2 # Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
7 from remotehost import remote_compatible
13 logger = logging.getLogger()
20 from utils import HwsimSkip, skip_with_fips, alloc_fail, wait_fail_trigger
22 from tshark import run_tshark
23 from wlantest import Wlantest
24 from wpasupplicant import WpaSupplicant
25 from test_ap_eap import check_eap_capa, check_domain_match_full
26 from test_gas import gas_rx, parse_gas, action_response, anqp_initial_resp, send_gas_resp, ACTION_CATEG_PUBLIC, GAS_INITIAL_RESPONSE
28 def hs20_ap_params(ssid="test-hs20"):
29 params = hostapd.wpa2_params(ssid=ssid)
30 params['wpa_key_mgmt'] = "WPA-EAP"
31 params['ieee80211w'] = "1"
32 params['ieee8021x'] = "1"
33 params['auth_server_addr'] = "127.0.0.1"
34 params['auth_server_port'] = "1812"
35 params['auth_server_shared_secret'] = "radius"
36 params['interworking'] = "1"
37 params['access_network_type'] = "14"
38 params['internet'] = "1"
42 params['venue_group'] = "7"
43 params['venue_type'] = "1"
44 params['venue_name'] = [ "eng:Example venue", "fin:Esimerkkipaikka" ]
45 params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
47 params['domain_name'] = "example.com,another.example.com"
48 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
49 "0,another.example.com" ]
51 params['hs20_wan_metrics'] = "01:8000:1000:80:240:3000"
52 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0" ]
53 params['hs20_operating_class'] = "5173"
54 params['anqp_3gpp_cell_net'] = "244,91"
57 def check_auto_select(dev, bssid):
58 dev.scan_for_bss(bssid, freq="2412")
59 dev.request("INTERWORKING_SELECT auto freq=2412")
60 ev = dev.wait_connected(timeout=15)
62 raise Exception("Connected to incorrect network")
63 dev.request("REMOVE_NETWORK all")
64 dev.wait_disconnected()
67 def interworking_select(dev, bssid, type=None, no_match=False, freq=None):
69 if bssid and freq and not no_match:
70 dev.scan_for_bss(bssid, freq=freq)
71 freq_extra = " freq=" + str(freq) if freq else ""
72 dev.request("INTERWORKING_SELECT" + freq_extra)
73 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
76 raise Exception("Network selection timed out")
78 if "INTERWORKING-NO-MATCH" not in ev:
79 raise Exception("Unexpected network match")
81 if "INTERWORKING-NO-MATCH" in ev:
82 logger.info("Matching network not found - try again")
84 dev.request("INTERWORKING_SELECT" + freq_extra)
85 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
88 raise Exception("Network selection timed out")
89 if "INTERWORKING-NO-MATCH" in ev:
90 raise Exception("Matching network not found")
91 if bssid and bssid not in ev:
92 raise Exception("Unexpected BSSID in match")
93 if type and "type=" + type not in ev:
94 raise Exception("Network type not recognized correctly")
96 def check_sp_type(dev, sp_type):
97 type = dev.get_status_field("sp_type")
99 raise Exception("sp_type not available")
101 raise Exception("sp_type did not indicate home network")
103 def hlr_auc_gw_available():
104 if not os.path.exists("/tmp/hlr_auc_gw.sock"):
105 raise HwsimSkip("No hlr_auc_gw socket available")
106 if not os.path.exists("../../hostapd/hlr_auc_gw"):
107 raise HwsimSkip("No hlr_auc_gw available")
109 def interworking_ext_sim_connect(dev, bssid, method):
110 dev.request("INTERWORKING_CONNECT " + bssid)
111 interworking_ext_sim_auth(dev, method)
113 def interworking_ext_sim_auth(dev, method):
114 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
116 raise Exception("Network connected timed out")
117 if "(" + method + ")" not in ev:
118 raise Exception("Unexpected EAP method selection")
120 ev = dev.wait_event(["CTRL-REQ-SIM"], timeout=15)
