bssid)
1531 if "FAIL" not in ret:
1532 raise Exception("INTERWORKING_CONNECT to disallowed BSS not rejected")
1534 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT foo"):
1535 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1536 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT 00:11:22:33:44:55"):
1537 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1539 def policy_test(dev, ap, values, only_one=True):
1542 logger.info("Verify network selection to AP " + ap['ifname'])
1544 dev.scan_for_bss(bssid, freq="2412")
1546 logger.info("Verify network selection")
1549 id = dev.add_cred_values(values)
1550 dev.request("INTERWORKING_SELECT auto freq=2412")
1553 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH",
1554 "INTERWORKING-BLACKLISTED",
1555 "INTERWORKING-SELECTED"], timeout=15)
1557 raise Exception("Network selection timed out")
1559 if "INTERWORKING-NO-MATCH" in ev:
1560 raise Exception("Matching AP not found")
1561 if bssid and only_one and "INTERWORKING-AP" in ev and bssid not in ev:
1562 raise Exception("Unexpected AP claimed acceptable")
1563 if "INTERWORKING-SELECTED" in ev:
1564 if bssid and bssid not in ev:
1565 raise Exception("Selected incorrect BSS")
1568 ev = dev.wait_connected(timeout=15)
1569 if bssid and bssid not in ev:
1570 raise Exception("Connected to incorrect BSS")
1572 conn_bssid = dev.get_status_field("bssid")
1573 if bssid and conn_bssid != bssid:
1574 raise Exception("bssid information points to incorrect BSS")
1580 def default_cred(domain=None, user="hs20-test"):
1581 cred = { 'realm': "example.com",
1582 'ca_cert': "auth_serv/ca.pem",
1584 'password': "password" }
1586 cred['domain'] = domain
1589 def test_ap_hs20_prefer_home(dev, apdev):
1590 """Hotspot 2.0 required roaming consortium"""
1591 check_eap_capa(dev[0], "MSCHAPV2")
1592 params = hs20_ap_params()
1593 params['domain_name'] = "example.org"
1594 hostapd.add_ap(apdev[0], params)
1596 params = hs20_ap_params()
1597 params['ssid'] = "test-hs20-other"
1598 params['domain_name'] = "example.com"
1599 hostapd.add_ap(apdev[1], params)
1601 values = default_cred()
1602 values['domain'] = "example.com"
1603 policy_test(dev[0], apdev[1], values, only_one=False)
1604 values['domain'] = "example.org"
1605 policy_test(dev[0], apdev[0], values, only_one=False)
1607 def test_ap_hs20_req_roaming_consortium(dev, apdev):
1608 """Hotspot 2.0 required roaming consortium"""
1609 check_eap_capa(dev[0], "MSCHAPV2")
1610 params = hs20_ap_params()
1611 hostapd.add_ap(apdev[0], params)
1613 params = hs20_ap_params()
1614 params['ssid'] = "test-hs20-other"
1615 params['roaming_consortium'] = [ "223344" ]
1616 hostapd.add_ap(apdev[1], params)
1618 values = default_cred()
1619 values['required_roaming_consortium'] = "223344"
1620 policy_test(dev[0], apdev[1], values)
1621 values['required_roaming_consortium'] = "112233"
1622 policy_test(dev[0], apdev[0], values)
1624 id = dev[0].add_cred()
1625 dev[0].set_cred(id, "required_roaming_consortium", "112233")
1626 dev[0].set_cred(id, "required_roaming_consortium", "112233445566778899aabbccddeeff")
1628 for val in [ "", "1", "11", "1122", "1122334", "112233445566778899aabbccddeeff00" ]:
1629 if "FAIL" not in dev[0].request('SET_CRED {} required_roaming_consortium {}'.format(id, val)):
1630 raise Exception("Invalid roaming consortium value accepted: " + val)
1632 def test_ap_hs20_req_roaming_consortium_no_match(dev, apdev):
1633 """Hotspot 2.0 required roaming consortium and no match"""
1634 check_eap_capa(dev[0], "MSCHAPV2")
1635 params = hs20_ap_params()
1636 del params['roaming_consortium']
1637 hostapd.add_ap(apdev[0], params)
1639 params = hs20_ap_params()
1640 params['ssid'] = "test-hs20-other"
1641 params['roaming_consortium'] = [ "223345" ]
1642 hostapd.add_ap(apdev[1], params)
1644 values = default_cred()
1645 values['required_roaming_consortium'] = "223344"
1646 dev[0].hs20_enable()
1647 id = dev[0].add_cred_values(values)
1648 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1649 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=10)
1651 raise Exception("INTERWORKING-NO-MATCH not reported")
1653 def test_ap_hs20_excluded_ssid(dev, apdev):
1654 """Hotspot 2.0 exclusion based on SSID"""
1655 check_eap_capa(dev[0], "MSCHAPV2")
1656 params = hs20_ap_params()
1657 params['roaming_consortium'] = [ "223344" ]
1658 params['anqp_3gpp_cell_net'] = "555,444"
1659 hostapd.add_ap(apdev[0], params)
1661 params = hs20_ap_params()
1662 params['ssid'] = "test-hs20-other"
1663 params['roaming_consortium'] = [ "223344" ]
1664 params['anqp_3gpp_cell_net'] = "555,444"
1665 hostapd.add_ap(apdev[1], params)
1667 values = default_cred()
1668 values['excluded_ssid'] = "test-hs20"
1669 events = policy_test(dev[0], apdev[1], values)
1670 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1672 raise Exception("Excluded network not reported")
1673 values['excluded_ssid'] = "test-hs20-other"
1674 events = policy_test(dev[0], apdev[0], values)
1675 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[1]['bssid'] in e]
1677 raise Exception("Excluded network not reported")
1679 values = default_cred()
1680 values['roaming_consortium'] = "223344"
1681 values['eap'] = "TTLS"
1682 values['phase2'] = "auth=MSCHAPV2"
1683 values['excluded_ssid'] = "test-hs20"
1684 events = policy_test(dev[0], apdev[1], values)
1685 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1687 raise Exception("Excluded network not reported")
1689 values = { 'imsi': "555444-333222111", 'eap': "SIM",
1690 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1691 'excluded_ssid': "test-hs20" }
1692 events = policy_test(dev[0], apdev[1], values)
1693 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1695 raise Exception("Excluded network not reported")
1697 def test_ap_hs20_roam_to_higher_prio(dev, apdev):
1698 """Hotspot 2.0 and roaming from current to higher priority network"""
1699 check_eap_capa(dev[0], "MSCHAPV2")
1700 bssid = apdev[0]['bssid']
1701 params = hs20_ap_params(ssid="test-hs20-visited")
1702 params['domain_name'] = "visited.example.org"
1703 hostapd.add_ap(apdev[0], params)
1705 dev[0].hs20_enable()
1706 id = dev[0].add_cred_values({ 'realm': "example.com",
1707 'ca_cert': "auth_serv/ca.pem",
1708 'username': "hs20-test",
1709 'password': "password",
1710 'domain': "example.com" })
1711 logger.info("Connect to the only network option")
1712 interworking_select(dev[0], bssid, "roaming", freq="2412")
1713 dev[0].dump_monitor()
1714 interworking_connect(dev[0], bssid, "TTLS")
1716 logger.info("Start another AP (home operator) and reconnect")
1717 bssid2 = apdev[1]['bssid']
1718 params = hs20_ap_params(ssid="test-hs20-home")
1719 params['domain_name'] = "example.com"
1720 hostapd.add_ap(apdev[1], params)
1722 dev[0].scan_for_bss(bssid2, freq="2412", force_scan=True)
1723 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1724 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1725 "INTERWORKING-ALREADY-CONNECTED",
1726 "CTRL-EVENT-CONNECTED"], timeout=15)
1728 raise Exception("Connection timed out")
1729 if "INTERWORKING-NO-MATCH" in ev:
1730 raise Exception("Matching AP not found")
1731 if "INTERWORKING-ALREADY-CONNECTED" in ev:
1732 raise Exception("Unexpected AP selected")
1733 if bssid2 not in ev:
1734 raise Exception("Unexpected BSSID after reconnection")
1736 def test_ap_hs20_domain_suffix_match_full(dev, apdev):
1737 """Hotspot 2.0 and domain_suffix_match"""
1738 check_domain_match_full(dev[0])
1739 check_eap_capa(dev[0], "MSCHAPV2")
1740 bssid = apdev[0]['bssid']
1741 params = hs20_ap_params()
1742 hostapd.add_ap(apdev[0], params)
1744 dev[0].hs20_enable()
1745 id = dev[0].add_cred_values({ 'realm': "example.com",
1746 'username': "hs20-test",
1747 'password': "password",
1748 'ca_cert': "auth_serv/ca.pem",
1749 'domain': "example.com",
1750 'domain_suffix_match': "server.w1.fi" })
1751 interworking_select(dev[0], bssid, "home", freq="2412")
1752 dev[0].dump_monitor()
1753 interworking_connect(dev[0], bssid, "TTLS")
1754 dev[0].request("REMOVE_NETWORK all")
1755 dev[0].dump_monitor()
1757 dev[0].set_cred_quoted(id, "domain_suffix_match", "no-match.example.com")
1758 interworking_select(dev[0], bssid, "home", freq="2412")
1759 dev[0].dump_monitor()
1760 dev[0].request("INTERWORKING_CONNECT " + bssid)
1761 ev = dev[0].wait_event(["CTRL-EVENT-EAP-TLS-CERT-ERROR"])
1763 raise Exception("TLS certificate error not reported")
1764 if "Domain suffix mismatch" not in ev:
1765 raise Exception("Domain suffix mismatch not reported")
1767 def test_ap_hs20_domain_suffix_match(dev, apdev):
1768 """Hotspot 2.0 and domain_suffix_match"""
1769 check_eap_capa(dev[0], "MSCHAPV2")
1770 check_domain_match_full(dev[0])
1771 bssid = apdev[0]['bssid']
1772 params = hs20_ap_params()
1773 hostapd.add_ap(apdev[0], params)
1775 dev[0].hs20_enable()
1776 id = dev[0].add_cred_values({ 'realm': "example.com",
1777 'username': "hs20-test",
1778 'password': "password",
1779 'ca_cert': "auth_serv/ca.pem",
1780 'domain': "example.com",
1781 'domain_suffix_match': "w1.fi" })
1782 interworking_select(dev[0], bssid, "home", freq="2412")
1783 dev[0].dump_monitor()
1784 interworking_connect(dev[0], bssid, "TTLS")
1786 def test_ap_hs20_roaming_partner_preference(dev, apdev):
1787 """Hotspot 2.0 and roaming partner preference"""
1788 check_eap_capa(dev[0], "MSCHAPV2")
1789 params = hs20_ap_params()
1790 params['domain_name'] = "roaming.example.org"
1791 hostapd.add_ap(apdev[0], params)
1793 params = hs20_ap_params()
1794 params['ssid'] = "test-hs20-other"
1795 params['domain_name'] = "roaming.example.net"
1796 hostapd.add_ap(apdev[1], params)
1798 logger.info("Verify default vs. specified preference")
1799 values = default_cred()
1800 values['roaming_partner'] = "roaming.example.net,1,127,*"
1801 policy_test(dev[0], apdev[1], values, only_one=False)
1802 values['roaming_partner'] = "roaming.example.net,1,129,*"
1803 policy_test(dev[0], apdev[0], values, only_one=False)
1805 logger.info("Verify partial FQDN match")
1806 values['roaming_partner'] = "example.net,0,0,*"
1807 policy_test(dev[0], apdev[1], values, only_one=False)
1808 values['roaming_partner'] = "example.net,0,255,*"
1809 policy_test(dev[0], apdev[0], values, only_one=False)
1811 def test_ap_hs20_max_bss_load(dev, apdev):
1812 """Hotspot 2.0 and maximum BSS load"""
1813 check_eap_capa(dev[0], "MSCHAPV2")
1814 params = hs20_ap_params()
1815 params['bss_load_test'] = "12:200:20000"
1816 hostapd.add_ap(apdev[0], params)
1818 params = hs20_ap_params()
1819 params['ssid'] = "test-hs20-other"
1820 params['bss_load_test'] = "5:20:10000"
1821 hostapd.add_ap(apdev[1], params)
1823 logger.info("Verify maximum BSS load constraint")
1824 values = default_cred()
1825 values['domain'] = "example.com"
1826 values['max_bss_load'] = "100"
1827 events = policy_test(dev[0], apdev[1], values, only_one=False)
1829 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1830 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1831 raise Exception("Maximum BSS Load case not noticed")
1832 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1833 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1834 raise Exception("Maximum BSS Load case reported incorrectly")
1836 logger.info("Verify maximum BSS load does not prevent connection")
1837 values['max_bss_load'] = "1"
1838 events = policy_test(dev[0], None, values)
1840 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1841 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1842 raise Exception("Maximum BSS Load case not noticed")
1843 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1844 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1845 raise Exception("Maximum BSS Load case not noticed")
1847 def test_ap_hs20_max_bss_load2(dev, apdev):
1848 """Hotspot 2.0 and maximum BSS load with one AP not advertising"""
1849 check_eap_capa(dev[0], "MSCHAPV2")
1850 params = hs20_ap_params()
1851 params['bss_load_test'] = "12:200:20000"
1852 hostapd.add_ap(apdev[0], params)
1854 params = hs20_ap_params()
1855 params['ssid'] = "test-hs20-other"
1856 hostapd.add_ap(apdev[1], params)
1858 logger.info("Verify maximum BSS load constraint with AP advertisement")
1859 values = default_cred()
1860 values['domain'] = "example.com"
1861 values['max_bss_load'] = "100"
1862 events = policy_test(dev[0], apdev[1], values, only_one=False)
1864 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1865 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1866 raise Exception("Maximum BSS Load case not noticed")
1867 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1868 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1869 raise Exception("Maximum BSS Load case reported incorrectly")
1871 def test_ap_hs20_max_bss_load_roaming(dev, apdev):
1872 """Hotspot 2.0 and maximum BSS load (roaming)"""
1873 check_eap_capa(dev[0], "MSCHAPV2")
1874 params = hs20_ap_params()
1875 params['bss_load_test'] = "12:200:20000"
1876 hostapd.add_ap(apdev[0], params)
1878 values = default_cred()
1879 values['domain'] = "roaming.example.com"
1880 values['max_bss_load'] = "100"
1881 events = policy_test(dev[0], apdev[0], values, only_one=True)
1882 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1884 raise Exception("No INTERWORKING-AP event")
1885 if "over_max_bss_load=1" in ev[0]:
1886 raise Exception("Maximum BSS Load reported for roaming")
1888 def test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1889 """Hotspot 2.0 multi-cred sp_priority"""
1890 check_eap_capa(dev[0], "MSCHAPV2")
1892 _test_ap_hs20_multi_cred_sp_prio(dev, apdev)
1894 dev[0].request("SET external_sim 0")
1896 def _test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1897 hlr_auc_gw_available()
1898 bssid = apdev[0]['bssid']
1899 params = hs20_ap_params()
1900 params['hessid'] = bssid
1901 del params['domain_name']
1902 params['anqp_3gpp_cell_net'] = "232,01"
1903 hostapd.add_ap(apdev[0], params)
1905 dev[0].hs20_enable()
1906 dev[0].scan_for_bss(bssid, freq="2412")
1907 dev[0].request("SET external_sim 1")
1908 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1909 'provisioning_sp': "example.com",
1910 'sp_priority' :"1" })
1911 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1912 'ca_cert': "auth_serv/ca.pem",
1913 'username': "hs20-test",
1914 'password': "password",
1915 'domain': "example.com",
1916 'provisioning_sp': "example.com",
1917 'sp_priority': "2" })
1918 dev[0].dump_monitor()
1919 dev[0].scan_for_bss(bssid, freq="2412")
1920 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1921 interworking_ext_sim_auth(dev[0], "SIM")
1922 check_sp_type(dev[0], "unknown")
1923 dev[0].request("REMOVE_NETWORK all")
1925 dev[0].set_cred(id1, "sp_priority", "2")
1926 dev[0].set_cred(id2, "sp_priority", "1")
1927 dev[0].dump_monitor()
1928 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1929 interworking_auth(dev[0], "TTLS")
1930 check_sp_type(dev[0], "unknown")
1932 def test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1933 """Hotspot 2.0 multi-cred sp_priority with two BSSes"""
1934 check_eap_capa(dev[0], "MSCHAPV2")
1936 _test_ap_hs20_multi_cred_sp_prio2(dev, apdev)
1938 dev[0].request("SET external_sim 0")
1940 def _test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1941 hlr_auc_gw_available()
1942 bssid = apdev[0]['bssid']
1943 params = hs20_ap_params()
1944 params['hessid'] = bssid
1945 del params['nai_realm']
1946 del params['domain_name']
1947 params['anqp_3gpp_cell_net'] = "232,01"
1948 hostapd.add_ap(apdev[0], params)
1950 bssid2 = apdev[1]['bssid']
1951 params = hs20_ap_params()
1952 params['ssid'] = "test-hs20-other"
1953 params['hessid'] = bssid2
1954 del params['domain_name']
1955 del params['anqp_3gpp_cell_net']
1956 hostapd.add_ap(apdev[1], params)
1958 dev[0].hs20_enable()
1959 dev[0].request("SET external_sim 1")
1960 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1961 'provisioning_sp': "example.com",
1962 'sp_priority': "1" })
1963 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1964 'ca_cert': "auth_serv/ca.pem",
1965 'username': "hs20-test",
1966 'password': "password",
1967 'domain': "example.com",
1968 'provisioning_sp': "example.com",
1969 'sp_priority': "2" })
1970 dev[0].dump_monitor()
1971 dev[0].scan_for_bss(bssid, freq="2412")
1972 dev[0].scan_for_bss(bssid2, freq="2412")
1973 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1974 interworking_ext_sim_auth(dev[0], "SIM")
1975 check_sp_type(dev[0], "unknown")
1976 conn_bssid = dev[0].get_status_field("bssid")
1977 if conn_bssid != bssid:
1978 raise Exception("Connected to incorrect BSS")
1979 dev[0].request("REMOVE_NETWORK all")
1981 dev[0].set_cred(id1, "sp_priority", "2")
1982 dev[0].set_cred(id2, "sp_priority", "1")
1983 dev[0].dump_monitor()
1984 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1985 interworking_auth(dev[0], "TTLS")
1986 check_sp_type(dev[0], "unknown")
1987 conn_bssid = dev[0].get_status_field("bssid")
1988 if conn_bssid != bssid2:
1989 raise Exception("Connected to incorrect BSS")
1991 def test_ap_hs20_multi_cred_sp_prio_same(dev, apdev):
1992 """Hotspot 2.0 multi-cred and same sp_priority"""
1993 check_eap_capa(dev[0], "MSCHAPV2")
1994 hlr_auc_gw_available()
1995 bssid = apdev[0]['bssid']
1996 params = hs20_ap_params()
1997 params['hessid'] = bssid
1998 del params['domain_name']
1999 params['anqp_3gpp_cell_net'] = "232,01"
2000 hostapd.add_ap(apdev[0], params)
2002 dev[0].hs20_enable()
2003 dev[0].scan_for_bss(bssid, freq="2412")
2004 id1 = dev[0].add_cred_values({ 'realm': "example.com",
2005 'ca_cert': "auth_serv/ca.pem",
2006 'username': "hs20-test",
2007 'password': "password",
2008 'domain': "domain1.example.com",