122 raise Exception("Wait for external SIM processing request timed out")
124 if p[1] != "GSM-AUTH":
125 raise Exception("Unexpected CTRL-REQ-SIM type")
126 id = p[0].split('-')[3]
127 rand = p[2].split(' ')[0]
129 res = subprocess.check_output(["../../hostapd/hlr_auc_gw",
131 "auth_serv/hlr_auc_gw.milenage_db",
132 "GSM-AUTH-REQ 232010000000000 " + rand])
133 if "GSM-AUTH-RESP" not in res:
134 raise Exception("Unexpected hlr_auc_gw response")
135 resp = res.split(' ')[2].rstrip()
137 dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp)
138 dev.wait_connected(timeout=15)
140 def interworking_connect(dev, bssid, method):
141 dev.request("INTERWORKING_CONNECT " + bssid)
142 interworking_auth(dev, method)
144 def interworking_auth(dev, method):
145 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
147 raise Exception("Network connected timed out")
148 if "(" + method + ")" not in ev:
149 raise Exception("Unexpected EAP method selection")
151 dev.wait_connected(timeout=15)
153 def check_probe_resp(wt, bssid_unexpected, bssid_expected):
155 count = wt.get_bss_counter("probe_response", bssid_unexpected)
157 raise Exception("Unexpected Probe Response frame from AP")
160 count = wt.get_bss_counter("probe_response", bssid_expected)
162 raise Exception("No Probe Response frame from AP")
164 def test_ap_anqp_sharing(dev, apdev):
165 """ANQP sharing within ESS and explicit unshare"""
166 check_eap_capa(dev[0], "MSCHAPV2")
167 dev[0].flush_scan_cache()
169 bssid = apdev[0]['bssid']
170 params = hs20_ap_params()
171 params['hessid'] = bssid
172 hostapd.add_ap(apdev[0], params)
174 bssid2 = apdev[1]['bssid']
175 params = hs20_ap_params()
176 params['hessid'] = bssid
177 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
178 hostapd.add_ap(apdev[1], params)
181 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
182 'password': "secret",
183 'domain': "example.com" })
184 logger.info("Normal network selection with shared ANQP results")
185 dev[0].scan_for_bss(bssid, freq="2412")
186 dev[0].scan_for_bss(bssid2, freq="2412")
187 interworking_select(dev[0], None, "home", freq="2412")
188 dev[0].dump_monitor()
190 logger.debug("BSS entries:\n" + dev[0].request("BSS RANGE=ALL"))
191 res1 = dev[0].get_bss(bssid)
192 res2 = dev[0].get_bss(bssid2)
193 if 'anqp_nai_realm' not in res1:
194 raise Exception("anqp_nai_realm not found for AP1")
195 if 'anqp_nai_realm' not in res2:
196 raise Exception("anqp_nai_realm not found for AP2")
197 if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
198 raise Exception("ANQP results were not shared between BSSes")
200 logger.info("Explicit ANQP request to unshare ANQP results")
201 dev[0].request("ANQP_GET " + bssid + " 263")
202 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
204 raise Exception("ANQP operation timed out")
206 dev[0].request("ANQP_GET " + bssid2 + " 263")
207 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
209 raise Exception("ANQP operation timed out")
211 res1 = dev[0].get_bss(bssid)
212 res2 = dev[0].get_bss(bssid2)
213 if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
214 raise Exception("ANQP results were not unshared")
216 def test_ap_anqp_no_sharing_diff_ess(dev, apdev):
217 """ANQP no sharing between ESSs"""
218 check_eap_capa(dev[0], "MSCHAPV2")
219 dev[0].flush_scan_cache()
221 bssid = apdev[0]['bssid']
222 params = hs20_ap_params()
223 params['hessid'] = bssid
224 hostapd.add_ap(apdev[0], params)
226 bssid2 = apdev[1]['bssid']
227 params = hs20_ap_params(ssid="test-hs20-another")
228 params['hessid'] = bssid
229 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