2009 'provisioning_sp': "example.com",
2010 'sp_priority': "1" })
2011 id2 = dev[0].add_cred_values({ 'realm': "example.com",
2012 'ca_cert': "auth_serv/ca.pem",
2013 'username': "hs20-test",
2014 'password': "password",
2015 'domain': "domain2.example.com",
2016 'provisioning_sp': "example.com",
2017 'sp_priority': "1" })
2018 dev[0].dump_monitor()
2019 dev[0].scan_for_bss(bssid, freq="2412")
2020 check_auto_select(dev[0], bssid)
2022 def check_conn_capab_selection(dev, type, missing):
2023 dev.request("INTERWORKING_SELECT freq=2412")
2024 ev = dev.wait_event(["INTERWORKING-AP"])
2026 raise Exception("Network selection timed out")
2027 if "type=" + type not in ev:
2028 raise Exception("Unexpected network type")
2029 if missing and "conn_capab_missing=1" not in ev:
2030 raise Exception("conn_capab_missing not reported")
2031 if not missing and "conn_capab_missing=1" in ev:
2032 raise Exception("conn_capab_missing reported unexpectedly")
2034 def conn_capab_cred(domain=None, req_conn_capab=None):
2035 cred = default_cred(domain=domain)
2037 cred['req_conn_capab'] = req_conn_capab
2040 def test_ap_hs20_req_conn_capab(dev, apdev):
2041 """Hotspot 2.0 network selection with req_conn_capab"""
2042 check_eap_capa(dev[0], "MSCHAPV2")
2043 bssid = apdev[0]['bssid']
2044 params = hs20_ap_params()
2045 hostapd.add_ap(apdev[0], params)
2047 dev[0].hs20_enable()
2048 dev[0].scan_for_bss(bssid, freq="2412")
2049 logger.info("Not used in home network")
2050 values = conn_capab_cred(domain="example.com", req_conn_capab="6:1234")
2051 id = dev[0].add_cred_values(values)
2052 check_conn_capab_selection(dev[0], "home", False)
2054 logger.info("Used in roaming network")
2055 dev[0].remove_cred(id)
2056 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
2057 id = dev[0].add_cred_values(values)
2058 check_conn_capab_selection(dev[0], "roaming", True)
2060 logger.info("Verify that req_conn_capab does not prevent connection if no other network is available")
2061 check_auto_select(dev[0], bssid)
2063 logger.info("Additional req_conn_capab checks")
2065 dev[0].remove_cred(id)
2066 values = conn_capab_cred(domain="example.org", req_conn_capab="1:0")
2067 id = dev[0].add_cred_values(values)
2068 check_conn_capab_selection(dev[0], "roaming", True)
2070 dev[0].remove_cred(id)
2071 values = conn_capab_cred(domain="example.org", req_conn_capab="17:5060")
2072 id = dev[0].add_cred_values(values)
2073 check_conn_capab_selection(dev[0], "roaming", True)
2075 bssid2 = apdev[1]['bssid']
2076 params = hs20_ap_params(ssid="test-hs20b")
2077 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
2078 hostapd.add_ap(apdev[1], params)
2080 dev[0].remove_cred(id)
2081 values = conn_capab_cred(domain="example.org", req_conn_capab="50")
2082 id = dev[0].add_cred_values(values)
2083 dev[0].set_cred(id, "req_conn_capab", "6:22")
2084 dev[0].scan_for_bss(bssid2, freq="2412")
2085 dev[0].request("INTERWORKING_SELECT freq=2412")
2086 for i in range(0, 2):
2087 ev = dev[0].wait_event(["INTERWORKING-AP"])
2089 raise Exception("Network selection timed out")
2090 if bssid in ev and "conn_capab_missing=1" not in ev:
2091 raise Exception("Missing protocol connection capability not reported")
2092 if bssid2 in ev and "conn_capab_missing=1" in ev:
2093 raise Exception("Protocol connection capability not reported correctly")
2095 def test_ap_hs20_req_conn_capab2(dev, apdev):
2096 """Hotspot 2.0 network selection with req_conn_capab (not present)"""
2097 check_eap_capa(dev[0], "MSCHAPV2")
2098 bssid = apdev[0]['bssid']
2099 params = hs20_ap_params()
2100 del params['hs20_conn_capab']
2101 hostapd.add_ap(apdev[0], params)
2103 dev[0].hs20_enable()
2104 dev[0].scan_for_bss(bssid, freq="2412")
2105 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
2106 id = dev[0].add_cred_values(values)
2107 check_conn_capab_selection(dev[0], "roaming", False)
2109 def test_ap_hs20_req_conn_capab_and_roaming_partner_preference(dev, apdev):
2110 """Hotspot 2.0 and req_conn_capab with roaming partner preference"""
2111 check_eap_capa(dev[0], "MSCHAPV2")
2112 bssid = apdev[0]['bssid']
2113 params = hs20_ap_params()
2114 params['domain_name'] = "roaming.example.org"
2115 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
2116 hostapd.add_ap(apdev[0], params)
2118 bssid2 = apdev[1]['bssid']
2119 params = hs20_ap_params(ssid="test-hs20-b")
2120 params['domain_name'] = "roaming.example.net"
2121 hostapd.add_ap(apdev[1], params)
2123 values = default_cred()
2124 values['roaming_partner'] = "roaming.example.net,1,127,*"
2125 id = dev[0].add_cred_values(values)
2126 check_auto_select(dev[0], bssid2)
2128 dev[0].set_cred(id, "req_conn_capab", "50")
2129 check_auto_select(dev[0], bssid)
2131 dev[0].remove_cred(id)
2132 id = dev[0].add_cred_values(values)
2133 dev[0].set_cred(id, "req_conn_capab", "51")
2134 check_auto_select(dev[0], bssid2)
2136 def check_bandwidth_selection(dev, type, below):
2137 dev.request("INTERWORKING_SELECT freq=2412")
2138 ev = dev.wait_event(["INTERWORKING-AP"])
2140 raise Exception("Network selection timed out")
2141 logger.debug("BSS entries:\n" + dev.request("BSS RANGE=ALL"))
2142 if "type=" + type not in ev:
2143 raise Exception("Unexpected network type")
2144 if below and "below_min_backhaul=1" not in ev:
2145 raise Exception("below_min_backhaul not reported")
2146 if not below and "below_min_backhaul=1" in ev:
2147 raise Exception("below_min_backhaul reported unexpectedly")
2149 def bw_cred(domain=None, dl_home=None, ul_home=None, dl_roaming=None, ul_roaming=None):
2150 cred = default_cred(domain=domain)
2152 cred['min_dl_bandwidth_home'] = str(dl_home)
2154 cred['min_ul_bandwidth_home'] = str(ul_home)
2156 cred['min_dl_bandwidth_roaming'] = str(dl_roaming)
2158 cred['min_ul_bandwidth_roaming'] = str(ul_roaming)
2161 def test_ap_hs20_min_bandwidth_home(dev, apdev):
2162 """Hotspot 2.0 network selection with min bandwidth (home)"""
2163 check_eap_capa(dev[0], "MSCHAPV2")
2164 bssid = apdev[0]['bssid']
2165 params = hs20_ap_params()
2166 hostapd.add_ap(apdev[0], params)
2168 dev[0].hs20_enable()
2169 dev[0].scan_for_bss(bssid, freq="2412")
2170 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2171 id = dev[0].add_cred_values(values)
2172 check_bandwidth_selection(dev[0], "home", False)
2173 dev[0].remove_cred(id)
2175 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
2176 id = dev[0].add_cred_values(values)
2177 check_bandwidth_selection(dev[0], "home", True)
2178 dev[0].remove_cred(id)
2180 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
2181 id = dev[0].add_cred_values(values)
2182 check_bandwidth_selection(dev[0], "home", True)
2183 dev[0].remove_cred(id)
2185 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
2186 id = dev[0].add_cred_values(values)
2187 check_bandwidth_selection(dev[0], "home", True)
2188 check_auto_select(dev[0], bssid)
2190 bssid2 = apdev[1]['bssid']
2191 params = hs20_ap_params(ssid="test-hs20-b")
2192 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2193 hostapd.add_ap(apdev[1], params)
2195 check_auto_select(dev[0], bssid2)
2197 def test_ap_hs20_min_bandwidth_home2(dev, apdev):
2198 """Hotspot 2.0 network selection with min bandwidth - special cases"""
2199 check_eap_capa(dev[0], "MSCHAPV2")
2200 bssid = apdev[0]['bssid']
2201 params = hs20_ap_params()
2202 hapd = hostapd.add_ap(apdev[0], params)
2204 dev[0].hs20_enable()
2205 dev[0].scan_for_bss(bssid, freq="2412")
2206 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2207 id = dev[0].add_cred_values(values)
2208 check_bandwidth_selection(dev[0], "home", False)
2210 logger.info("WAN link at capacity")
2211 hapd.set('hs20_wan_metrics', "09:8000:1000:80:240:3000")
2212 check_bandwidth_selection(dev[0], "home", True)
2214 logger.info("Downlink/Uplink Load was not measured")
2215 hapd.set('hs20_wan_metrics', "01:8000:1000:80:240:0")
2216 check_bandwidth_selection(dev[0], "home", False)
2218 logger.info("Uplink and Downlink max values")
2219 hapd.set('hs20_wan_metrics', "01:4294967295:4294967295:80:240:3000")
2220 check_bandwidth_selection(dev[0], "home", False)
2222 dev[0].remove_cred(id)
2224 def test_ap_hs20_min_bandwidth_home_hidden_ssid_in_scan_res(dev, apdev):
2225 """Hotspot 2.0 network selection with min bandwidth (home) while hidden SSID is included in scan results"""
2226 check_eap_capa(dev[0], "MSCHAPV2")
2227 bssid = apdev[0]['bssid']
2229 hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret',
2230 "ignore_broadcast_ssid": "1" })
2231 dev[0].scan_for_bss(bssid, freq=2412)
2233 hapd_global = hostapd.HostapdGlobal(apdev[0])
2235 hapd_global.remove(apdev[0]['ifname'])
2237 params = hs20_ap_params()
2238 hostapd.add_ap(apdev[0], params)
2240 dev[0].hs20_enable()
2241 dev[0].scan_for_bss(bssid, freq="2412")
2242 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2243 id = dev[0].add_cred_values(values)
2244 check_bandwidth_selection(dev[0], "home", False)
2245 dev[0].remove_cred(id)
2247 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
2248 id = dev[0].add_cred_values(values)
2249 check_bandwidth_selection(dev[0], "home", True)
2250 dev[0].remove_cred(id)
2252 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
2253 id = dev[0].add_cred_values(values)
2254 check_bandwidth_selection(dev[0], "home", True)
2255 dev[0].remove_cred(id)
2257 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
2258 id = dev[0].add_cred_values(values)
2259 check_bandwidth_selection(dev[0], "home", True)
2260 check_auto_select(dev[0], bssid)
2262 bssid2 = apdev[1]['bssid']
2263 params = hs20_ap_params(ssid="test-hs20-b")
2264 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2265 hostapd.add_ap(apdev[1], params)
2267 check_auto_select(dev[0], bssid2)
2269 dev[0].flush_scan_cache()
2271 def test_ap_hs20_min_bandwidth_roaming(dev, apdev):
2272 """Hotspot 2.0 network selection with min bandwidth (roaming)"""
2273 check_eap_capa(dev[0], "MSCHAPV2")
2274 bssid = apdev[0]['bssid']
2275 params = hs20_ap_params()
2276 hostapd.add_ap(apdev[0], params)
2278 dev[0].hs20_enable()
2279 dev[0].scan_for_bss(bssid, freq="2412")
2280 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=58)
2281 id = dev[0].add_cred_values(values)
2282 check_bandwidth_selection(dev[0], "roaming", False)
2283 dev[0].remove_cred(id)
2285 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=58)
2286 id = dev[0].add_cred_values(values)
2287 check_bandwidth_selection(dev[0], "roaming", True)
2288 dev[0].remove_cred(id)
2290 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=59)
2291 id = dev[0].add_cred_values(values)
2292 check_bandwidth_selection(dev[0], "roaming", True)
2293 dev[0].remove_cred(id)
2295 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=59)
2296 id = dev[0].add_cred_values(values)
2297 check_bandwidth_selection(dev[0], "roaming", True)
2298 check_auto_select(dev[0], bssid)
2300 bssid2 = apdev[1]['bssid']
2301 params = hs20_ap_params(ssid="test-hs20-b")
2302 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2303 hostapd.add_ap(apdev[1], params)
2305 check_auto_select(dev[0], bssid2)
2307 def test_ap_hs20_min_bandwidth_and_roaming_partner_preference(dev, apdev):
2308 """Hotspot 2.0 and minimum bandwidth with roaming partner preference"""
2309 check_eap_capa(dev[0], "MSCHAPV2")
2310 bssid = apdev[0]['bssid']
2311 params = hs20_ap_params()
2312 params['domain_name'] = "roaming.example.org"
2313 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2314 hostapd.add_ap(apdev[0], params)
2316 bssid2 = apdev[1]['bssid']
2317 params = hs20_ap_params(ssid="test-hs20-b")
2318 params['domain_name'] = "roaming.example.net"
2319 hostapd.add_ap(apdev[1], params)
2321 values = default_cred()
2322 values['roaming_partner'] = "roaming.example.net,1,127,*"
2323 id = dev[0].add_cred_values(values)
2324 check_auto_select(dev[0], bssid2)
2326 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "6000")
2327 check_auto_select(dev[0], bssid)
2329 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "10000")
2330 check_auto_select(dev[0], bssid2)
2332 def test_ap_hs20_min_bandwidth_no_wan_metrics(dev, apdev):
2333 """Hotspot 2.0 network selection with min bandwidth but no WAN Metrics"""
2334 bssid = apdev[0]['bssid']
2335 params = hs20_ap_params()
2336 del params['hs20_wan_metrics']
2337 hostapd.add_ap(apdev[0], params)
2339 dev[0].hs20_enable()
2340 dev[0].scan_for_bss(bssid, freq="2412")
2341 values = bw_cred(domain="example.com", dl_home=10000, ul_home=10000,
2342 dl_roaming=10000, ul_roaming=10000)
2343 dev[0].add_cred_values(values)
2344 check_bandwidth_selection(dev[0], "home", False)
2346 def test_ap_hs20_deauth_req_ess(dev, apdev):
2347 """Hotspot 2.0 connection and deauthentication request for ESS"""
2348 check_eap_capa(dev[0], "MSCHAPV2")
2350 _test_ap_hs20_deauth_req_ess(dev, apdev)
2352 dev[0].request("SET pmf 0")
2354 def _test_ap_hs20_deauth_req_ess(dev, apdev):
2355 dev[0].request("SET pmf 2")
2356 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2357 dev[0].dump_monitor()
2358 addr = dev[0].p2p_interface_addr()
2359 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2360 hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
2361 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
2363 raise Exception("Timeout on deauth imminent notice")
2364 if "1 120 http://example.com/" not in ev:
2365 raise Exception("Unexpected deauth imminent notice: " + ev)
2366 hapd.request("DEAUTHENTICATE " + addr)
2367 dev[0].wait_disconnected(timeout=10)
2368 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
2369 raise Exception("Network not marked temporarily disabled")
2370 ev = dev[0].wait_event(["SME: Trying to authenticate",
2371 "Trying to associate",
2372 "CTRL-EVENT-CONNECTED"], timeout=5)
2374 raise Exception("Unexpected connection attempt")
2376 def test_ap_hs20_deauth_req_bss(dev, apdev):
2377 """Hotspot 2.0 connection and deauthentication request for BSS"""
2378 check_eap_capa(dev[0], "MSCHAPV2")
2380 _test_ap_hs20_deauth_req_bss(dev, apdev)
2382 dev[0].request("SET pmf 0")
2384 def _test_ap_hs20_deauth_req_bss(dev, apdev):
2385 dev[0].request("SET pmf 2")
2386 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2387 dev[0].dump_monitor()
2388 addr = dev[0].p2p_interface_addr()
2389 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2390 hapd.request("HS20_DEAUTH_REQ " + addr + " 0 120 http://example.com/")
2391 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
2393 raise Exception("Timeout on deauth imminent notice")
2394 if "0 120 http://example.com/" not in ev:
2395 raise Exception("Unexpected deauth imminent notice: " + ev)
2396 hapd.request("DEAUTHENTICATE " + addr + " reason=4")
2397 ev = dev[0].wait_disconnected(timeout=10)
2398 if "reason=4" not in ev:
2399 raise Exception("Unexpected disconnection reason")
2400 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
2401 raise Exception("Network not marked temporarily disabled")
2402 ev = dev[0].wait_event(["SME: Trying to authenticate",
2403 "Trying to associate",
2404 "CTRL-EVENT-CONNECTED"], timeout=5)
2406 raise Exception("Unexpected connection attempt")
2408 def test_ap_hs20_deauth_req_from_radius(dev, apdev):
2409 """Hotspot 2.0 connection and deauthentication request from RADIUS"""
2410 check_eap_capa(dev[0], "MSCHAPV2")
2412 _test_ap_hs20_deauth_req_from_radius(dev, apdev)
2414 dev[0].request("SET pmf 0")
2416 def _test_ap_hs20_deauth_req_from_radius(dev, apdev):
2417 bssid = apdev[0]['bssid']
2418 params = hs20_ap_params()
2419 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2420 params['hs20_deauth_req_timeout'] = "2"
2421 hostapd.add_ap(apdev[0], params)
2423 dev[0].request("SET pmf 2")
2424 dev[0].hs20_enable()
2425 dev[0].add_cred_values({ 'realm': "example.com",
2426 'username': "hs20-deauth-test",
2427 'password': "password" })
2428 interworking_select(dev[0], bssid, freq="2412")
2429 interworking_connect(dev[0], bssid, "TTLS")
2430 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=5)
2432 raise Exception("Timeout on deauth imminent notice")
2433 if " 1 100" not in ev:
2434 raise Exception("Unexpected deauth imminent contents")
2435 dev[0].wait_disconnected(timeout=3)
2437 def test_ap_hs20_deauth_req_without_pmf(dev, apdev):
2438 """Hotspot 2.0 connection and deauthentication request without PMF"""
2439 check_eap_capa(dev[0], "MSCHAPV2")
2440 dev[0].request("SET pmf 0")
2441 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2442 dev[0].dump_monitor()
2443 addr = dev[0].own_addr()
2444 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2445 hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
2446 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=0.2)
2448 raise Exception("Deauth imminent notice without PMF accepted")
2450 def test_ap_hs20_remediation_required(dev, apdev):
2451 """Hotspot 2.0 connection and remediation required from RADIUS"""
2452 check_eap_capa(dev[0], "MSCHAPV2")
2454 _test_ap_hs20_remediation_required(dev, apdev)
2456 dev[0].request("SET pmf 0")
2458 def _test_ap_hs20_remediation_required(dev, apdev):
2459 bssid = apdev[0]['bssid']
2460 params = hs20_ap_params()
2461 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2462 hostapd.add_ap(apdev[0], params)
2464 dev[0].request("SET pmf 1")
2465 dev[0].hs20_enable()
2466 dev[0].add_cred_values({ 'realm': "example.com",
2467 'username': "hs20-subrem-test",
2468 'password': "password" })
2469 interworking_select(dev[0], bssid, freq="2412")
2470 interworking_connect(dev[0], bssid, "TTLS")
2471 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2473 raise Exception("Timeout on subscription remediation notice")
2474 if " 1 https://example.com/" not in ev:
2475 raise Exception("Unexpected subscription remediation event contents")