230 hostapd.add_ap(apdev[1], params)
233 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
234 'password': "secret",
235 'domain': "example.com" })
236 logger.info("Normal network selection with shared ANQP results")
237 dev[0].scan_for_bss(bssid, freq="2412")
238 dev[0].scan_for_bss(bssid2, freq="2412")
239 interworking_select(dev[0], None, "home", freq="2412")
241 def test_ap_anqp_no_sharing_missing_info(dev, apdev):
242 """ANQP no sharing due to missing information"""
243 check_eap_capa(dev[0], "MSCHAPV2")
244 dev[0].flush_scan_cache()
246 bssid = apdev[0]['bssid']
247 params = hs20_ap_params()
248 params['hessid'] = bssid
249 del params['roaming_consortium']
250 del params['domain_name']
251 del params['anqp_3gpp_cell_net']
252 del params['nai_realm']
253 hostapd.add_ap(apdev[0], params)
255 bssid2 = apdev[1]['bssid']
256 params = hs20_ap_params()
257 params['hessid'] = bssid
258 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
259 hostapd.add_ap(apdev[1], params)
262 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
263 'password': "secret",
264 'domain': "example.com" })
265 logger.info("Normal network selection with shared ANQP results")
266 dev[0].scan_for_bss(bssid, freq="2412")
267 dev[0].scan_for_bss(bssid2, freq="2412")
268 interworking_select(dev[0], None, "home", freq="2412")
270 def test_ap_anqp_sharing_oom(dev, apdev):
271 """ANQP sharing within ESS and explicit unshare OOM"""
272 check_eap_capa(dev[0], "MSCHAPV2")
273 dev[0].flush_scan_cache()
275 bssid = apdev[0]['bssid']
276 params = hs20_ap_params()
277 params['hessid'] = bssid
278 hostapd.add_ap(apdev[0], params)
280 bssid2 = apdev[1]['bssid']
281 params = hs20_ap_params()
282 params['hessid'] = bssid
283 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
284 hostapd.add_ap(apdev[1], params)
287 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
288 'password': "secret",
289 'domain': "example.com" })
290 dev[0].scan_for_bss(bssid, freq="2412")
291 dev[0].scan_for_bss(bssid2, freq="2412")
292 interworking_select(dev[0], None, "home", freq="2412")
293 dev[0].dump_monitor()
295 with alloc_fail(dev[0], 1, "wpa_bss_anqp_clone"):
296 dev[0].request("ANQP_GET " + bssid + " 263")
297 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
299 raise Exception("ANQP operation timed out")
301 def test_ap_nai_home_realm_query(dev, apdev):
302 """NAI Home Realm Query"""
303 check_eap_capa(dev[0], "MSCHAPV2")
304 bssid = apdev[0]['bssid']
305 params = hs20_ap_params()
306 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
307 "0,another.example.org" ]
308 hostapd.add_ap(apdev[0], params)
310 dev[0].scan(freq="2412")
311 dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " realm=example.com")
312 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
314 raise Exception("ANQP operation timed out")
315 nai1 = dev[0].get_bss(bssid)['anqp_nai_realm']
316 dev[0].dump_monitor()
318 dev[0].request("ANQP_GET " + bssid + " 263")
319 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
321 raise Exception("ANQP operation timed out")
322 nai2 = dev[0].get_bss(bssid)['anqp_nai_realm']
324 if len(nai1) >= len(nai2):
325 raise Exception("Unexpected NAI Realm list response lengths")
326 if "example.com".encode('hex') not in nai1:
327 raise Exception("Home realm not reported")
328 if "example.org".encode('hex') in nai1:
329 raise Exception("Non-home realm reported")
330 if "example.com".encode('hex') not in nai2:
331 raise Exception("Home realm not reported in wildcard query")
332 if "example.org".encode('hex') not in nai2:
333 raise Exception("Non-home realm not reported in wildcard query ")
336 "00:11:22:33:44:55 123",
337 "00:11:22:33:44:55 qq" ]
339 if "FAIL" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + cmd):
340 raise Exception("Invalid HS20_GET_NAI_HOME_REALM_LIST accepted: " + cmd)
342 dev[0].dump_monitor()
343 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
344 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
345 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
347 raise Exception("ANQP operation timed out")
348 ev = dev[0].wait_event(["RX-ANQP"], timeout=0.1)
350 raise Exception("Unexpected ANQP response: " + ev)
352 dev[0].dump_monitor()
353 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " 01000b6578616d706c652e636f6d"):
354 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
355 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
357 raise Exception("No ANQP response")
358 if "NAI Realm list" not in ev:
359 raise Exception("Missing NAI Realm list: " + ev)
361 dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
362 'password': "secret",
363 'domain': "example.com" })
364 dev[0].dump_monitor()
365 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
366 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
367 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
369 raise Exception("No ANQP response")
370 if "NAI Realm list" not in ev:
371 raise Exception("Missing NAI Realm list: " + ev)
374 def test_ap_interworking_scan_filtering(dev, apdev):
375 """Interworking scan filtering with HESSID and access network type"""
377 _test_ap_interworking_scan_filtering(dev, apdev)
379 dev[0].request("SET hessid 00:00:00:00:00:00")
380 dev[0].request("SET access_network_type 15")
382 def _test_ap_interworking_scan_filtering(dev, apdev):
383 bssid = apdev[0]['bssid']
384 params = hs20_ap_params()
385 ssid = "test-hs20-ap1"
386 params['ssid'] = ssid
387 params['hessid'] = bssid
388 hapd0 = hostapd.add_ap(apdev[0], params)
390 bssid2 = apdev[1]['bssid']
391 params = hs20_ap_params()
392 ssid2 = "test-hs20-ap2"
393 params['ssid'] = ssid2
394 params['hessid'] = bssid2
395 params['access_network_type'] = "1"
396 del params['venue_group']
397 del params['venue_type']
398 hostapd.add_ap(apdev[1], params)
402 Wlantest.setup(hapd0)
406 logger.info("Check probe request filtering based on HESSID")
408 dev[0].request("SET hessid " + bssid2)
409 dev[0].scan(freq="2412")
411 check_probe_resp(wt, bssid, bssid2)
413 logger.info("Check probe request filtering based on access network type")
415 wt.clear_bss_counters(bssid)
416 wt.clear_bss_counters(bssid2)
417 dev[0].request("SET hessid 00:00:00:00:00:00")
418 dev[0].request("SET access_network_type 14")
419 dev[0].scan(freq="2412")
421 check_probe_resp(wt, bssid2, bssid)
423 wt.clear_bss_counters(bssid)
424 wt.clear_bss_counters(bssid2)
425 dev[0].request("SET hessid 00:00:00:00:00:00")
426 dev[0].request("SET access_network_type 1")
427 dev[0].scan(freq="2412")
429 check_probe_resp(wt, bssid, bssid2)
431 logger.info("Check probe request filtering based on HESSID and ANT")
433 wt.clear_bss_counters(bssid)
434 wt.clear_bss_counters(bssid2)
435 dev[0].request("SET hessid " + bssid)
436 dev[0].request("SET access_network_type 14")
437 dev[0].scan(freq="2412")
439 check_probe_resp(wt, bssid2, bssid)
441 wt.clear_bss_counters(bssid)
442 wt.clear_bss_counters(bssid2)
443 dev[0].request("SET hessid " + bssid2)
444 dev[0].request("SET access_network_type 14")
445 dev[0].scan(freq="2412")
447 check_probe_resp(wt, bssid, None)
448 check_probe_resp(wt, bssid2, None)
450 wt.clear_bss_counters(bssid)
451 wt.clear_bss_counters(bssid2)