2477 def test_ap_hs20_remediation_required_ctrl(dev, apdev):
2478 """Hotspot 2.0 connection and subrem from ctrl_iface"""
2479 check_eap_capa(dev[0], "MSCHAPV2")
2481 _test_ap_hs20_remediation_required_ctrl(dev, apdev)
2483 dev[0].request("SET pmf 0")
2485 def _test_ap_hs20_remediation_required_ctrl(dev, apdev):
2486 bssid = apdev[0]['bssid']
2487 addr = dev[0].own_addr()
2488 params = hs20_ap_params()
2489 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2490 hapd = hostapd.add_ap(apdev[0], params)
2492 dev[0].request("SET pmf 1")
2493 dev[0].hs20_enable()
2494 dev[0].add_cred_values(default_cred())
2495 interworking_select(dev[0], bssid, freq="2412")
2496 interworking_connect(dev[0], bssid, "TTLS")
2498 hapd.request("HS20_WNM_NOTIF " + addr + " https://example.com/")
2499 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2501 raise Exception("Timeout on subscription remediation notice")
2502 if " 1 https://example.com/" not in ev:
2503 raise Exception("Unexpected subscription remediation event contents")
2505 hapd.request("HS20_WNM_NOTIF " + addr)
2506 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2508 raise Exception("Timeout on subscription remediation notice")
2509 if not ev.endswith("HS20-SUBSCRIPTION-REMEDIATION "):
2510 raise Exception("Unexpected subscription remediation event contents: " + ev)
2512 if "FAIL" not in hapd.request("HS20_WNM_NOTIF "):
2513 raise Exception("Unexpected HS20_WNM_NOTIF success")
2514 if "FAIL" not in hapd.request("HS20_WNM_NOTIF foo"):
2515 raise Exception("Unexpected HS20_WNM_NOTIF success")
2516 if "FAIL" not in hapd.request("HS20_WNM_NOTIF " + addr + " https://12345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678927.very.long.example.com/"):
2517 raise Exception("Unexpected HS20_WNM_NOTIF success")
2519 def test_ap_hs20_session_info(dev, apdev):
2520 """Hotspot 2.0 connection and session information from RADIUS"""
2521 check_eap_capa(dev[0], "MSCHAPV2")
2523 _test_ap_hs20_session_info(dev, apdev)
2525 dev[0].request("SET pmf 0")
2527 def _test_ap_hs20_session_info(dev, apdev):
2528 bssid = apdev[0]['bssid']
2529 params = hs20_ap_params()
2530 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2531 hostapd.add_ap(apdev[0], params)
2533 dev[0].request("SET pmf 1")
2534 dev[0].hs20_enable()
2535 dev[0].add_cred_values({ 'realm': "example.com",
2536 'username': "hs20-session-info-test",
2537 'password': "password" })
2538 interworking_select(dev[0], bssid, freq="2412")
2539 interworking_connect(dev[0], bssid, "TTLS")
2540 ev = dev[0].wait_event(["ESS-DISASSOC-IMMINENT"], timeout=10)
2542 raise Exception("Timeout on ESS disassociation imminent notice")
2543 if " 1 59904 https://example.com/" not in ev:
2544 raise Exception("Unexpected ESS disassociation imminent event contents")
2545 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"])
2547 raise Exception("Scan not started")
2548 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=30)
2550 raise Exception("Scan not completed")
2552 def test_ap_hs20_osen(dev, apdev):
2553 """Hotspot 2.0 OSEN connection"""
2554 params = { 'ssid': "osen",
2556 'auth_server_addr': "127.0.0.1",
2557 'auth_server_port': "1812",
2558 'auth_server_shared_secret': "radius" }
2559 hostapd.add_ap(apdev[0], params)
2561 dev[1].connect("osen", key_mgmt="NONE", scan_freq="2412",
2563 dev[2].connect("osen", key_mgmt="NONE", wep_key0='"hello"',
2564 scan_freq="2412", wait_connect=False)
2565 dev[0].flush_scan_cache()
2566 dev[0].connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
2567 group="GTK_NOT_USED",
2568 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
2569 ca_cert="auth_serv/ca.pem",
2571 res = dev[0].get_bss(apdev[0]['bssid'])['flags']
2572 if "[OSEN-OSEN-CCMP]" not in res:
2573 raise Exception("OSEN not reported in BSS")
2575 raise Exception("WEP reported in BSS")
2576 res = dev[0].request("SCAN_RESULTS")
2577 if "[OSEN-OSEN-CCMP]" not in res:
2578 raise Exception("OSEN not reported in SCAN_RESULTS")
2580 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
2581 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
2582 wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
2583 group="GTK_NOT_USED",
2584 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
2585 ca_cert="auth_serv/ca.pem",
2587 wpas.request("DISCONNECT")
2589 def test_ap_hs20_network_preference(dev, apdev):
2590 """Hotspot 2.0 network selection with preferred home network"""
2591 check_eap_capa(dev[0], "MSCHAPV2")
2592 bssid = apdev[0]['bssid']
2593 params = hs20_ap_params()
2594 hostapd.add_ap(apdev[0], params)
2596 dev[0].hs20_enable()
2597 values = { 'realm': "example.com",
2598 'username': "hs20-test",
2599 'password': "password",
2600 'domain': "example.com" }
2601 dev[0].add_cred_values(values)
2603 id = dev[0].add_network()
2604 dev[0].set_network_quoted(id, "ssid", "home")
2605 dev[0].set_network_quoted(id, "psk", "12345678")
2606 dev[0].set_network(id, "priority", "1")
2607 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2609 dev[0].scan_for_bss(bssid, freq="2412")
2610 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2611 ev = dev[0].wait_connected(timeout=15)
2613 raise Exception("Unexpected network selected")
2615 bssid2 = apdev[1]['bssid']
2616 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
2617 hostapd.add_ap(apdev[1], params)
2619 dev[0].scan_for_bss(bssid2, freq="2412")
2620 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2621 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2622 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2624 raise Exception("Connection timed out")
2625 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2626 raise Exception("No roam to higher priority network")
2627 if bssid2 not in ev:
2628 raise Exception("Unexpected network selected")
2630 def test_ap_hs20_network_preference2(dev, apdev):
2631 """Hotspot 2.0 network selection with preferred credential"""
2632 check_eap_capa(dev[0], "MSCHAPV2")
2633 bssid2 = apdev[1]['bssid']
2634 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
2635 hostapd.add_ap(apdev[1], params)
2637 dev[0].hs20_enable()
2638 values = { 'realm': "example.com",
2639 'username': "hs20-test",
2640 'password': "password",
2641 'domain': "example.com",
2643 dev[0].add_cred_values(values)
2645 id = dev[0].add_network()
2646 dev[0].set_network_quoted(id, "ssid", "home")
2647 dev[0].set_network_quoted(id, "psk", "12345678")
2648 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2650 dev[0].scan_for_bss(bssid2, freq="2412")
2651 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2652 ev = dev[0].wait_connected(timeout=15)
2653 if bssid2 not in ev:
2654 raise Exception("Unexpected network selected")
2656 bssid = apdev[0]['bssid']
2657 params = hs20_ap_params()
2658 hostapd.add_ap(apdev[0], params)
2660 dev[0].scan_for_bss(bssid, freq="2412")
2661 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2662 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2663 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2665 raise Exception("Connection timed out")
2666 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2667 raise Exception("No roam to higher priority network")
2669 raise Exception("Unexpected network selected")
2671 def test_ap_hs20_network_preference3(dev, apdev):
2672 """Hotspot 2.0 network selection with two credential (one preferred)"""
2673 check_eap_capa(dev[0], "MSCHAPV2")
2674 bssid = apdev[0]['bssid']
2675 params = hs20_ap_params()
2676 hostapd.add_ap(apdev[0], params)
2678 bssid2 = apdev[1]['bssid']
2679 params = hs20_ap_params(ssid="test-hs20b")
2680 params['nai_realm'] = "0,example.org,13[5:6],21[2:4][5:7]"
2681 hostapd.add_ap(apdev[1], params)
2683 dev[0].hs20_enable()
2684 values = { 'realm': "example.com",
2685 'username': "hs20-test",
2686 'password': "password",
2688 dev[0].add_cred_values(values)
2689 values = { 'realm': "example.org",
2690 'username': "hs20-test",
2691 'password': "password" }
2692 id = dev[0].add_cred_values(values)
2694 dev[0].scan_for_bss(bssid, freq="2412")
2695 dev[0].scan_for_bss(bssid2, freq="2412")
2696 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2697 ev = dev[0].wait_connected(timeout=15)
2699 raise Exception("Unexpected network selected")
2701 dev[0].set_cred(id, "priority", "2")
2702 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2703 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2704 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2706 raise Exception("Connection timed out")
2707 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2708 raise Exception("No roam to higher priority network")
2709 if bssid2 not in ev:
2710 raise Exception("Unexpected network selected")
2712 def test_ap_hs20_network_preference4(dev, apdev):
2713 """Hotspot 2.0 network selection with username vs. SIM credential"""
2714 check_eap_capa(dev[0], "MSCHAPV2")
2715 bssid = apdev[0]['bssid']
2716 params = hs20_ap_params()
2717 hostapd.add_ap(apdev[0], params)
2719 bssid2 = apdev[1]['bssid']
2720 params = hs20_ap_params(ssid="test-hs20b")
2721 params['hessid'] = bssid2
2722 params['anqp_3gpp_cell_net'] = "555,444"
2723 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
2724 hostapd.add_ap(apdev[1], params)
2726 dev[0].hs20_enable()
2727 values = { 'realm': "example.com",
2728 'username': "hs20-test",
2729 'password': "password",
2731 dev[0].add_cred_values(values)
2732 values = { 'imsi': "555444-333222111",
2734 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
2735 id = dev[0].add_cred_values(values)
2737 dev[0].scan_for_bss(bssid, freq="2412")
2738 dev[0].scan_for_bss(bssid2, freq="2412")
2739 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2740 ev = dev[0].wait_connected(timeout=15)
2742 raise Exception("Unexpected network selected")
2744 dev[0].set_cred(id, "priority", "2")
2745 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2746 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2747 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2749 raise Exception("Connection timed out")
2750 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2751 raise Exception("No roam to higher priority network")
2752 if bssid2 not in ev:
2753 raise Exception("Unexpected network selected")
2755 def test_ap_hs20_interworking_select_blocking_scan(dev, apdev):
2756 """Ongoing INTERWORKING_SELECT blocking SCAN"""
2757 check_eap_capa(dev[0], "MSCHAPV2")
2758 bssid = apdev[0]['bssid']
2759 params = hs20_ap_params()
2760 hostapd.add_ap(apdev[0], params)
2762 dev[0].hs20_enable()
2763 values = { 'realm': "example.com",
2764 'username': "hs20-test",
2765 'password': "password",
2766 'domain': "example.com" }
2767 dev[0].add_cred_values(values)
2769 dev[0].scan_for_bss(bssid, freq="2412")
2770 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2771 if "FAIL-BUSY" not in dev[0].request("SCAN"):
2772 raise Exception("Unexpected SCAN command result")
2773 dev[0].wait_connected(timeout=15)
2775 def test_ap_hs20_fetch_osu(dev, apdev):
2776 """Hotspot 2.0 OSU provider and icon fetch"""
2777 bssid = apdev[0]['bssid']
2778 params = hs20_ap_params()
2779 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2780 params['osu_ssid'] = '"HS 2.0 OSU open"'
2781 params['osu_method_list'] = "1"
2782 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2783 params['osu_icon'] = "w1fi_logo"
2784 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2785 params['osu_server_uri'] = "https://example.com/osu/"
2786 hostapd.add_ap(apdev[0], params)
2788 bssid2 = apdev[1]['bssid']
2789 params = hs20_ap_params(ssid="test-hs20b")
2790 params['hessid'] = bssid2
2791 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2792 params['osu_ssid'] = '"HS 2.0 OSU OSEN"'
2793 params['osu_method_list'] = "0"
2794 params['osu_nai'] = "osen@example.com"
2795 params['osu_friendly_name'] = [ "eng:Test2 OSU", "fin:Testi2-OSU" ]
2796 params['osu_icon'] = "w1fi_logo"
2797 params['osu_service_desc'] = [ "eng:Example services2", "fin:Esimerkkipalveluja2" ]
2798 params['osu_server_uri'] = "https://example.org/osu/"
2799 hostapd.add_ap(apdev[1], params)
2801 with open("w1fi_logo.png", "r") as f:
2802 orig_logo = f.read()
2803 dev[0].hs20_enable()
2804 dir = "/tmp/osu-fetch"
2805 if os.path.isdir(dir):
2806 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2808 os.remove(dir + "/" + f)
2815 dev[1].scan_for_bss(bssid, freq="2412")
2816 dev[2].scan_for_bss(bssid, freq="2412")
2817 dev[0].request("SET osu_dir " + dir)
2818 dev[0].request("FETCH_OSU")
2819 if "FAIL" not in dev[1].request("HS20_ICON_REQUEST foo w1fi_logo"):
2820 raise Exception("Invalid HS20_ICON_REQUEST accepted")
2821 if "OK" not in dev[1].request("HS20_ICON_REQUEST " + bssid + " w1fi_logo"):
2822 raise Exception("HS20_ICON_REQUEST failed")
2823 if "OK" not in dev[2].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2824 raise Exception("REQ_HS20_ICON failed")
2827 ev = dev[0].wait_event(["OSU provider fetch completed",
2828 "RX-HS20-ANQP-ICON"], timeout=15)
2830 raise Exception("Timeout on OSU fetch")
2831 if "OSU provider fetch completed" in ev:
2833 if "RX-HS20-ANQP-ICON" in ev:
2834 with open(ev.split(' ')[1], "r") as f:
2836 if logo == orig_logo:
2839 with open(dir + "/osu-providers.txt", "r") as f:
2841 logger.debug("osu-providers.txt: " + prov)
2842 if "OSU-PROVIDER " + bssid not in prov:
2843 raise Exception("Missing OSU_PROVIDER(1)")
2844 if "OSU-PROVIDER " + bssid2 not in prov:
2845 raise Exception("Missing OSU_PROVIDER(2)")
2847 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2849 os.remove(dir + "/" + f)
2853 raise Exception("Unexpected number of icons fetched")
2855 ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=5)
2857 raise Exception("Timeout on GAS-QUERY-DONE")
2858 ev = dev[1].wait_event(["GAS-QUERY-DONE"], timeout=5)
2860 raise Exception("Timeout on GAS-QUERY-DONE")
2861 if "freq=2412 status_code=0 result=SUCCESS" not in ev:
2862 raise Exception("Unexpected GAS-QUERY-DONE: " + ev)
2863 ev = dev[1].wait_event(["RX-HS20-ANQP"], timeout=15)
2865 raise Exception("Timeout on icon fetch")
2866 if "Icon Binary File" not in ev:
2867 raise Exception("Unexpected ANQP element")
2869 ev = dev[2].wait_event(["RX-HS20-ICON"], timeout=5)
2871 raise Exception("Timeout on RX-HS20-ICON")
2872 event_icon_len = ev.split(' ')[3]
2873 if " w1fi_logo " not in ev:
2874 raise Exception("RX-HS20-ICON did not have the expected file name")
2876 raise Exception("RX-HS20-ICON did not have the expected BSSID")
2877 if "FAIL" in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 10"):
2878 raise Exception("GET_HS20_ICON 0..10 failed")
2879 if "FAIL" in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 5 10"):
2880 raise Exception("GET_HS20_ICON 5..15 failed")
2881 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 100000 10"):
2882 raise Exception("Unexpected success of GET_HS20_ICON with too large offset")
2883 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " no_such_logo 0 10"):
2884 raise Exception("GET_HS20_ICON for not existing icon succeeded")
2885 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 3070"):
2886 raise Exception("GET_HS20_ICON with too many output bytes to fit the buffer succeeded")
2887 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 0"):
2888 raise Exception("GET_HS20_ICON 0..0 succeeded")
2893 raise Exception("Unexpectedly long icon")
2894 res = dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo %d 1000" % pos)
2895 if res.startswith("FAIL"):
2897 icon += base64.b64decode(res)
2899 hex = binascii.hexlify(icon)
2900 if not hex.startswith("0009696d6167652f706e677d1d"):
2901 raise Exception("Unexpected beacon binary header: " + hex)
2902 with open('w1fi_logo.png', 'r') as f:
2904 if icon[13:] != data:
2905 raise Exception("Unexpected icon data")
2906 if len(icon) != int(event_icon_len):
2907 raise Exception("Unexpected RX-HS20-ICON event length: " + event_icon_len)
2910 if "OK" not in dev[i].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2911 raise Exception("REQ_HS20_ICON failed [2]")
2913 ev = dev[i].wait_event(["RX-HS20-ICON"], timeout=5)
2915 raise Exception("Timeout on RX-HS20-ICON [2]")
2917 if "FAIL" not in dev[2].request("DEL_HS20_ICON foo w1fi_logo"):
2918 raise Exception("Invalid DEL_HS20_ICON accepted")
2919 if "OK" not in dev[2].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
2920 raise Exception("DEL_HS20_ICON failed")
2921 if "OK" not in dev[1].request("DEL_HS20_ICON " + bssid):
2922 raise Exception("DEL_HS20_ICON failed")
2923 if "OK" not in dev[0].request("DEL_HS20_ICON "):
2924 raise Exception("DEL_HS20_ICON failed")
2926 if "FAIL" not in dev[i].request("DEL_HS20_ICON "):
2927 raise Exception("DEL_HS20_ICON accepted when no icons left")
2929 def test_ap_hs20_fetch_osu_no_info(dev, apdev):
2930 """Hotspot 2.0 OSU provider and no AP with info"""
2931 bssid = apdev[0]['bssid']
2932 params = hs20_ap_params()
2933 hostapd.add_ap(apdev[0], params)
2935 dev[0].hs20_enable()
2936 dir = "/tmp/osu-fetch"
2937 if os.path.isdir(dir):
2938 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2940 os.remove(dir + "/" + f)
2946 dev[0].scan_for_bss(bssid, freq="2412")
2948 dev[0].request("SET osu_dir " + dir)
2949 dev[0].request("FETCH_OSU")
2950 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
2952 raise Exception("Timeout on OSU fetch")
2954 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2956 os.remove(dir + "/" + f)
2959 def test_ap_hs20_fetch_osu_no_icon(dev, apdev):
2960 """Hotspot 2.0 OSU provider and no icon found"""
2961 bssid = apdev[0]['bssid']
2962 params = hs20_ap_params()
2963 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo-no-file.png"