452 dev[0].request("SET hessid " + bssid)
453 dev[0].request("SET access_network_type 1")
454 dev[0].scan(freq="2412")
456 check_probe_resp(wt, bssid, None)
457 check_probe_resp(wt, bssid2, None)
459 def test_ap_hs20_select(dev, apdev):
460 """Hotspot 2.0 network selection"""
461 bssid = apdev[0]['bssid']
462 params = hs20_ap_params()
463 params['hessid'] = bssid
464 hostapd.add_ap(apdev[0], params)
467 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
468 'password': "secret",
469 'domain': "example.com" })
470 interworking_select(dev[0], bssid, "home")
472 dev[0].remove_cred(id)
473 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
474 'password': "secret",
475 'domain': "no.match.example.com" })
476 interworking_select(dev[0], bssid, "roaming", freq="2412")
478 dev[0].set_cred_quoted(id, "realm", "no.match.example.com")
479 interworking_select(dev[0], bssid, no_match=True, freq="2412")
481 res = dev[0].request("SCAN_RESULTS")
482 if "[HS20]" not in res:
483 raise Exception("HS20 flag missing from scan results: " + res)
485 bssid2 = apdev[1]['bssid']
486 params = hs20_ap_params()
487 params['nai_realm'] = [ "0,example.org,21" ]
488 params['hessid'] = bssid2
489 params['domain_name'] = "example.org"
490 hostapd.add_ap(apdev[1], params)
491 dev[0].remove_cred(id)
492 id = dev[0].add_cred_values({ 'realm': "example.org", 'username': "test",
493 'password': "secret",
494 'domain': "example.org" })
495 interworking_select(dev[0], bssid2, "home", freq="2412")
497 def hs20_simulated_sim(dev, ap, method):
499 params = hs20_ap_params()
500 params['hessid'] = bssid
501 params['anqp_3gpp_cell_net'] = "555,444"
502 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
503 hostapd.add_ap(ap, params)
506 dev.add_cred_values({ 'imsi': "555444-333222111", 'eap': method,
507 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
508 interworking_select(dev, bssid, "home", freq="2412")
509 interworking_connect(dev, bssid, method)
510 check_sp_type(dev, "home")
512 def test_ap_hs20_sim(dev, apdev):
513 """Hotspot 2.0 with simulated SIM and EAP-SIM"""
514 hlr_auc_gw_available()
515 hs20_simulated_sim(dev[0], apdev[0], "SIM")
516 dev[0].request("INTERWORKING_SELECT auto freq=2412")
517 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
519 raise Exception("Timeout on already-connected event")
521 def test_ap_hs20_sim_invalid(dev, apdev):
522 """Hotspot 2.0 with simulated SIM and EAP-SIM - invalid IMSI"""
523 hlr_auc_gw_available()
524 bssid = apdev[0]['bssid']
525 params = hs20_ap_params()
526 params['hessid'] = bssid
527 params['anqp_3gpp_cell_net'] = "555,444"
528 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
529 hostapd.add_ap(apdev[0], params)
532 dev[0].add_cred_values({ 'imsi': "555444-3332221110", 'eap': "SIM",
533 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
534 # This hits "No valid IMSI available" in build_root_nai()
535 interworking_select(dev[0], bssid, freq="2412")
537 def test_ap_hs20_sim_oom(dev, apdev):
538 """Hotspot 2.0 with simulated SIM and EAP-SIM - OOM"""
539 hlr_auc_gw_available()
540 bssid = apdev[0]['bssid']
541 params = hs20_ap_params()
542 params['hessid'] = bssid
543 params['anqp_3gpp_cell_net'] = "555,444"
544 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
545 hostapd.add_ap(apdev[0], params)
548 dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "SIM",
549 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
550 dev[0].scan_for_bss(bssid, freq=2412)
551 interworking_select(dev[0], bssid, freq="2412")
553 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect_3gpp"):