2964 params['osu_ssid'] = '"HS 2.0 OSU open"'
2965 params['osu_method_list'] = "1"
2966 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2967 params['osu_icon'] = "w1fi_logo"
2968 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2969 params['osu_server_uri'] = "https://example.com/osu/"
2970 hostapd.add_ap(apdev[0], params)
2972 dev[0].hs20_enable()
2973 dir = "/tmp/osu-fetch"
2974 if os.path.isdir(dir):
2975 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2977 os.remove(dir + "/" + f)
2983 dev[0].scan_for_bss(bssid, freq="2412")
2985 dev[0].request("SET osu_dir " + dir)
2986 dev[0].request("FETCH_OSU")
2987 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
2989 raise Exception("Timeout on OSU fetch")
2991 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2993 os.remove(dir + "/" + f)
2996 def get_icon(dev, bssid, iconname):
3001 raise Exception("Unexpectedly long icon")
3002 res = dev.request("GET_HS20_ICON " + bssid + " " + iconname + " %d 3000" % pos)
3003 if res.startswith("FAIL"):
3005 icon += base64.b64decode(res)
3008 raise Exception("Too short GET_HS20_ICON response")
3009 return icon[0:13], icon[13:]
3011 def test_ap_hs20_req_hs20_icon(dev, apdev):
3012 """Hotspot 2.0 OSU provider and multi-icon fetch with REQ_HS20_ICON"""
3013 bssid = apdev[0]['bssid']
3014 params = hs20_ap_params()
3015 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
3016 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
3017 params['osu_ssid'] = '"HS 2.0 OSU open"'
3018 params['osu_method_list'] = "1"
3019 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3020 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
3021 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3022 params['osu_server_uri'] = "https://example.com/osu/"
3023 hostapd.add_ap(apdev[0], params)
3025 dev[0].scan_for_bss(bssid, freq="2412")
3027 # First, fetch two icons from the AP to wpa_supplicant
3029 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3030 raise Exception("REQ_HS20_ICON failed")
3031 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3033 raise Exception("Timeout on RX-HS20-ICON (1)")
3035 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " test_logo"):
3036 raise Exception("REQ_HS20_ICON failed")
3037 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3039 raise Exception("Timeout on RX-HS20-ICON (2)")
3041 # Then, fetch the icons from wpa_supplicant for validation
3043 hdr, data1 = get_icon(dev[0], bssid, "w1fi_logo")
3044 hdr, data2 = get_icon(dev[0], bssid, "test_logo")
3046 with open('w1fi_logo.png', 'r') as f:
3049 raise Exception("Unexpected icon data (1)")
3051 with open('auth_serv/sha512-server.pem', 'r') as f:
3054 raise Exception("Unexpected icon data (2)")
3056 # Finally, delete the icons from wpa_supplicant
3058 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
3059 raise Exception("DEL_HS20_ICON failed")
3060 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " test_logo"):
3061 raise Exception("DEL_HS20_ICON failed")
3063 def test_ap_hs20_req_hs20_icon_oom(dev, apdev):
3064 """Hotspot 2.0 icon fetch OOM with REQ_HS20_ICON"""
3065 bssid = apdev[0]['bssid']
3066 params = hs20_ap_params()
3067 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
3068 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
3069 params['osu_ssid'] = '"HS 2.0 OSU open"'
3070 params['osu_method_list'] = "1"
3071 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3072 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
3073 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3074 params['osu_server_uri'] = "https://example.com/osu/"
3075 hostapd.add_ap(apdev[0], params)
3077 dev[0].scan_for_bss(bssid, freq="2412")
3079 if "FAIL" not in dev[0].request("REQ_HS20_ICON 11:22:33:44:55:66 w1fi_logo"):
3080 raise Exception("REQ_HS20_ICON succeeded with unknown BSSID")
3082 with alloc_fail(dev[0], 1, "hs20_build_anqp_req;hs20_anqp_send_req"):
3083 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3084 raise Exception("REQ_HS20_ICON succeeded during OOM")
3086 with alloc_fail(dev[0], 1, "gas_query_req;hs20_anqp_send_req"):
3087 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3088 raise Exception("REQ_HS20_ICON succeeded during OOM")
3090 with alloc_fail(dev[0], 1, "=hs20_anqp_send_req"):
3091 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3092 raise Exception("REQ_HS20_ICON succeeded during OOM")
3093 with alloc_fail(dev[0], 2, "=hs20_anqp_send_req"):
3094 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3095 raise Exception("REQ_HS20_ICON succeeded during OOM")
3097 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3098 raise Exception("REQ_HS20_ICON failed")
3099 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3101 raise Exception("Timeout on RX-HS20-ICON (1)")
3103 with alloc_fail(dev[0], 1, "hs20_get_icon"):
3104 if "FAIL" not in dev[0].request("GET_HS20_ICON " + bssid + "w1fi_logo 0 100"):
3105 raise Exception("GET_HS20_ICON succeeded during OOM")
3107 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
3108 raise Exception("DEL_HS20_ICON failed")
3110 with alloc_fail(dev[0], 1, "=hs20_process_icon_binary_file"):
3111 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3112 raise Exception("REQ_HS20_ICON failed")
3113 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
3115 def test_ap_hs20_req_hs20_icon_parallel(dev, apdev):
3116 """Hotspot 2.0 OSU provider and multi-icon parallel fetch with REQ_HS20_ICON"""
3117 bssid = apdev[0]['bssid']
3118 params = hs20_ap_params()
3119 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
3120 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
3121 params['osu_ssid'] = '"HS 2.0 OSU open"'
3122 params['osu_method_list'] = "1"
3123 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3124 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
3125 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3126 params['osu_server_uri'] = "https://example.com/osu/"
3127 hostapd.add_ap(apdev[0], params)
3129 dev[0].scan_for_bss(bssid, freq="2412")
3131 # First, fetch two icons from the AP to wpa_supplicant
3133 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3134 raise Exception("REQ_HS20_ICON failed")
3136 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " test_logo"):
3137 raise Exception("REQ_HS20_ICON failed")
3138 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3140 raise Exception("Timeout on RX-HS20-ICON (1)")
3141 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3143 raise Exception("Timeout on RX-HS20-ICON (2)")
3145 # Then, fetch the icons from wpa_supplicant for validation
3147 hdr, data1 = get_icon(dev[0], bssid, "w1fi_logo")
3148 hdr, data2 = get_icon(dev[0], bssid, "test_logo")
3150 with open('w1fi_logo.png', 'r') as f:
3153 raise Exception("Unexpected icon data (1)")
3155 with open('auth_serv/sha512-server.pem', 'r') as f:
3158 raise Exception("Unexpected icon data (2)")
3160 # Finally, delete the icons from wpa_supplicant
3162 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
3163 raise Exception("DEL_HS20_ICON failed")
3164 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " test_logo"):
3165 raise Exception("DEL_HS20_ICON failed")
3167 def test_ap_hs20_fetch_osu_stop(dev, apdev):
3168 """Hotspot 2.0 OSU provider fetch stopped"""
3169 bssid = apdev[0]['bssid']
3170 params = hs20_ap_params()
3171 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
3172 params['osu_ssid'] = '"HS 2.0 OSU open"'
3173 params['osu_method_list'] = "1"
3174 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3175 params['osu_icon'] = "w1fi_logo"
3176 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3177 params['osu_server_uri'] = "https://example.com/osu/"
3178 hapd = hostapd.add_ap(apdev[0], params)
3180 dev[0].hs20_enable()
3181 dir = "/tmp/osu-fetch"
3182 if os.path.isdir(dir):
3183 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3185 os.remove(dir + "/" + f)
3192 dev[0].request("SET osu_dir " + dir)
3193 dev[0].request("SCAN freq=2412-2462")
3194 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=10)
3196 raise Exception("Scan did not start")
3197 if "FAIL" not in dev[0].request("FETCH_OSU"):
3198 raise Exception("FETCH_OSU accepted while scanning")
3199 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
3201 raise Exception("Scan timed out")
3202 hapd.set("ext_mgmt_frame_handling", "1")
3203 dev[0].request("FETCH_ANQP")
3204 if "FAIL" not in dev[0].request("FETCH_OSU"):
3205 raise Exception("FETCH_OSU accepted while in FETCH_ANQP")
3206 dev[0].request("STOP_FETCH_ANQP")
3207 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=5)
3208 dev[0].dump_monitor()
3210 dev[0].request("INTERWORKING_SELECT freq=2412")
3212 msg = hapd.mgmt_rx()
3213 if msg['subtype'] == 13:
3215 if "FAIL" not in dev[0].request("FETCH_OSU"):
3216 raise Exception("FETCH_OSU accepted while in INTERWORKING_SELECT")
3217 ev = dev[0].wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
3220 raise Exception("Network selection timed out")
3222 dev[0].dump_monitor()
3223 if "OK" not in dev[0].request("FETCH_OSU"):
3224 raise Exception("FETCH_OSU failed")
3225 dev[0].request("CANCEL_FETCH_OSU")
3229 if dev[0].get_driver_status_field("scan_state") == "SCAN_COMPLETED":
3232 dev[0].dump_monitor()
3233 if "OK" not in dev[0].request("FETCH_OSU"):
3234 raise Exception("FETCH_OSU failed")
3235 if "FAIL" not in dev[0].request("FETCH_OSU"):
3236 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
3237 ev = dev[0].wait_event(["GAS-QUERY-START"], 10)
3239 raise Exception("GAS timed out")
3240 if "FAIL" not in dev[0].request("FETCH_OSU"):
3241 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
3242 dev[0].request("CANCEL_FETCH_OSU")
3243 ev = dev[0].wait_event(["GAS-QUERY-DONE"], 10)
3245 raise Exception("GAS event timed out after CANCEL_FETCH_OSU")
3247 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3249 os.remove(dir + "/" + f)
3252 def test_ap_hs20_fetch_osu_proto(dev, apdev):
3253 """Hotspot 2.0 OSU provider and protocol testing"""
3254 bssid = apdev[0]['bssid']
3255 params = hs20_ap_params()
3256 hapd = hostapd.add_ap(apdev[0], params)
3258 dev[0].hs20_enable()
3259 dir = "/tmp/osu-fetch"
3260 if os.path.isdir(dir):
3261 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3263 os.remove(dir + "/" + f)
3270 tests = [ ( "Empty provider list (no OSU SSID field)", '' ),
3271 ( "HS 2.0: Not enough room for OSU SSID",
3272 binascii.unhexlify('01') ),
3273 ( "HS 2.0: Invalid OSU SSID Length 33",
3274 binascii.unhexlify('21') + 33*'A' ),
3275 ( "HS 2.0: Not enough room for Number of OSU Providers",
3276 binascii.unhexlify('0130') ),
3277 ( "Truncated OSU Provider",
3278 binascii.unhexlify('013001020000') ),
3279 ( "HS 2.0: Ignored 5 bytes of extra data after OSU Providers",
3280 binascii.unhexlify('0130001122334455') ),
3281 ( "HS 2.0: Not enough room for OSU Friendly Name Length",
3282 binascii.unhexlify('013001000000') ),
3283 ( "HS 2.0: Not enough room for OSU Friendly Name Duples",
3284 build_prov('0100') ),
3285 ( "Invalid OSU Friendly Name", build_prov('040000000000') ),
3286 ( "Invalid OSU Friendly Name(2)", build_prov('040004000000') ),
3287 ( "HS 2.0: Not enough room for OSU Server URI length",
3288 build_prov('0000') ),
3289 ( "HS 2.0: Not enough room for OSU Server URI",
3290 build_prov('000001') ),
3291 ( "HS 2.0: Not enough room for OSU Method list length",
3292 build_prov('000000') ),
3293 ( "HS 2.0: Not enough room for OSU Method list",
3294 build_prov('00000001') ),
3295 ( "HS 2.0: Not enough room for Icons Available Length",
3296 build_prov('00000000') ),
3297 ( "HS 2.0: Not enough room for Icons Available Length(2)",
3298 build_prov('00000001ff00') ),
3299 ( "HS 2.0: Not enough room for Icons Available",
3300 build_prov('000000000100') ),
3301 ( "HS 2.0: Invalid Icon Metadata",
3302 build_prov('00000000010000') ),
3303 ( "HS 2.0: Not room for Icon Type",
3304 build_prov('000000000900111122223333330200') ),
3305 ( "HS 2.0: Not room for Icon Filename length",
3306 build_prov('000000000900111122223333330100') ),
3307 ( "HS 2.0: Not room for Icon Filename",
3308 build_prov('000000000900111122223333330001') ),
3309 ( "HS 2.0: Not enough room for OSU_NAI",
3310 build_prov('000000000000') ),
3311 ( "HS 2.0: Not enough room for OSU_NAI(2)",
3312 build_prov('00000000000001') ),
3313 ( "HS 2.0: Not enough room for OSU Service Description Length",
3314 build_prov('00000000000000') ),
3315 ( "HS 2.0: Not enough room for OSU Service Description Length(2)",
3316 build_prov('0000000000000000') ),
3317 ( "HS 2.0: Not enough room for OSU Service Description Duples",
3318 build_prov('000000000000000100') ),
3319 ( "Invalid OSU Service Description",
3320 build_prov('00000000000000040000000000') ),
3321 ( "Invalid OSU Service Description(2)",
3322 build_prov('00000000000000040004000000') ) ]
3325 dev[0].request("SET osu_dir " + dir)
3326 run_fetch_osu_icon_failure(hapd, dev, bssid)
3327 for note, prov in tests:
3328 run_fetch_osu(hapd, dev, bssid, note, prov)
3330 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3332 os.remove(dir + "/" + f)
3335 def build_prov(prov):
3336 data = binascii.unhexlify(prov)
3337 return binascii.unhexlify('013001') + struct.pack('<H', len(data)) + data
3339 def handle_osu_prov_fetch(hapd, dev, prov):
3340 # GAS/ANQP query for OSU Providers List
3341 query = gas_rx(hapd)
3342 gas = parse_gas(query['payload'])
3343 dialog_token = gas['dialog_token']
3345 resp = action_response(query)
3346 osu_prov = struct.pack('<HH', 0xdddd, len(prov) + 6) + binascii.unhexlify('506f9a110800') + prov
3347 data = struct.pack('<H', len(osu_prov)) + osu_prov
3348 resp['payload'] = anqp_initial_resp(dialog_token, 0) + data
3349 send_gas_resp(hapd, resp)
3351 ev = dev[0].wait_event(["RX-HS20-ANQP"], timeout=5)
3353 raise Exception("ANQP query response for OSU Providers not received")
3354 if "OSU Providers list" not in ev:
3355 raise Exception("ANQP query response for OSU Providers not received(2)")
3356 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
3358 raise Exception("ANQP query for OSU Providers list not completed")
3360 def start_osu_fetch(hapd, dev, bssid, note):
3361 hapd.set("ext_mgmt_frame_handling", "0")
3362 dev[0].request("BSS_FLUSH 0")
3363 dev[0].scan_for_bss(bssid, freq="2412")
3364 hapd.set("ext_mgmt_frame_handling", "1")
3365 dev[0].dump_monitor()
3366 dev[0].request("NOTE " + note)
3367 dev[0].request("FETCH_OSU no-scan")
3369 def wait_osu_fetch_completed(dev):
3370 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=5)
3372 raise Exception("Timeout on OSU fetch")
3374 def run_fetch_osu_icon_failure(hapd, dev, bssid):
3375 start_osu_fetch(hapd, dev, bssid, "Icon fetch failure")
3377 prov = binascii.unhexlify('01ff' + '01' + '800019000b656e6754657374204f53550c66696e54657374692d4f53551868747470733a2f2f6578616d706c652e636f6d2f6f73752f01011b00800050007a787809696d6167652f706e6709773166695f6c6f676f002a0013656e674578616d706c652073657276696365731566696e4573696d65726b6b6970616c76656c756a61')
3378 handle_osu_prov_fetch(hapd, dev, prov)
3380 # GAS/ANQP query for icon
3381 query = gas_rx(hapd)
3382 gas = parse_gas(query['payload'])
3383 dialog_token = gas['dialog_token']
3385 resp = action_response(query)
3386 # Unexpected Advertisement Protocol in response
3387 adv_proto = struct.pack('8B', 108, 6, 127, 0xdd, 0x00, 0x11, 0x22, 0x33)
3388 data = struct.pack('<H', 0)
3389 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
3390 GAS_INITIAL_RESPONSE,
3391 gas['dialog_token'], 0, 0) + adv_proto + data
3392 send_gas_resp(hapd, resp)
3394 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
3396 raise Exception("ANQP query for icon not completed")
3398 wait_osu_fetch_completed(dev)
3400 def run_fetch_osu(hapd, dev, bssid, note, prov):
3401 start_osu_fetch(hapd, dev, bssid, note)
3402 handle_osu_prov_fetch(hapd, dev, prov)
3403 wait_osu_fetch_completed(dev)
3405 def test_ap_hs20_ft(dev, apdev):
3406 """Hotspot 2.0 connection with FT"""
3407 check_eap_capa(dev[0], "MSCHAPV2")
3408 bssid = apdev[0]['bssid']
3409 params = hs20_ap_params()
3410 params['wpa_key_mgmt'] = "FT-EAP"
3411 params['nas_identifier'] = "nas1.w1.fi"
3412 params['r1_key_holder'] = "000102030405"
3413 params["mobility_domain"] = "a1b2"
3414 params["reassociation_deadline"] = "1000"
3415 hostapd.add_ap(apdev[0], params)
3417 dev[0].hs20_enable()
3418 id = dev[0].add_cred_values({ 'realm': "example.com",
3419 'username': "hs20-test",
3420 'password': "password",
3421 'ca_cert': "auth_serv/ca.pem",
3422 'domain': "example.com",
3423 'update_identifier': "1234" })
3424 interworking_select(dev[0], bssid, "home", freq="2412")
3425 interworking_connect(dev[0], bssid, "TTLS")
3427 def test_ap_hs20_remediation_sql(dev, apdev, params):
3428 """Hotspot 2.0 connection and remediation required using SQLite for user DB"""
3429 check_eap_capa(dev[0], "MSCHAPV2")
3433 raise HwsimSkip("No sqlite3 module available")
3434 dbfile = os.path.join(params['logdir'], "eap-user.db")
3439 con = sqlite3.connect(dbfile)
3442 cur.execute("CREATE TABLE users(identity TEXT PRIMARY KEY, methods TEXT, password TEXT, remediation TEXT, phase2 INTEGER)")
3443 cur.execute("CREATE TABLE wildcards(identity TEXT PRIMARY KEY, methods TEXT)")
3444 cur.execute("INSERT INTO users(identity,methods,password,phase2,remediation) VALUES ('user-mschapv2','TTLS-MSCHAPV2','password',1,'user')")
3445 cur.execute("INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS')")
3446 cur.execute("CREATE TABLE authlog(timestamp TEXT, session TEXT, nas_ip TEXT, username TEXT, note TEXT)")
3449 params = { "ssid": "as", "beacon_int": "2000",
3450 "radius_server_clients": "auth_serv/radius_clients.conf",