554 dev[0].request("INTERWORKING_CONNECT " + bssid)
555 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
557 with alloc_fail(dev[0], 1, "=interworking_connect_3gpp"):
558 dev[0].request("INTERWORKING_CONNECT " + bssid)
559 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
561 def test_ap_hs20_aka(dev, apdev):
562 """Hotspot 2.0 with simulated USIM and EAP-AKA"""
563 hlr_auc_gw_available()
564 hs20_simulated_sim(dev[0], apdev[0], "AKA")
566 def test_ap_hs20_aka_prime(dev, apdev):
567 """Hotspot 2.0 with simulated USIM and EAP-AKA'"""
568 hlr_auc_gw_available()
569 hs20_simulated_sim(dev[0], apdev[0], "AKA'")
571 def test_ap_hs20_ext_sim(dev, apdev):
572 """Hotspot 2.0 with external SIM processing"""
573 hlr_auc_gw_available()
574 bssid = apdev[0]['bssid']
575 params = hs20_ap_params()
576 params['hessid'] = bssid
577 params['anqp_3gpp_cell_net'] = "232,01"
578 params['domain_name'] = "wlan.mnc001.mcc232.3gppnetwork.org"
579 hostapd.add_ap(apdev[0], params)
583 dev[0].request("SET external_sim 1")
584 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
585 interworking_select(dev[0], bssid, "home", freq="2412")
586 interworking_ext_sim_connect(dev[0], bssid, "SIM")
587 check_sp_type(dev[0], "home")
589 dev[0].request("SET external_sim 0")
591 def test_ap_hs20_ext_sim_roaming(dev, apdev):
592 """Hotspot 2.0 with external SIM processing in roaming network"""
593 hlr_auc_gw_available()
594 bssid = apdev[0]['bssid']
595 params = hs20_ap_params()
596 params['hessid'] = bssid
597 params['anqp_3gpp_cell_net'] = "244,91;310,026;232,01;234,56"
598 params['domain_name'] = "wlan.mnc091.mcc244.3gppnetwork.org"
599 hostapd.add_ap(apdev[0], params)
603 dev[0].request("SET external_sim 1")
604 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
605 interworking_select(dev[0], bssid, "roaming", freq="2412")
606 interworking_ext_sim_connect(dev[0], bssid, "SIM")
607 check_sp_type(dev[0], "roaming")
609 dev[0].request("SET external_sim 0")
611 def test_ap_hs20_username(dev, apdev):
612 """Hotspot 2.0 connection in username/password credential"""
613 check_eap_capa(dev[0], "MSCHAPV2")
614 bssid = apdev[0]['bssid']
615 params = hs20_ap_params()
616 params['hessid'] = bssid
617 params['disable_dgaf'] = '1'
618 hostapd.add_ap(apdev[0], params)
621 id = dev[0].add_cred_values({ 'realm': "example.com",
622 'username': "hs20-test",
623 'password': "password",
624 'ca_cert': "auth_serv/ca.pem",
625 'domain': "example.com",
626 'update_identifier': "1234" })
627 interworking_select(dev[0], bssid, "home", freq="2412")
628 interworking_connect(dev[0], bssid, "TTLS")
629 check_sp_type(dev[0], "home")
630 status = dev[0].get_status()
631 if status['pairwise_cipher'] != "CCMP":
632 raise Exception("Unexpected pairwise cipher")
633 if status['hs20'] != "2":
634 raise Exception("Unexpected HS 2.0 support indication")
636 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
637 identity="hs20-test", password="password",
638 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
641 def test_ap_hs20_connect_api(dev, apdev):
642 """Hotspot 2.0 connection with connect API"""
643 check_eap_capa(dev[0], "MSCHAPV2")
644 bssid = apdev[0]['bssid']
645 params = hs20_ap_params()
646 params['hessid'] = bssid
647 params['disable_dgaf'] = '1'
648 hostapd.add_ap(apdev[0], params)
650 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
651 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
653 wpas.flush_scan_cache()
654 id = wpas.add_cred_values({ 'realm': "example.com",
655 'username': "hs20-test",
656 'password': "password",
657 'ca_cert': "auth_serv/ca.pem",
658 'domain': "example.com",
659 'update_identifier': "1234" })
660 interworking_select(wpas, bssid, "home", freq="2412")
661 interworking_connect(wpas, bssid, "TTLS")
662 check_sp_type(wpas, "home")
663 status = wpas.get_status()
664 if status['pairwise_cipher'] != "CCMP":
665 raise Exception("Unexpected pairwise cipher")
666 if status['hs20'] != "2":
667 raise Exception("Unexpected HS 2.0 support indication")
669 def test_ap_hs20_auto_interworking(dev, apdev):
670 """Hotspot 2.0 connection with auto_interworking=1"""
671 check_eap_capa(dev[0], "MSCHAPV2")
672 bssid = apdev[0]['bssid']
673 params = hs20_ap_params()
674 params['hessid'] = bssid
675 params['disable_dgaf'] = '1'
676 hostapd.add_ap(apdev[0], params)
678 dev[0].hs20_enable(auto_interworking=True)
679 id = dev[0].add_cred_values({ 'realm': "example.com",
680 'username': "hs20-test",
681 'password': "password",
682 'ca_cert': "auth_serv/ca.pem",
683 'domain': "example.com",
684 'update_identifier': "1234" })
685 dev[0].request("REASSOCIATE")
686 dev[0].wait_connected(timeout=15)
687 check_sp_type(dev[0], "home")
688 status = dev[0].get_status()
689 if status['pairwise_cipher'] != "CCMP":
690 raise Exception("Unexpected pairwise cipher")
691 if status['hs20'] != "2":
692 raise Exception("Unexpected HS 2.0 support indication")
695 def test_ap_hs20_auto_interworking_no_match(dev, apdev):
696 """Hotspot 2.0 connection with auto_interworking=1 and no matching network"""
697 hapd = hostapd.add_ap(apdev[0], { "ssid": "mismatch" })
699 dev[0].hs20_enable(auto_interworking=True)
700 id = dev[0].connect("mismatch", psk="12345678", scan_freq="2412",
701 only_add_network=True)
702 dev[0].request("ENABLE_NETWORK " + str(id) + " no-connect")
704 id = dev[0].add_cred_values({ 'realm': "example.com",
705 'username': "hs20-test",
706 'password': "password",
707 'ca_cert': "auth_serv/ca.pem",
708 'domain': "example.com",
709 'update_identifier': "1234" })
710 dev[0].request("INTERWORKING_SELECT auto freq=2412")
712 dev[0].dump_monitor()
714 logger.info("start ping")
715 if "PONG" not in dev[0].ctrl.request("PING", timeout=2):
716 raise Exception("PING failed")
717 logger.info("ping done")
721 ev = dev[0].wait_event([ "ANQP fetch completed",
722 "CTRL-EVENT-SCAN-RESULTS" ], timeout=0.05)
725 if "ANQP fetch completed" in ev:
729 if fetch > 2 * scan + 3:
730 raise Exception("Too many ANQP fetch iterations")
731 dev[0].dump_monitor()
732 dev[0].request("DISCONNECT")
735 def test_ap_hs20_auto_interworking_no_cred_match(dev, apdev):
736 """Hotspot 2.0 connection with auto_interworking=1 but no cred match"""
737 bssid = apdev[0]['bssid']
738 params = { "ssid": "test" }
739 hostapd.add_ap(apdev[0], params)
741 dev[0].hs20_enable(auto_interworking=True)
742 dev[0].add_cred_values({ 'realm': "example.com",
743 'username': "hs20-test",
744 'password': "password",
745 'ca_cert': "auth_serv/ca.pem",
746 'domain': "example.com" })
748 id = dev[0].connect("test", psk="12345678", only_add_network=True)
749 dev[0].request("ENABLE_NETWORK %s" % id)
750 logger.info("Verify that scanning continues when there is partial network block match")
751 for i in range(0, 2):
752 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
754 raise Exception("Scan timed out")
755 logger.info("Scan completed")
757 def eap_test(dev, ap, eap_params, method, user):
759 params = hs20_ap_params()
760 params['nai_realm'] = [ "0,example.com," + eap_params ]
761 hostapd.add_ap(ap, params)
764 dev.add_cred_values({ 'realm': "example.com",
765 'ca_cert': "auth_serv/ca.pem",
767 'password': "password" })
768 interworking_select(dev, bssid, freq="2412")
769 interworking_connect(dev, bssid, method)