3451 "radius_server_auth_port": '18128',
3453 "eap_user_file": "sqlite:" + dbfile,
3454 "ca_cert": "auth_serv/ca.pem",
3455 "server_cert": "auth_serv/server.pem",
3456 "private_key": "auth_serv/server.key",
3457 "subscr_remediation_url": "https://example.org/",
3458 "subscr_remediation_method": "1" }
3459 hostapd.add_ap(apdev[1], params)
3461 bssid = apdev[0]['bssid']
3462 params = hs20_ap_params()
3463 params['auth_server_port'] = "18128"
3464 hostapd.add_ap(apdev[0], params)
3466 dev[0].request("SET pmf 1")
3467 dev[0].hs20_enable()
3468 id = dev[0].add_cred_values({ 'realm': "example.com",
3469 'username': "user-mschapv2",
3470 'password': "password",
3471 'ca_cert': "auth_serv/ca.pem" })
3472 interworking_select(dev[0], bssid, freq="2412")
3473 interworking_connect(dev[0], bssid, "TTLS")
3474 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
3476 raise Exception("Timeout on subscription remediation notice")
3477 if " 1 https://example.org/" not in ev:
3478 raise Exception("Unexpected subscription remediation event contents")
3482 cur.execute("SELECT * from authlog")
3483 rows = cur.fetchall()
3485 raise Exception("No authlog entries")
3489 dev[0].request("SET pmf 0")
3491 def test_ap_hs20_external_selection(dev, apdev):
3492 """Hotspot 2.0 connection using external network selection and creation"""
3493 check_eap_capa(dev[0], "MSCHAPV2")
3494 bssid = apdev[0]['bssid']
3495 params = hs20_ap_params()
3496 params['hessid'] = bssid
3497 params['disable_dgaf'] = '1'
3498 hostapd.add_ap(apdev[0], params)
3500 dev[0].hs20_enable()
3501 dev[0].connect("test-hs20", proto="RSN", key_mgmt="WPA-EAP", eap="TTLS",
3502 identity="hs20-test", password="password",
3503 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3504 scan_freq="2412", update_identifier="54321")
3505 if dev[0].get_status_field("hs20") != "2":
3506 raise Exception("Unexpected hs20 indication")
3508 def test_ap_hs20_random_mac_addr(dev, apdev):
3509 """Hotspot 2.0 connection with random MAC address"""
3510 check_eap_capa(dev[0], "MSCHAPV2")
3511 bssid = apdev[0]['bssid']
3512 params = hs20_ap_params()
3513 params['hessid'] = bssid
3514 params['disable_dgaf'] = '1'
3515 hapd = hostapd.add_ap(apdev[0], params)
3517 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
3518 wpas.interface_add("wlan5")
3519 addr = wpas.p2p_interface_addr()
3520 wpas.request("SET mac_addr 1")
3521 wpas.request("SET preassoc_mac_addr 1")
3522 wpas.request("SET rand_addr_lifetime 60")
3524 wpas.flush_scan_cache()
3525 id = wpas.add_cred_values({ 'realm': "example.com",
3526 'username': "hs20-test",
3527 'password': "password",
3528 'ca_cert': "auth_serv/ca.pem",
3529 'domain': "example.com",
3530 'update_identifier': "1234" })
3531 interworking_select(wpas, bssid, "home", freq="2412")
3532 interworking_connect(wpas, bssid, "TTLS")
3533 addr1 = wpas.get_driver_status_field("addr")
3535 raise Exception("Did not use random MAC address")
3537 sta = hapd.get_sta(addr)
3538 if sta['addr'] != "FAIL":
3539 raise Exception("Unexpected STA association with permanent address")
3540 sta = hapd.get_sta(addr1)
3541 if sta['addr'] != addr1:
3542 raise Exception("STA association with random address not found")
3544 def test_ap_hs20_multi_network_and_cred_removal(dev, apdev):
3545 """Multiple networks and cred removal"""
3546 check_eap_capa(dev[0], "MSCHAPV2")
3547 bssid = apdev[0]['bssid']
3548 params = hs20_ap_params()
3549 params['nai_realm'] = [ "0,example.com,25[3:26]"]
3550 hapd = hostapd.add_ap(apdev[0], params)
3552 dev[0].add_network()
3553 dev[0].hs20_enable()
3554 id = dev[0].add_cred_values({ 'realm': "example.com",
3556 'password': "password" })
3557 interworking_select(dev[0], bssid, freq="2412")
3558 interworking_connect(dev[0], bssid, "PEAP")
3559 dev[0].add_network()
3561 dev[0].request("DISCONNECT")
3562 dev[0].wait_disconnected(timeout=10)
3565 hapd.set("ssid", "another ssid")
3568 interworking_select(dev[0], bssid, freq="2412")
3569 interworking_connect(dev[0], bssid, "PEAP")
3570 dev[0].add_network()
3571 if len(dev[0].list_networks()) != 5:
3572 raise Exception("Unexpected number of networks prior to remove_crec")
3574 dev[0].dump_monitor()
3575 dev[0].remove_cred(id)
3576 if len(dev[0].list_networks()) != 3:
3577 raise Exception("Unexpected number of networks after to remove_crec")
3578 dev[0].wait_disconnected(timeout=10)
3580 def test_ap_hs20_interworking_add_network(dev, apdev):
3581 """Hotspot 2.0 connection using INTERWORKING_ADD_NETWORK"""
3582 check_eap_capa(dev[0], "MSCHAPV2")
3583 bssid = apdev[0]['bssid']
3584 params = hs20_ap_params()
3585 params['nai_realm'] = [ "0,example.com,21[3:26][6:7][99:99]" ]
3586 hostapd.add_ap(apdev[0], params)
3588 dev[0].hs20_enable()
3589 dev[0].add_cred_values(default_cred(user="user"))
3590 interworking_select(dev[0], bssid, freq=2412)
3591 id = dev[0].interworking_add_network(bssid)
3592 dev[0].select_network(id, freq=2412)
3593 dev[0].wait_connected()
3595 def _test_ap_hs20_proxyarp(dev, apdev):
3596 bssid = apdev[0]['bssid']
3597 params = hs20_ap_params()
3598 params['hessid'] = bssid
3599 params['disable_dgaf'] = '0'
3600 params['proxy_arp'] = '1'
3601 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3602 if "OK" in hapd.request("ENABLE"):
3603 raise Exception("Incomplete hostapd configuration was accepted")
3604 hapd.set("ap_isolate", "1")
3605 if "OK" in hapd.request("ENABLE"):
3606 raise Exception("Incomplete hostapd configuration was accepted")
3607 hapd.set('bridge', 'ap-br0')
3612 # For now, do not report failures due to missing kernel support
3613 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3614 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
3616 raise Exception("AP startup timed out")
3617 if "AP-ENABLED" not in ev:
3618 raise Exception("AP startup failed")
3620 dev[0].hs20_enable()
3621 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3622 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3624 id = dev[0].add_cred_values({ 'realm': "example.com",
3625 'username': "hs20-test",
3626 'password': "password",
3627 'ca_cert': "auth_serv/ca.pem",
3628 'domain': "example.com",
3629 'update_identifier': "1234" })
3630 interworking_select(dev[0], bssid, "home", freq="2412")
3631 interworking_connect(dev[0], bssid, "TTLS")
3633 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
3634 identity="hs20-test", password="password",
3635 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3639 addr0 = dev[0].p2p_interface_addr()
3640 addr1 = dev[1].p2p_interface_addr()
3642 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3643 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
3645 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
3646 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
3648 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3649 raise Exception("DATA_TEST_FRAME failed")
3651 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:dddd::2",
3652 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:dddd::2",
3654 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3655 raise Exception("DATA_TEST_FRAME failed")
3657 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:eeee::2",
3658 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:eeee::2",
3660 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3661 raise Exception("DATA_TEST_FRAME failed")
3663 matches = get_permanent_neighbors("ap-br0")
3664 logger.info("After connect: " + str(matches))
3665 if len(matches) != 3:
3666 raise Exception("Unexpected number of neighbor entries after connect")
3667 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3668 raise Exception("dev0 addr missing")
3669 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3670 raise Exception("dev1 addr(1) missing")
3671 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3672 raise Exception("dev1 addr(2) missing")
3673 dev[0].request("DISCONNECT")
3674 dev[1].request("DISCONNECT")
3676 matches = get_permanent_neighbors("ap-br0")
3677 logger.info("After disconnect: " + str(matches))
3678 if len(matches) > 0:
3679 raise Exception("Unexpected neighbor entries after disconnect")
3681 def test_ap_hs20_hidden_ssid_in_scan_res(dev, apdev):
3682 """Hotspot 2.0 connection with hidden SSId in scan results"""
3683 check_eap_capa(dev[0], "MSCHAPV2")
3684 bssid = apdev[0]['bssid']
3686 hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret',
3687 "ignore_broadcast_ssid": "1" })
3688 dev[0].scan_for_bss(bssid, freq=2412)
3690 hapd_global = hostapd.HostapdGlobal(apdev[0])
3692 hapd_global.remove(apdev[0]['ifname'])
3694 params = hs20_ap_params()
3695 params['hessid'] = bssid
3696 hapd = hostapd.add_ap(apdev[0], params)
3698 dev[0].hs20_enable()
3699 id = dev[0].add_cred_values({ 'realm': "example.com",
3700 'username': "hs20-test",
3701 'password': "password",
3702 'ca_cert': "auth_serv/ca.pem",
3703 'domain': "example.com" })
3704 interworking_select(dev[0], bssid, "home", freq="2412")
3705 interworking_connect(dev[0], bssid, "TTLS")
3707 # clear BSS table to avoid issues in following test cases
3708 dev[0].request("DISCONNECT")
3709 dev[0].wait_disconnected()
3711 dev[0].flush_scan_cache()
3712 dev[0].flush_scan_cache()
3714 def test_ap_hs20_proxyarp(dev, apdev):
3715 """Hotspot 2.0 and ProxyARP"""
3716 check_eap_capa(dev[0], "MSCHAPV2")
3718 _test_ap_hs20_proxyarp(dev, apdev)
3720 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3721 stderr=open('/dev/null', 'w'))
3722 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3723 stderr=open('/dev/null', 'w'))
3725 def _test_ap_hs20_proxyarp_dgaf(dev, apdev, disabled):
3726 bssid = apdev[0]['bssid']
3727 params = hs20_ap_params()
3728 params['hessid'] = bssid
3729 params['disable_dgaf'] = '1' if disabled else '0'
3730 params['proxy_arp'] = '1'
3731 params['na_mcast_to_ucast'] = '1'
3732 params['ap_isolate'] = '1'
3733 params['bridge'] = 'ap-br0'
3734 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3738 # For now, do not report failures due to missing kernel support
3739 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3740 ev = hapd.wait_event(["AP-ENABLED"], timeout=10)
3742 raise Exception("AP startup timed out")
3744 dev[0].hs20_enable()
3745 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3746 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3748 id = dev[0].add_cred_values({ 'realm': "example.com",
3749 'username': "hs20-test",
3750 'password': "password",
3751 'ca_cert': "auth_serv/ca.pem",
3752 'domain': "example.com",
3753 'update_identifier': "1234" })
3754 interworking_select(dev[0], bssid, "home", freq="2412")
3755 interworking_connect(dev[0], bssid, "TTLS")
3757 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
3758 identity="hs20-test", password="password",
3759 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3763 addr0 = dev[0].p2p_interface_addr()
3765 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3767 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
3768 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
3770 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3771 raise Exception("DATA_TEST_FRAME failed")
3773 pkt = build_ra(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::33",
3775 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3776 raise Exception("DATA_TEST_FRAME failed")
3778 pkt = build_na(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::44",
3779 ip_dst="ff01::1", target="aaaa:bbbb:cccc::55")
3780 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3781 raise Exception("DATA_TEST_FRAME failed")
3783 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3784 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3785 yiaddr="192.168.1.123", chaddr=addr0)
3786 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3787 raise Exception("DATA_TEST_FRAME failed")
3788 # another copy for additional code coverage
3789 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
3790 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3791 yiaddr="192.168.1.123", chaddr=addr0)
3792 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3793 raise Exception("DATA_TEST_FRAME failed")
3795 matches = get_permanent_neighbors("ap-br0")
3796 logger.info("After connect: " + str(matches))
3797 if len(matches) != 2:
3798 raise Exception("Unexpected number of neighbor entries after connect")
3799 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3800 raise Exception("dev0 addr missing")
3801 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3802 raise Exception("dev0 IPv4 addr missing")
3803 dev[0].request("DISCONNECT")
3804 dev[1].request("DISCONNECT")
3806 matches = get_permanent_neighbors("ap-br0")
3807 logger.info("After disconnect: " + str(matches))
3808 if len(matches) > 0:
3809 raise Exception("Unexpected neighbor entries after disconnect")
3811 def test_ap_hs20_proxyarp_disable_dgaf(dev, apdev):
3812 """Hotspot 2.0 and ProxyARP with DGAF disabled"""
3813 check_eap_capa(dev[0], "MSCHAPV2")
3815 _test_ap_hs20_proxyarp_dgaf(dev, apdev, True)
3817 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3818 stderr=open('/dev/null', 'w'))
3819 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3820 stderr=open('/dev/null', 'w'))
3822 def test_ap_hs20_proxyarp_enable_dgaf(dev, apdev):
3823 """Hotspot 2.0 and ProxyARP with DGAF enabled"""
3824 check_eap_capa(dev[0], "MSCHAPV2")
3826 _test_ap_hs20_proxyarp_dgaf(dev, apdev, False)
3828 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3829 stderr=open('/dev/null', 'w'))
3830 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3831 stderr=open('/dev/null', 'w'))
3833 def ip_checksum(buf):
3837 for i in range(0, len(buf), 2):
3838 val, = struct.unpack('H', buf[i:i+2])
3841 sum = (sum & 0xffff) + (sum >> 16)
3842 return struct.pack('H', ~sum & 0xffff)
3844 def ipv6_solicited_node_mcaddr(target):
3845 prefix = socket.inet_pton(socket.AF_INET6, "ff02::1:ff00:0")
3846 mask = socket.inet_pton(socket.AF_INET6, "::ff:ffff")
3847 _target = socket.inet_pton(socket.AF_INET6, target)
3848 p = struct.unpack('4I', prefix)
3849 m = struct.unpack('4I', mask)
3850 t = struct.unpack('4I', _target)
3851 res = (p[0] | (t[0] & m[0]),
3852 p[1] | (t[1] & m[1]),
3853 p[2] | (t[2] & m[2]),
3854 p[3] | (t[3] & m[3]))
3855 return socket.inet_ntop(socket.AF_INET6, struct.pack('4I', *res))
3857 def build_icmpv6(ipv6_addrs, type, code, payload):
3858 start = struct.pack("BB", type, code)
3860 icmp = start + '\x00\x00' + end
3861 pseudo = ipv6_addrs + struct.pack(">LBBBB", len(icmp), 0, 0, 0, 58)
3862 csum = ip_checksum(pseudo + icmp)
3863 return start + csum + end
3865 def build_ra(src_ll, ip_src, ip_dst, cur_hop_limit=0, router_lifetime=0,
3866 reachable_time=0, retrans_timer=0, opt=None):
3867 link_mc = binascii.unhexlify("3333ff000002")
3868 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3870 ehdr = link_mc + _src_ll + proto
3871 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3872 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3874 adv = struct.pack('>BBHLL', cur_hop_limit, 0, router_lifetime,
3875 reachable_time, retrans_timer)
3880 icmp = build_icmpv6(_ip_src + _ip_dst, 134, 0, payload)
3882 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3883 ipv6 += _ip_src + _ip_dst
3885 return ehdr + ipv6 + icmp
3887 def build_ns(src_ll, ip_src, ip_dst, target, opt=None):
3888 link_mc = binascii.unhexlify("3333ff000002")
3889 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3891 ehdr = link_mc + _src_ll + proto
3892 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3894 ip_dst = ipv6_solicited_node_mcaddr(target)
3895 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3897 reserved = '\x00\x00\x00\x00'
3898 _target = socket.inet_pton(socket.AF_INET6, target)
3900 payload = reserved + _target + opt
3902 payload = reserved + _target
3903 icmp = build_icmpv6(_ip_src + _ip_dst, 135, 0, payload)
3905 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3906 ipv6 += _ip_src + _ip_dst
3908 return ehdr + ipv6 + icmp
3910 def send_ns(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
3915 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
3918 src_ll = dev.p2p_interface_addr()
3919 cmd = "DATA_TEST_FRAME "
3922 opt = "\x01\x01" + binascii.unhexlify(src_ll.replace(':',''))
3924 pkt = build_ns(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
3926 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
3927 raise Exception("DATA_TEST_FRAME failed")
3929 def build_na(src_ll, ip_src, ip_dst, target, opt=None, flags=0):
3930 link_mc = binascii.unhexlify("3333ff000002")
3931 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3933 ehdr = link_mc + _src_ll + proto
3934 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3935 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3937 _target = socket.inet_pton(socket.AF_INET6, target)
3939 payload = struct.pack('>Bxxx', flags) + _target + opt
3941 payload = struct.pack('>Bxxx', flags) + _target
3942 icmp = build_icmpv6(_ip_src + _ip_dst, 136, 0, payload)
3944 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3945 ipv6 += _ip_src + _ip_dst
3947 return ehdr + ipv6 + icmp
3949 def send_na(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
3954 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
3957 src_ll = dev.p2p_interface_addr()
3958 cmd = "DATA_TEST_FRAME "
3960 pkt = build_na(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
3962 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
3963 raise Exception("DATA_TEST_FRAME failed")
3965 def build_dhcp_ack(dst_ll, src_ll, ip_src, ip_dst, yiaddr, chaddr,
3966 subnet_mask="255.255.255.0", truncated_opt=False,
3967 wrong_magic=False, force_tot_len=None, no_dhcp=False):
3968 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
3969 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3971 ehdr = _dst_ll + _src_ll + proto
3972 _ip_src = socket.inet_pton(socket.AF_INET, ip_src)
3973 _ip_dst = socket.inet_pton(socket.AF_INET, ip_dst)
3974 _subnet_mask = socket.inet_pton(socket.AF_INET, subnet_mask)
3976 _ciaddr = '\x00\x00\x00\x00'
3977 _yiaddr = socket.inet_pton(socket.AF_INET, yiaddr)
3978 _siaddr = '\x00\x00\x00\x00'
3979 _giaddr = '\x00\x00\x00\x00'
3980 _chaddr = binascii.unhexlify(chaddr.replace(':','') + "00000000000000000000")
3981 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
3982 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
3985 payload += '\x63\x82\x53\x00'
3987 payload += '\x63\x82\x53\x63'
3989 payload += '\x22\xff\x00'
3990 # Option: DHCP Message Type = ACK
3991 payload += '\x35\x01\x05'
3994 # Option: Subnet Mask
3995 payload += '\x01\x04' + _subnet_mask
3996 # Option: Time Offset
3997 payload += struct.pack('>BBL', 2, 4, 0)
4001 payload += '\x00\x00\x00\x00'
4004 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
4005 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
4007 udp = struct.pack('>HHHH', 67, 68, 8 + len(payload), 0) + payload
4010 tot_len = force_tot_len
4012 tot_len = 20 + len(udp)
4013 start = struct.pack('>BBHHBBBB', 0x45, 0, tot_len, 0, 0, 0, 128, 17)
4014 ipv4 = start + '\x00\x00' + _ip_src + _ip_dst
4015 csum = ip_checksum(ipv4)
4016 ipv4 = start + csum + _ip_src + _ip_dst
4018 return ehdr + ipv4 + udp
4020 def build_arp(dst_ll, src_ll, opcode, sender_mac, sender_ip,
4021 target_mac, target_ip):
4022 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
4023 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
4025 ehdr = _dst_ll + _src_ll + proto
4027 _sender_mac = binascii.unhexlify(sender_mac.replace(':',''))
4028 _sender_ip = socket.inet_pton(socket.AF_INET, sender_ip)
4029 _target_mac = binascii.unhexlify(target_mac.replace(':',''))
4030 _target_ip = socket.inet_pton(socket.AF_INET, target_ip)
4032 arp = struct.pack('>HHBBH', 1, 0x0800, 6, 4, opcode)
4033 arp += _sender_mac + _sender_ip
4034 arp += _target_mac + _target_ip
4038 def send_arp(dev, dst_ll="ff:ff:ff:ff:ff:ff", src_ll=None, opcode=1,
4039 sender_mac=None, sender_ip="0.0.0.0",
4040 target_mac="00:00:00:00:00:00", target_ip="0.0.0.0",
4045 if sender_mac is None:
4046 sender_mac = hapd_bssid
4047 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
4050 src_ll = dev.p2p_interface_addr()
4051 if sender_mac is None:
4052 sender_mac = dev.p2p_interface_addr()
4053 cmd = "DATA_TEST_FRAME "
4055 pkt = build_arp(dst_ll=dst_ll, src_ll=src_ll, opcode=opcode,
4056 sender_mac=sender_mac, sender_ip=sender_ip,
4057 target_mac=target_mac, target_ip=target_ip)
4058 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
4059 raise Exception("DATA_TEST_FRAME failed")
4061 def get_permanent_neighbors(ifname):
4062 cmd = subprocess.Popen(['ip', 'nei'], stdout=subprocess.PIPE)
4063 res = cmd.stdout.read()
4065 return [ line for line in res.splitlines() if "PERMANENT" in line and ifname in line ]
4067 def get_bridge_macs(ifname):
4068 cmd = subprocess.Popen(['brctl', 'showmacs', ifname],
4069 stdout=subprocess.PIPE)
4070 res = cmd.stdout.read()
4074 def tshark_get_arp(cap, filter):
4075 res = run_tshark(cap, filter,
4076 [ "eth.dst", "eth.src",
4077 "arp.src.hw_mac", "arp.src.proto_ipv4",
4078 "arp.dst.hw_mac", "arp.dst.proto_ipv4" ],
4081 for l in res.splitlines():
4082 frames.append(l.split('\t'))
4085 def tshark_get_ns(cap):
4086 res = run_tshark(cap, "icmpv6.type == 135",
4087 [ "eth.dst", "eth.src",
4088 "ipv6.src", "ipv6.dst",
4089 "icmpv6.nd.ns.target_address",
4090 "icmpv6.opt.linkaddr" ],
4093 for l in res.splitlines():
4094 frames.append(l.split('\t'))
4097 def tshark_get_na(cap):
4098 res = run_tshark(cap, "icmpv6.type == 136",
4099 [ "eth.dst", "eth.src",
4100 "ipv6.src", "ipv6.dst",
4101 "icmpv6.nd.na.target_address",
4102 "icmpv6.opt.linkaddr" ],
4105 for l in res.splitlines():
4106 frames.append(l.split('\t'))
4109 def _test_proxyarp_open(dev, apdev, params, ebtables=False):
4110 prefix = "proxyarp_open"
4112 prefix += "_ebtables"
4113 cap_br = os.path.join(params['logdir'], prefix + ".ap-br0.pcap")
4114 cap_dev0 = os.path.join(params['logdir'],
4115 prefix + ".%s.pcap" % dev[0].ifname)
4116 cap_dev1 = os.path.join(params['logdir'],
4117 prefix + ".%s.pcap" % dev[1].ifname)
4118 cap_dev2 = os.path.join(params['logdir'],
4119 prefix + ".%s.pcap" % dev[2].ifname)
4121 bssid = apdev[0]['bssid']
4122 params = { 'ssid': 'open' }
4123 params['proxy_arp'] = '1'
4124 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
4125 hapd.set("ap_isolate", "1")
4126 hapd.set('bridge', 'ap-br0')
4131 # For now, do not report failures due to missing kernel support
4132 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
4133 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
4135 raise Exception("AP startup timed out")
4136 if "AP-ENABLED" not in ev:
4137 raise Exception("AP startup failed")
4139 params2 = { 'ssid': 'another' }
4140 hapd2 = hostapd.add_ap(apdev[1], params2, no_enable=True)
4141 hapd2.set('bridge', 'ap-br0')
4144 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
4145 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
4148 for chain in [ 'FORWARD', 'OUTPUT' ]:
4149 subprocess.call(['ebtables', '-A', chain, '-p', 'ARP',
4150 '-d', 'Broadcast', '-o', apdev[0]['ifname'],
4152 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
4153 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4154 '--ip6-icmp-type', 'neighbor-solicitation',
4155 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4156 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
4157 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4158 '--ip6-icmp-type', 'neighbor-advertisement',
4159 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4160 subprocess.call(['ebtables', '-A', chain,
4161 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4162 '--ip6-icmp-type', 'router-solicitation',
4163 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4164 # Multicast Listener Report Message
4165 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
4166 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4167 '--ip6-icmp-type', '143',
4168 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4172 cmd[0] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', 'ap-br0',
4173 '-w', cap_br, '-s', '2000'],
4174 stderr=open('/dev/null', 'w'))
4175 cmd[1] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[0].ifname,
4176 '-w', cap_dev0, '-s', '2000'],
4177 stderr=open('/dev/null', 'w'))
4178 cmd[2] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[1].ifname,
4179 '-w', cap_dev1, '-s', '2000'],
4180 stderr=open('/dev/null', 'w'))
4181 cmd[3] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[2].ifname,
4182 '-w', cap_dev2, '-s', '2000'],
4183 stderr=open('/dev/null', 'w'))
4185 dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
4186 dev[1].connect("open", key_mgmt="NONE", scan_freq="2412")
4187 dev[2].connect("another", key_mgmt="NONE", scan_freq="2412")
4190 brcmd = subprocess.Popen(['brctl', 'show'], stdout=subprocess.PIPE)
4191 res = brcmd.stdout.read()
4192 brcmd.stdout.close()
4193 logger.info("Bridge setup: " + res)
4195 brcmd = subprocess.Popen(['brctl', 'showstp', 'ap-br0'],
4196 stdout=subprocess.PIPE)
4197 res = brcmd.stdout.read()
4198 brcmd.stdout.close()
4199 logger.info("Bridge showstp: " + res)
4201 addr0 = dev[0].p2p_interface_addr()
4202 addr1 = dev[1].p2p_interface_addr()
4203 addr2 = dev[2].p2p_interface_addr()
4205 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
4206 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
4209 send_ns(dev[0], ip_src="::", target="aaaa:bbbb:cccc::2")
4211 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2")
4212 # test frame without source link-layer address option
4213 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4215 # test frame with bogus option
4216 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4217 opt="\x70\x01\x01\x02\x03\x04\x05\x05")
4218 # test frame with truncated source link-layer address option
4219 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4220 opt="\x01\x01\x01\x02\x03\x04")
4221 # test frame with foreign source link-layer address option
4222 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4223 opt="\x01\x01\x01\x02\x03\x04\x05\x06")
4225 send_ns(dev[1], ip_src="aaaa:bbbb:dddd::2", target="aaaa:bbbb:dddd::2")
4227 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
4228 # another copy for additional code coverage
4229 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
4231 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
4232 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4233 yiaddr="192.168.1.124", chaddr=addr0)
4234 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4235 raise Exception("DATA_TEST_FRAME failed")
4236 # Change address and verify unicast
4237 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
4238 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4239 yiaddr="192.168.1.123", chaddr=addr0)
4240 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4241 raise Exception("DATA_TEST_FRAME failed")
4243 # Not-associated client MAC address
4244 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
4245 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4246 yiaddr="192.168.1.125", chaddr="22:33:44:55:66:77")
4247 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4248 raise Exception("DATA_TEST_FRAME failed")
4251 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4252 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4253 yiaddr="0.0.0.0", chaddr=addr1)
4254 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4255 raise Exception("DATA_TEST_FRAME failed")
4258 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4259 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4260 yiaddr="192.168.1.126", chaddr=addr1,
4261 subnet_mask="0.0.0.0")
4262 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4263 raise Exception("DATA_TEST_FRAME failed")
4266 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4267 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4268 yiaddr="192.168.1.127", chaddr=addr1,
4270 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4271 raise Exception("DATA_TEST_FRAME failed")
4274 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4275 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4276 yiaddr="192.168.1.128", chaddr=addr1,
4278 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4279 raise Exception("DATA_TEST_FRAME failed")
4281 # Wrong IPv4 total length
4282 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4283 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4284 yiaddr="192.168.1.129", chaddr=addr1,
4286 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4287 raise Exception("DATA_TEST_FRAME failed")
4290 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4291 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4292 yiaddr="192.168.1.129", chaddr=addr1,
4294 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4295 raise Exception("DATA_TEST_FRAME failed")
4297 macs = get_bridge_macs("ap-br0")
4298 logger.info("After connect (showmacs): " + str(macs))
4300 matches = get_permanent_neighbors("ap-br0")
4301 logger.info("After connect: " + str(matches))
4302 if len(matches) != 4:
4303 raise Exception("Unexpected number of neighbor entries after connect")
4304 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
4305 raise Exception("dev0 addr missing")
4306 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
4307 raise Exception("dev1 addr(1) missing")
4308 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
4309 raise Exception("dev1 addr(2) missing")
4310 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
4311 raise Exception("dev0 IPv4 addr missing")
4313 targets = [ "192.168.1.123", "192.168.1.124", "192.168.1.125",
4315 for target in targets:
4316 send_arp(dev[1], sender_ip="192.168.1.100", target_ip=target)
4318 for target in targets:
4319 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.101",
4322 for target in targets:
4323 send_arp(dev[2], sender_ip="192.168.1.103", target_ip=target)
4325 # ARP Probe from wireless STA
4326 send_arp(dev[1], target_ip="192.168.1.127")
4327 # ARP Announcement from wireless STA
4328 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127")
4329 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127",
4332 macs = get_bridge_macs("ap-br0")
4333 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
4335 matches = get_permanent_neighbors("ap-br0")
4336 logger.info("After ARP Probe + Announcement: " + str(matches))
4338 # ARP Request for the newly introduced IP address from wireless STA
4339 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
4341 # ARP Request for the newly introduced IP address from bridge
4342 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
4343 target_ip="192.168.1.127")
4344 send_arp(dev[2], sender_ip="192.168.1.103", target_ip="192.168.1.127")
4346 # ARP Probe from bridge
4347 send_arp(hapd, hapd_bssid=bssid, target_ip="192.168.1.130")
4348 send_arp(dev[2], target_ip="192.168.1.131")
4349 # ARP Announcement from bridge (not to be learned by AP for proxyarp)
4350 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
4351 target_ip="192.168.1.130")
4352 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
4353 target_ip="192.168.1.130", opcode=2)
4354 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131")
4355 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131",
4358 macs = get_bridge_macs("ap-br0")
4359 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
4361 matches = get_permanent_neighbors("ap-br0")
4362 logger.info("After ARP Probe + Announcement: " + str(matches))
4364 # ARP Request for the newly introduced IP address from wireless STA
4365 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.130")
4366 # ARP Response from bridge (AP does not proxy for non-wireless devices)
4367 send_arp(hapd, hapd_bssid=bssid, dst_ll=addr0, sender_ip="192.168.1.130",
4368 target_ip="192.168.1.123", opcode=2)
4370 # ARP Request for the newly introduced IP address from wireless STA
4371 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.131")
4372 # ARP Response from bridge (AP does not proxy for non-wireless devices)
4373 send_arp(dev[2], dst_ll=addr0, sender_ip="192.168.1.131",
4374 target_ip="192.168.1.123", opcode=2)
4376 # ARP Request for the newly introduced IP address from bridge
4377 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
4378 target_ip="192.168.1.130")
4379 send_arp(dev[2], sender_ip="192.168.1.104", target_ip="192.168.1.131")
4381 # ARP Probe from wireless STA (duplicate address; learned through DHCP)
4382 send_arp(dev[1], target_ip="192.168.1.123")
4383 # ARP Probe from wireless STA (duplicate address; learned through ARP)
4384 send_arp(dev[0], target_ip="192.168.1.127")
4386 # Gratuitous ARP Reply for another STA's IP address
4387 send_arp(dev[0], opcode=2, sender_mac=addr0, sender_ip="192.168.1.127",
4388 target_mac=addr1, target_ip="192.168.1.127")
4389 send_arp(dev[1], opcode=2, sender_mac=addr1, sender_ip="192.168.1.123",
4390 target_mac=addr0, target_ip="192.168.1.123")
4391 # ARP Request to verify previous mapping
4392 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.123")
4393 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
4397 send_ns(dev[0], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:cccc::2")
4399 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:dddd::2")
4401 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:dddd::2",
4402 ip_src="aaaa:bbbb:ffff::2")
4404 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:ff00::2")
4406 send_ns(dev[2], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:ff00::2")
4408 send_ns(dev[2], target="aaaa:bbbb:eeee::2", ip_src="aaaa:bbbb:ff00::2")
4411 # Try to probe for an already assigned address
4412 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="::")
4414 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc::2", ip_src="::")
4416 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="::")
4420 send_na(dev[1], target="aaaa:bbbb:cccc:aeae::3",
4421 ip_src="aaaa:bbbb:cccc:aeae::3", ip_dst="ff02::1")
4422 send_na(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc:aeae::4",
4423 ip_src="aaaa:bbbb:cccc:aeae::4", ip_dst="ff02::1")
4424 send_na(dev[2], target="aaaa:bbbb:cccc:aeae::5",
4425 ip_src="aaaa:bbbb:cccc:aeae::5", ip_dst="ff02::1")
4428 hwsim_utils.test_connectivity_iface(dev[0], hapd, "ap-br0")
4429 except Exception, e:
4430 logger.info("test_connectibity_iface failed: " + str(e))
4431 raise HwsimSkip("Assume kernel did not have the required patches for proxyarp")
4432 hwsim_utils.test_connectivity_iface(dev[1], hapd, "ap-br0")
4433 hwsim_utils.test_connectivity(dev[0], dev[1])
4435 dev[0].request("DISCONNECT")
4436 dev[1].request("DISCONNECT")
4438 for i in range(len(cmd)):
4440 macs = get_bridge_macs("ap-br0")
4441 logger.info("After disconnect (showmacs): " + str(macs))
4442 matches = get_permanent_neighbors("ap-br0")
4443 logger.info("After disconnect: " + str(matches))
4444 if len(matches) > 0:
4445 raise Exception("Unexpected neighbor entries after disconnect")
4447 cmd = subprocess.Popen(['ebtables', '-L', '--Lc'],
4448 stdout=subprocess.PIPE)
4449 res = cmd.stdout.read()
4451 logger.info("ebtables results:\n" + res)
4453 # Verify that expected ARP messages were seen and no unexpected
4454 # ARP messages were seen.
4456 arp_req = tshark_get_arp(cap_dev0, "arp.opcode == 1")
4457 arp_reply = tshark_get_arp(cap_dev0, "arp.opcode == 2")
4458 logger.info("dev0 seen ARP requests:\n" + str(arp_req))
4459 logger.info("dev0 seen ARP replies:\n" + str(arp_reply))
4461 if [ 'ff:ff:ff:ff:ff:ff', addr1,
4462 addr1, '192.168.1.100',
4463 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4464 raise Exception("dev0 saw ARP request from dev1")
4465 if [ 'ff:ff:ff:ff:ff:ff', addr2,
4466 addr2, '192.168.1.103',
4467 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4468 raise Exception("dev0 saw ARP request from dev2")
4469 # TODO: Uncomment once fixed in kernel
4470 #if [ 'ff:ff:ff:ff:ff:ff', bssid,
4471 # bssid, '192.168.1.101',
4472 # '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4473 # raise Exception("dev0 saw ARP request from br")
4478 raise Exception("Unexpected foreign ARP request on dev0")
4480 arp_req = tshark_get_arp(cap_dev1, "arp.opcode == 1")
4481 arp_reply = tshark_get_arp(cap_dev1, "arp.opcode == 2")
4482 logger.info("dev1 seen ARP requests:\n" + str(arp_req))
4483 logger.info("dev1 seen ARP replies:\n" + str(arp_reply))
4485 if [ 'ff:ff:ff:ff:ff:ff', addr2,
4486 addr2, '192.168.1.103',
4487 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4488 raise Exception("dev1 saw ARP request from dev2")
4489 if [addr1, addr0, addr0, '192.168.1.123', addr1, '192.168.1.100'] not in arp_reply:
4490 raise Exception("dev1 did not get ARP response for 192.168.1.123")
4495 raise Exception("Unexpected foreign ARP request on dev1")
4497 arp_req = tshark_get_arp(cap_dev2, "arp.opcode == 1")
4498 arp_reply = tshark_get_arp(cap_dev2, "arp.opcode == 2")
4499 logger.info("dev2 seen ARP requests:\n" + str(arp_req))
4500 logger.info("dev2 seen ARP replies:\n" + str(arp_reply))
4503 addr0, '192.168.1.123',
4504 addr2, '192.168.1.103' ] not in arp_reply:
4505 raise Exception("dev2 did not get ARP response for 192.168.1.123")
4507 arp_req = tshark_get_arp(cap_br, "arp.opcode == 1")
4508 arp_reply = tshark_get_arp(cap_br, "arp.opcode == 2")
4509 logger.info("br seen ARP requests:\n" + str(arp_req))
4510 logger.info("br seen ARP replies:\n" + str(arp_reply))
4512 # TODO: Uncomment once fixed in kernel
4514 # addr0, '192.168.1.123',
4515 # bssid, '192.168.1.101' ] not in arp_reply:
4516 # raise Exception("br did not get ARP response for 192.168.1.123")
4518 ns = tshark_get_ns(cap_dev0)
4519 logger.info("dev0 seen NS: " + str(ns))
4520 na = tshark_get_na(cap_dev0)
4521 logger.info("dev0 seen NA: " + str(na))
4523 if [ addr0, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:cccc::2',
4524 'aaaa:bbbb:dddd::2', addr1 ] not in na:
4525 raise Exception("dev0 did not get NA for aaaa:bbbb:dddd::2")
4530 raise Exception("Unexpected foreign NS on dev0: " + str(req))
4532 ns = tshark_get_ns(cap_dev1)
4533 logger.info("dev1 seen NS: " + str(ns))
4534 na = tshark_get_na(cap_dev1)
4535 logger.info("dev1 seen NA: " + str(na))
4537 if [ addr1, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:dddd::2',
4538 'aaaa:bbbb:cccc::2', addr0 ] not in na:
4539 raise Exception("dev1 did not get NA for aaaa:bbbb:cccc::2")
4544 raise Exception("Unexpected foreign NS on dev1: " + str(req))
4546 ns = tshark_get_ns(cap_dev2)
4547 logger.info("dev2 seen NS: " + str(ns))
4548 na = tshark_get_na(cap_dev2)
4549 logger.info("dev2 seen NA: " + str(na))
4551 # FIX: enable once kernel implementation for proxyarp IPv6 is fixed
4552 #if [ addr2, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:ff00::2',
4553 # 'aaaa:bbbb:cccc::2', addr0 ] not in na:
4554 # raise Exception("dev2 did not get NA for aaaa:bbbb:cccc::2")
4555 #if [ addr2, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:ff00::2',
4556 # 'aaaa:bbbb:dddd::2', addr1 ] not in na:
4557 # raise Exception("dev2 did not get NA for aaaa:bbbb:dddd::2")
4558 #if [ addr2, addr1, 'aaaa:bbbb:eeee::2', 'aaaa:bbbb:ff00::2',
4559 # 'aaaa:bbbb:eeee::2', addr1 ] not in na:
4560 # raise Exception("dev2 did not get NA for aaaa:bbbb:eeee::2")
4562 def test_proxyarp_open(dev, apdev, params):
4563 """ProxyARP with open network"""
4565 _test_proxyarp_open(dev, apdev, params)
4567 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
4568 stderr=open('/dev/null', 'w'))
4569 subprocess.call(['brctl', 'delbr', 'ap-br0'],
4570 stderr=open('/dev/null', 'w'))
4572 def test_proxyarp_open_ebtables(dev, apdev, params):
4573 """ProxyARP with open network"""
4575 _test_proxyarp_open(dev, apdev, params, ebtables=True)
4578 subprocess.call(['ebtables', '-F', 'FORWARD'])
4579 subprocess.call(['ebtables', '-F', 'OUTPUT'])
4582 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
4583 stderr=open('/dev/null', 'w'))
4584 subprocess.call(['brctl', 'delbr', 'ap-br0'],
4585 stderr=open('/dev/null', 'w'))
4587 def test_ap_hs20_connect_deinit(dev, apdev):
4588 """Hotspot 2.0 connection interrupted with deinit"""
4589 check_eap_capa(dev[0], "MSCHAPV2")
4590 bssid = apdev[0]['bssid']
4591 params = hs20_ap_params()
4592 params['hessid'] = bssid
4593 hapd = hostapd.add_ap(apdev[0], params)
4595 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
4596 wpas.interface_add("wlan5", drv_params="")
4598 wpas.flush_scan_cache()
4599 wpas.add_cred_values({ 'realm': "example.com",
4600 'username': "hs20-test",
4601 'password': "password",
4602 'ca_cert': "auth_serv/ca.pem",
4603 'domain': "example.com" })
4605 wpas.scan_for_bss(bssid, freq=2412)
4608 wpas.request("INTERWORKING_SELECT freq=2412")
4610 id = wpas.request("RADIO_WORK add block-work")
4611 ev = wpas.wait_event(["GAS-QUERY-START", "EXT-RADIO-WORK-START"], timeout=5)
4613 raise Exception("Timeout while waiting radio work to start")
4614 ev = wpas.wait_event(["GAS-QUERY-START", "EXT-RADIO-WORK-START"], timeout=5)
4616 raise Exception("Timeout while waiting radio work to start (2)")
4618 # Remove the interface while the gas-query radio work is still pending and
4619 # GAS query has not yet been started.
4620 wpas.interface_remove("wlan5")
4622 def test_ap_hs20_anqp_format_errors(dev, apdev):
4623 """Interworking network selection and ANQP format errors"""
4624 bssid = apdev[0]['bssid']
4625 params = hs20_ap_params()
4626 params['hessid'] = bssid
4627 hapd = hostapd.add_ap(apdev[0], params)
4629 dev[0].hs20_enable()
4630 values = { 'realm': "example.com",
4631 'ca_cert': "auth_serv/ca.pem",
4632 'username': "hs20-test",
4633 'password': "password",
4634 'domain': "example.com" }
4635 id = dev[0].add_cred_values(values)
4637 dev[0].scan_for_bss(bssid, freq="2412")
4639 tests = [ "00", "ffff", "010011223344", "020008000005112233445500",
4640 "01000400000000", "01000000000000",
4641 "01000300000200", "0100040000ff0000", "01000300000100",
4643 "01000600000056112233",
4644 "01000900000002050001000111",
4645 "01000600000001000000", "01000600000001ff0000",
4646 "01000600000001020001",
4647 "010008000000010400010001", "0100080000000104000100ff",
4648 "010011000000010d00050200020100030005000600",
4651 hapd.set("anqp_elem", "263:" + t)
4652 dev[0].request("INTERWORKING_SELECT freq=2412")
4653 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=5)
4655 raise Exception("Network selection timed out")
4656 dev[0].dump_monitor()
4658 dev[0].remove_cred(id)
4659 id = dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "AKA",
4660 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
4662 tests = [ "00", "0100", "0001", "00ff", "000200ff", "0003000101",
4665 hapd.set("anqp_elem", "264:" + t)
4666 dev[0].request("INTERWORKING_SELECT freq=2412")
4667 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=5)
4669 raise Exception("Network selection timed out")
4670 dev[0].dump_monitor()
4672 def test_ap_hs20_cred_with_nai_realm(dev, apdev):
4673 """Hotspot 2.0 network selection and cred_with_nai_realm cred->realm"""
4674 bssid = apdev[0]['bssid']
4675 params = hs20_ap_params()
4676 params['hessid'] = bssid
4677 hostapd.add_ap(apdev[0], params)
4679 dev[0].hs20_enable()
4681 id = dev[0].add_cred_values({ 'realm': "example.com",
4683 'password': "secret",
4684 'domain': "example.com",
4686 interworking_select(dev[0], bssid, "home", freq=2412)
4687 dev[0].remove_cred(id)
4689 id = dev[0].add_cred_values({ 'realm': "foo.com",
4691 'password': "secret",
4692 'domain': "example.com",
4693 'roaming_consortium': "112234",
4695 interworking_select(dev[0], bssid, "home", freq=2412, no_match=True)
4696 dev[0].remove_cred(id)
4698 def test_ap_hs20_cred_and_no_roaming_consortium(dev, apdev):
4699 """Hotspot 2.0 network selection and no roaming consortium"""
4700 bssid = apdev[0]['bssid']
4701 params = hs20_ap_params()
4702 params['hessid'] = bssid
4703 del params['roaming_consortium']
4704 hostapd.add_ap(apdev[0], params)
4706 dev[0].hs20_enable()
4708 id = dev[0].add_cred_values({ 'realm': "example.com",
4710 'password': "secret",
4711 'domain': "example.com",
4712 'roaming_consortium': "112234",
4714 interworking_select(dev[0], bssid, "home", freq=2412, no_match=True)
4716 def test_ap_hs20_interworking_oom(dev, apdev):
4717 """Hotspot 2.0 network selection and OOM"""
4718 bssid = apdev[0]['bssid']
4719 params = hs20_ap_params()
4720 params['hessid'] = bssid
4721 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]",
4722 "0,example.com,13[5:6],21[2:4][5:7]",
4723 "0,another.example.com" ]
4724 hostapd.add_ap(apdev[0], params)
4726 dev[0].hs20_enable()
4728 id = dev[0].add_cred_values({ 'realm': "example.com",
4730 'password': "secret",
4731 'domain': "example.com",
4734 dev[0].scan_for_bss(bssid, freq="2412")
4736 funcs = [ "wpabuf_alloc;interworking_anqp_send_req",
4737 "anqp_build_req;interworking_anqp_send_req",
4738 "gas_query_req;interworking_anqp_send_req",
4739 "dup_binstr;nai_realm_parse_realm",
4740 "=nai_realm_parse_realm",
4742 "=nai_realm_match" ]
4744 with alloc_fail(dev[0], 1, func):
4745 dev[0].request("INTERWORKING_SELECT auto freq=2412")
4746 ev = dev[0].wait_event(["Starting ANQP"], timeout=5)
4748 raise Exception("ANQP did not start")
4749 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4751 def test_ap_hs20_no_cred_connect(dev, apdev):
4752 """Hotspot 2.0 and connect attempt without credential"""
4753 bssid = apdev[0]['bssid']
4754 params = hs20_ap_params()
4755 params['hessid'] = bssid
4756 hapd = hostapd.add_ap(apdev[0], params)
4758 dev[0].hs20_enable()
4759 dev[0].scan_for_bss(bssid, freq="2412")
4760 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4761 raise Exception("Unexpected INTERWORKING_CONNECT success")
4763 def test_ap_hs20_no_rsn_connect(dev, apdev):
4764 """Hotspot 2.0 and connect attempt without RSN"""
4765 bssid = apdev[0]['bssid']
4766 params = hostapd.wpa_params(ssid="test-hs20")
4767 params['wpa_key_mgmt'] = "WPA-EAP"
4768 params['ieee80211w'] = "1"
4769 params['ieee8021x'] = "1"
4770 params['auth_server_addr'] = "127.0.0.1"
4771 params['auth_server_port'] = "1812"
4772 params['auth_server_shared_secret'] = "radius"
4773 params['interworking'] = "1"
4774 params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
4776 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
4777 "0,another.example.com" ]
4778 hapd = hostapd.add_ap(apdev[0], params)
4780 dev[0].hs20_enable()
4781 dev[0].scan_for_bss(bssid, freq="2412")
4783 id = dev[0].add_cred_values({ 'realm': "example.com",
4785 'password': "secret",
4786 'domain': "example.com",
4787 'roaming_consortium': "112233",
4790 interworking_select(dev[0], bssid, freq=2412, no_match=True)
4791 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4792 raise Exception("Unexpected INTERWORKING_CONNECT success")
4794 def test_ap_hs20_no_match_connect(dev, apdev):
4795 """Hotspot 2.0 and connect attempt without matching cred"""
4796 bssid = apdev[0]['bssid']
4797 params = hs20_ap_params()
4798 hapd = hostapd.add_ap(apdev[0], params)
4800 dev[0].hs20_enable()
4801 dev[0].scan_for_bss(bssid, freq="2412")
4803 id = dev[0].add_cred_values({ 'realm': "example.org",
4805 'password': "secret",
4806 'domain': "example.org",
4807 'roaming_consortium': "112234",
4810 interworking_select(dev[0], bssid, freq=2412, no_match=True)
4811 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4812 raise Exception("Unexpected INTERWORKING_CONNECT success")
4814 def test_ap_hs20_multiple_home_cred(dev, apdev):
4815 """Hotspot 2.0 and select with multiple matching home credentials"""
4816 bssid = apdev[0]['bssid']
4817 params = hs20_ap_params()
4818 params['hessid'] = bssid
4819 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
4820 params['domain_name'] = "example.com"
4821 hapd = hostapd.add_ap(apdev[0], params)
4823 bssid2 = apdev[1]['bssid']
4824 params = hs20_ap_params(ssid="test-hs20-other")
4825 params['hessid'] = bssid2
4826 params['nai_realm'] = [ "0,example.org,13[5:6],21[2:4][5:7]" ]
4827 params['domain_name'] = "example.org"
4828 hapd2 = hostapd.add_ap(apdev[1], params)
4830 dev[0].hs20_enable()
4831 dev[0].scan_for_bss(bssid2, freq="2412")
4832 dev[0].scan_for_bss(bssid, freq="2412")
4833 id = dev[0].add_cred_values({ 'realm': "example.com",
4835 'username': "hs20-test",
4836 'password': "password",
4837 'domain': "example.com" })
4838 id2 = dev[0].add_cred_values({ 'realm': "example.org",
4840 'username': "hs20-test",
4841 'password': "password",
4842 'domain': "example.org" })
4843 dev[0].request("INTERWORKING_SELECT auto freq=2412")
4844 ev = dev[0].wait_connected(timeout=15)
4845 if bssid2 not in ev:
4846 raise Exception("Connected to incorrect network")
4848 def test_ap_hs20_anqp_invalid_gas_response(dev, apdev):
4849 """Hotspot 2.0 network selection and invalid GAS response"""
4850 bssid = apdev[0]['bssid']
4851 params = hs20_ap_params()
4852 params['hessid'] = bssid
4853 hapd = hostapd.add_ap(apdev[0], params)
4855 dev[0].scan_for_bss(bssid, freq="2412")
4856 hapd.set("ext_mgmt_frame_handling", "1")
4858 dev[0].hs20_enable()
4860 id = dev[0].add_cred_values({ 'realm': "example.com",
4862 'password': "secret",
4863 'domain': "example.com",
4864 'roaming_consortium': "112234",
4866 dev[0].request("INTERWORKING_SELECT freq=2412")
4868 query = gas_rx(hapd)
4869 gas = parse_gas(query['payload'])
4871 logger.info("ANQP: Unexpected Advertisement Protocol in response")
4872 resp = action_response(query)
4873 adv_proto = struct.pack('8B', 108, 6, 127, 0xdd, 0x00, 0x11, 0x22, 0x33)
4874 data = struct.pack('<H', 0)
4875 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4876 GAS_INITIAL_RESPONSE,
4877 gas['dialog_token'], 0, 0) + adv_proto + data
4878 send_gas_resp(hapd, resp)
4880 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4882 raise Exception("No ANQP-QUERY-DONE seen")
4883 if "result=INVALID_FRAME" not in ev:
4884 raise Exception("Unexpected result: " + ev)
4886 dev[0].request("INTERWORKING_SELECT freq=2412")
4888 query = gas_rx(hapd)
4889 gas = parse_gas(query['payload'])
4891 logger.info("ANQP: Invalid element length for Info ID 1234")
4892 resp = action_response(query)
4893 adv_proto = struct.pack('BBBB', 108, 2, 127, 0)
4894 elements = struct.pack('<HH', 1234, 1)
4895 data = struct.pack('<H', len(elements)) + elements
4896 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4897 GAS_INITIAL_RESPONSE,
4898 gas['dialog_token'], 0, 0) + adv_proto + data
4899 send_gas_resp(hapd, resp)
4901 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4903 raise Exception("No ANQP-QUERY-DONE seen")
4904 if "result=INVALID_FRAME" not in ev:
4905 raise Exception("Unexpected result: " + ev)
4907 with alloc_fail(dev[0], 1, "=anqp_add_extra"):
4908 dev[0].request("INTERWORKING_SELECT freq=2412")
4910 query = gas_rx(hapd)
4911 gas = parse_gas(query['payload'])
4913 resp = action_response(query)
4914 elements = struct.pack('<HHHH', 1, 0, 1, 0)
4915 data = struct.pack('<H', len(elements)) + elements
4916 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4917 GAS_INITIAL_RESPONSE,
4918 gas['dialog_token'], 0, 0) + adv_proto + data
4919 send_gas_resp(hapd, resp)
4921 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4923 raise Exception("No ANQP-QUERY-DONE seen")
4924 if "result=SUCCESS" not in ev:
4925 raise Exception("Unexpected result: " + ev)
4927 with alloc_fail(dev[0], 1, "wpabuf_alloc_copy;anqp_add_extra"):
4928 dev[0].request("INTERWORKING_SELECT freq=2412")
4930 query = gas_rx(hapd)
4931 gas = parse_gas(query['payload'])
4933 resp = action_response(query)
4934 elements = struct.pack('<HHHH', 1, 0, 1, 0)
4935 data = struct.pack('<H', len(elements)) + elements
4936 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4937 GAS_INITIAL_RESPONSE,
4938 gas['dialog_token'], 0, 0) + adv_proto + data
4939 send_gas_resp(hapd, resp)
4941 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4943 raise Exception("No ANQP-QUERY-DONE seen")
4944 if "result=SUCCESS" not in ev:
4945 raise Exception("Unexpected result: " + ev)
4947 tests = [ struct.pack('<HH', 0xdddd, 0),
4948 struct.pack('<HH3B', 0xdddd, 3, 0x50, 0x6f, 0x9a),
4949 struct.pack('<HH4B', 0xdddd, 4, 0x50, 0x6f, 0x9a, 0),
4950 struct.pack('<HH4B', 0xdddd, 4, 0x11, 0x22, 0x33, 0),
4951 struct.pack('<HHHH', 1, 0, 1, 0) ]
4952 for elements in tests:
4953 dev[0].request("INTERWORKING_SELECT freq=2412")
4955 query = gas_rx(hapd)
4956 gas = parse_gas(query['payload'])
4958 resp = action_response(query)
4959 data = struct.pack('<H', len(elements)) + elements
4960 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4961 GAS_INITIAL_RESPONSE,
4962 gas['dialog_token'], 0, 0) + adv_proto + data
4963 send_gas_resp(hapd, resp)
4965 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4967 raise Exception("No ANQP-QUERY-DONE seen")
4968 if "result=SUCCESS" not in ev:
4969 raise Exception("Unexpected result: " + ev)
4971 def test_ap_hs20_set_profile_failures(dev, apdev):
4972 """Hotspot 2.0 and failures during profile configuration"""
4973 bssid = apdev[0]['bssid']
4974 params = hs20_ap_params()
4975 params['hessid'] = bssid
4976 params['anqp_3gpp_cell_net'] = "555,444"
4977 hapd = hostapd.add_ap(apdev[0], params)
4979 dev[0].hs20_enable()
4980 dev[0].scan_for_bss(bssid, freq="2412")
4982 id = dev[0].add_cred_values({ 'realm': "example.com",
4983 'domain': "example.com",
4985 'password': "secret",
4987 interworking_select(dev[0], bssid, "home", freq=2412)
4988 dev[0].dump_monitor()
4989 dev[0].request("NOTE ssid->eap.eap_methods = os_malloc()")
4990 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
4991 dev[0].request("INTERWORKING_CONNECT " + bssid)
4992 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4993 dev[0].remove_cred(id)
4995 id = dev[0].add_cred_values({ 'realm': "example.com",
4996 'domain': "example.com",
4997 'username': "hs20-test-with-domain@example.com",
4998 'password': "password" })
4999 interworking_select(dev[0], bssid, "home", freq=2412)
5000 dev[0].dump_monitor()
5001 dev[0].request("NOTE anon = os_malloc()")
5002 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
5003 dev[0].request("INTERWORKING_CONNECT " + bssid)
5004 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5005 dev[0].request("NOTE Successful connection with cred->username including realm")
5006 dev[0].request("INTERWORKING_CONNECT " + bssid)
5007 dev[0].wait_connected()
5008 dev[0].remove_cred(id)
5009 dev[0].wait_disconnected()
5011 id = dev[0].add_cred_values({ 'realm': "example.com",
5012 'domain': "example.com",
5013 'username': "hs20-test",
5014 'password': "password" })
5015 interworking_select(dev[0], bssid, "home", freq=2412)
5016 dev[0].dump_monitor()
5017 dev[0].request("NOTE anon = os_malloc() (second)")
5018 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
5019 dev[0].request("INTERWORKING_CONNECT " + bssid)
5020 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5021 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect"):
5022 dev[0].request("INTERWORKING_CONNECT " + bssid)
5023 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5024 with alloc_fail(dev[0], 1, "=interworking_connect"):
5025 dev[0].request("INTERWORKING_CONNECT " + bssid)
5026 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5027 dev[0].request("NOTE wpa_config_set(eap)")
5028 with alloc_fail(dev[0], 1, "wpa_config_parse_eap;wpa_config_set;interworking_connect"):
5029 dev[0].request("INTERWORKING_CONNECT " + bssid)
5030 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5031 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_MSCHAPV2-phase2)")
5032 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5033 dev[0].request("INTERWORKING_CONNECT " + bssid)
5034 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5035 dev[0].remove_cred(id)
5037 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5038 'domain': "example.com",
5039 'username': "hs20-test",
5040 'password': "password",
5042 'phase2': "auth=MSCHAPV2" })
5043 interworking_select(dev[0], bssid, "home", freq=2412)
5044 dev[0].dump_monitor()
5045 dev[0].request("NOTE anon = os_strdup()")
5046 with alloc_fail(dev[0], 2, "interworking_set_eap_params"):
5047 dev[0].request("INTERWORKING_CONNECT " + bssid)
5048 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5049 dev[0].request("NOTE wpa_config_set_quoted(anonymous_identity)")
5050 with alloc_fail(dev[0], 1, "=wpa_config_set_quoted;interworking_set_eap_params"):
5051 dev[0].request("INTERWORKING_CONNECT " + bssid)
5052 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5053 dev[0].request("NOTE Successful connection with cred->realm not included")
5054 dev[0].request("INTERWORKING_CONNECT " + bssid)
5055 dev[0].wait_connected()
5056 dev[0].remove_cred(id)
5057 dev[0].wait_disconnected()
5059 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5060 'domain': "example.com",
5061 'realm': "example.com",
5063 'password': "password",
5065 interworking_select(dev[0], bssid, "home", freq=2412)
5066 dev[0].dump_monitor()
5067 dev[0].request("NOTE id = os_strdup()")
5068 with alloc_fail(dev[0], 2, "interworking_set_eap_params"):
5069 dev[0].request("INTERWORKING_CONNECT " + bssid)
5070 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5071 dev[0].request("NOTE wpa_config_set_quoted(identity)")
5072 with alloc_fail(dev[0], 1, "=wpa_config_set_quoted;interworking_set_eap_params"):
5073 dev[0].request("INTERWORKING_CONNECT " + bssid)
5074 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5075 dev[0].remove_cred(id)
5077 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5078 'domain': "example.com",
5079 'realm': "example.com",
5081 'password': "password",
5083 interworking_select(dev[0], bssid, "home", freq=2412)
5084 dev[0].dump_monitor()
5085 dev[0].request("NOTE wpa_config_set_quoted(identity) (second)")
5086 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_set_eap_params"):
5087 dev[0].request("INTERWORKING_CONNECT " + bssid)
5088 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5089 dev[0].request("NOTE wpa_config_set_quoted(password)")
5090 with alloc_fail(dev[0], 3, "=wpa_config_set_quoted;interworking_set_eap_params"):
5091 dev[0].request("INTERWORKING_CONNECT " + bssid)
5092 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5093 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect_roaming_consortium"):
5094 dev[0].request("INTERWORKING_CONNECT " + bssid)
5095 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5096 with alloc_fail(dev[0], 1, "=interworking_connect_roaming_consortium"):
5097 dev[0].request("INTERWORKING_CONNECT " + bssid)
5098 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5099 dev[0].remove_cred(id)
5101 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5102 'domain': "example.com",
5103 'realm': "example.com",
5106 dev[0].set_cred(id, "password", "ext:password");
5107 interworking_select(dev[0], bssid, "home", freq=2412)
5108 dev[0].dump_monitor()
5109 dev[0].request("NOTE wpa_config_set(password)")
5110 with alloc_fail(dev[0], 3, "wpa_config_set;interworking_set_eap_params"):
5111 dev[0].request("INTERWORKING_CONNECT " + bssid)
5112 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5113 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
5114 dev[0].request("INTERWORKING_CONNECT " + bssid)
5115 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5116 dev[0].remove_cred(id)
5118 id = dev[0].add_cred_values({ 'realm': "example.com",
5119 'domain': "example.com",
5120 'username': "certificate-user",
5121 'phase1': "include_tls_length=0",
5122 'domain_suffix_match': "example.com",
5123 'ca_cert': "auth_serv/ca.pem",
5124 'client_cert': "auth_serv/user.pem",
5125 'private_key': "auth_serv/user.key",
5126 'private_key_passwd': "secret" })
5127 interworking_select(dev[0], bssid, "home", freq=2412)
5128 dev[0].dump_monitor()
5129 dev[0].request("NOTE wpa_config_set_quoted(client_cert)")
5130 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_set_eap_params"):
5131 dev[0].request("INTERWORKING_CONNECT " + bssid)
5132 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5133 dev[0].request("NOTE wpa_config_set_quoted(private_key)")
5134 with alloc_fail(dev[0], 3, "=wpa_config_set_quoted;interworking_set_eap_params"):
5135 dev[0].request("INTERWORKING_CONNECT " + bssid)
5136 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5137 dev[0].request("NOTE wpa_config_set_quoted(private_key_passwd)")
5138 with alloc_fail(dev[0], 4, "=wpa_config_set_quoted;interworking_set_eap_params"):
5139 dev[0].request("INTERWORKING_CONNECT " + bssid)
5140 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5141 dev[0].request("NOTE wpa_config_set_quoted(ca_cert)")
5142 with alloc_fail(dev[0], 5, "=wpa_config_set_quoted;interworking_set_eap_params"):
5143 dev[0].request("INTERWORKING_CONNECT " + bssid)
5144 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5145 dev[0].request("NOTE wpa_config_set_quoted(domain_suffix_match)")
5146 with alloc_fail(dev[0], 6, "=wpa_config_set_quoted;interworking_set_eap_params"):
5147 dev[0].request("INTERWORKING_CONNECT " + bssid)
5148 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5149 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
5150 dev[0].request("INTERWORKING_CONNECT " + bssid)
5151 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5152 dev[0].remove_cred(id)
5154 id = dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "SIM",
5155 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
5156 interworking_select(dev[0], bssid, freq=2412)
5157 dev[0].dump_monitor()
5158 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
5159 dev[0].request("INTERWORKING_CONNECT " + bssid)
5160 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5161 dev[0].request("NOTE wpa_config_set_quoted(password;milenage)")
5162 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_connect_3gpp"):
5163 dev[0].request("INTERWORKING_CONNECT " + bssid)
5164 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5165 dev[0].request("NOTE wpa_config_set(eap)")
5166 with alloc_fail(dev[0], 1, "wpa_config_parse_eap;wpa_config_set;interworking_connect_3gpp"):
5167 dev[0].request("INTERWORKING_CONNECT " + bssid)
5168 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5169 dev[0].request("NOTE set_root_nai:wpa_config_set(identity)")
5170 with alloc_fail(dev[0], 1, "wpa_config_parse_str;interworking_connect_3gpp"):
5171 dev[0].request("INTERWORKING_CONNECT " + bssid)
5172 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5173 dev[0].remove_cred(id)
5175 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5176 'username': "user@example.com",
5177 'password': "password" })
5178 interworking_select(dev[0], bssid, freq=2412)
5179 dev[0].dump_monitor()
5180 dev[0].request("NOTE Interworking: No EAP method set for credential using roaming consortium")
5181 dev[0].request("INTERWORKING_CONNECT " + bssid)
5182 dev[0].remove_cred(id)
5185 params = hs20_ap_params()
5186 params['nai_realm'] = "0,example.com,25[3:26]"
5187 hapd = hostapd.add_ap(apdev[0], params)
5188 id = dev[0].add_cred_values({ 'realm': "example.com",
5189 'domain': "example.com",
5190 'username': "hs20-test",
5191 'password': "password" })
5192 interworking_select(dev[0], bssid, freq=2412)
5193 dev[0].dump_monitor()
5194 dev[0].request("NOTE wpa_config_set(PEAP/FAST-phase1)")
5195 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5196 dev[0].request("INTERWORKING_CONNECT " + bssid)
5197 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5198 dev[0].request("NOTE wpa_config_set(PEAP/FAST-pac_interworking)")
5199 with alloc_fail(dev[0], 2, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5200 dev[0].request("INTERWORKING_CONNECT " + bssid)
5201 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5202 dev[0].request("NOTE wpa_config_set(PEAP/FAST-phase2)")
5203 with alloc_fail(dev[0], 3, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5204 dev[0].request("INTERWORKING_CONNECT " + bssid)
5205 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5208 params = hs20_ap_params()
5209 params['nai_realm'] = "0,example.com,21"
5210 hapd = hostapd.add_ap(apdev[0], params)
5211 interworking_select(dev[0], bssid, freq=2412)
5212 dev[0].request("NOTE wpa_config_set(TTLS-defaults-phase2)")
5213 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5214 dev[0].request("INTERWORKING_CONNECT " + bssid)
5215 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5218 params = hs20_ap_params()
5219 params['nai_realm'] = "0,example.com,21[2:3]"
5220 hapd = hostapd.add_ap(apdev[0], params)
5221 interworking_select(dev[0], bssid, freq=2412)
5222 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_MSCHAP-phase2)")
5223 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5224 dev[0].request("INTERWORKING_CONNECT " + bssid)
5225 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5228 params = hs20_ap_params()
5229 params['nai_realm'] = "0,example.com,21[2:2]"
5230 hapd = hostapd.add_ap(apdev[0], params)
5231 interworking_select(dev[0], bssid, freq=2412)
5232 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_CHAP-phase2)")
5233 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5234 dev[0].request("INTERWORKING_CONNECT " + bssid)
5235 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5238 params = hs20_ap_params()
5239 params['nai_realm'] = "0,example.com,21[2:1]"
5240 hapd = hostapd.add_ap(apdev[0], params)
5241 interworking_select(dev[0], bssid, freq=2412)
5242 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_PAP-phase2)")
5243 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5244 dev[0].request("INTERWORKING_CONNECT " + bssid)
5245 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5248 params = hs20_ap_params()
5249 params['nai_realm'] = "0,example.com,21[3:26]"
5250 hapd = hostapd.add_ap(apdev[0], params)
5251 interworking_select(dev[0], bssid, freq=2412)
5252 dev[0].request("NOTE wpa_config_set(TTLS-EAP-MSCHAPV2-phase2)")
5253 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5254 dev[0].request("INTERWORKING_CONNECT " + bssid)
5255 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5257 dev[0].remove_cred(id)
5259 def test_ap_hs20_unexpected(dev, apdev):
5260 """Unexpected Hotspot 2.0 AP configuration"""
5261 check_eap_capa(dev[0], "MSCHAPV2")
5262 bssid = apdev[0]['bssid']
5263 params = hostapd.wpa_eap_params(ssid="test-hs20-fake")
5265 params['wpa_pairwise'] = "TKIP CCMP"
5266 params['rsn_pairwise'] = "CCMP"
5267 #params['vendor_elements'] = 'dd07506f9a10140000'
5268 params['vendor_elements'] = 'dd04506f9a10'
5269 hostapd.add_ap(apdev[0], params)
5271 dev[0].hs20_enable()
5272 dev[0].scan_for_bss(bssid, freq="2412")
5273 dev[0].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
5275 identity="hs20-test", password="password",
5276 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
5279 dev[1].hs20_enable()
5280 dev[1].scan_for_bss(bssid, freq="2412")
5281 dev[1].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
5283 identity="hs20-test", password="password",
5284 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
5287 dev[2].hs20_enable()
5288 dev[2].scan_for_bss(bssid, freq="2412")
5289 dev[2].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
5290 proto="RSN", pairwise="CCMP",
5291 identity="hs20-test", password="password",
5292 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",