772 def test_ap_hs20_eap_unknown(dev, apdev):
773 """Hotspot 2.0 connection with unknown EAP method"""
774 bssid = apdev[0]['bssid']
775 params = hs20_ap_params()
776 params['nai_realm'] = "0,example.com,99"
777 hostapd.add_ap(apdev[0], params)
780 dev[0].add_cred_values(default_cred())
781 interworking_select(dev[0], None, no_match=True, freq="2412")
783 def test_ap_hs20_eap_peap_mschapv2(dev, apdev):
784 """Hotspot 2.0 connection with PEAP/MSCHAPV2"""
785 check_eap_capa(dev[0], "MSCHAPV2")
786 eap_test(dev[0], apdev[0], "25[3:26]", "PEAP", "user")
788 def test_ap_hs20_eap_peap_default(dev, apdev):
789 """Hotspot 2.0 connection with PEAP/MSCHAPV2 (as default)"""
790 check_eap_capa(dev[0], "MSCHAPV2")
791 eap_test(dev[0], apdev[0], "25", "PEAP", "user")
793 def test_ap_hs20_eap_peap_gtc(dev, apdev):
794 """Hotspot 2.0 connection with PEAP/GTC"""
795 eap_test(dev[0], apdev[0], "25[3:6]", "PEAP", "user")
798 def test_ap_hs20_eap_peap_unknown(dev, apdev):
799 """Hotspot 2.0 connection with PEAP/unknown"""
800 bssid = apdev[0]['bssid']
801 params = hs20_ap_params()
802 params['nai_realm'] = "0,example.com,25[3:99]"
803 hostapd.add_ap(apdev[0], params)
806 dev[0].add_cred_values(default_cred())
807 interworking_select(dev[0], None, no_match=True, freq="2412")
809 def test_ap_hs20_eap_ttls_chap(dev, apdev):
810 """Hotspot 2.0 connection with TTLS/CHAP"""
811 skip_with_fips(dev[0])
812 eap_test(dev[0], apdev[0], "21[2:2]", "TTLS", "chap user")
814 def test_ap_hs20_eap_ttls_mschap(dev, apdev):
815 """Hotspot 2.0 connection with TTLS/MSCHAP"""
816 skip_with_fips(dev[0])
817 eap_test(dev[0], apdev[0], "21[2:3]", "TTLS", "mschap user")
819 def test_ap_hs20_eap_ttls_default(dev, apdev):
820 """Hotspot 2.0 connection with TTLS/default"""
821 skip_with_fips(dev[0])
822 eap_test(dev[0], apdev[0], "21", "TTLS", "hs20-test")
824 def test_ap_hs20_eap_ttls_eap_mschapv2(dev, apdev):
825 """Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2"""
826 check_eap_capa(dev[0], "MSCHAPV2")
827 eap_test(dev[0], apdev[0], "21[3:26][6:7][99:99]", "TTLS", "user")
830 def test_ap_hs20_eap_ttls_eap_unknown(dev, apdev):
831 """Hotspot 2.0 connection with TTLS/EAP-unknown"""
832 bssid = apdev[0]['bssid']
833 params = hs20_ap_params()
834 params['nai_realm'] = "0,example.com,21[3:99]"
835 hostapd.add_ap(apdev[0], params)
838 dev[0].add_cred_values(default_cred())
839 interworking_select(dev[0], None, no_match=True, freq="2412")
842 def test_ap_hs20_eap_ttls_eap_unsupported(dev, apdev):
843 """Hotspot 2.0 connection with TTLS/EAP-OTP(unsupported)"""
844 bssid = apdev[0]['bssid']
845 params = hs20_ap_params()
846 params['nai_realm'] = "0,example.com,21[3:5]"
847 hostapd.add_ap(apdev[0], params)
850 dev[0].add_cred_values(default_cred())
851 interworking_select(dev[0], None, no_match=True, freq="2412")
854 def test_ap_hs20_eap_ttls_unknown(dev, apdev):
855 """Hotspot 2.0 connection with TTLS/unknown"""
856 bssid = apdev[0]['bssid']
857 params = hs20_ap_params()
858 params['nai_realm'] = "0,example.com,21[2:5]"
859 hostapd.add_ap(apdev[0], params)
862 dev[0].add_cred_values(default_cred())
863 interworking_select(dev[0], None, no_match=True, freq="2412")
865 def test_ap_hs20_eap_fast_mschapv2(dev, apdev):
866 """Hotspot 2.0 connection with FAST/EAP-MSCHAPV2"""
867 check_eap_capa(dev[0], "FAST")
868 eap_test(dev[0], apdev[0], "43[3:26]", "FAST", "user")
870 def test_ap_hs20_eap_fast_gtc(dev, apdev):
871 """Hotspot 2.0 connection with FAST/EAP-GTC"""
872 check_eap_capa(dev[0], "FAST")
873 eap_test(dev[0], apdev[0], "43[3:6]", "FAST", "user")
875 def test_ap_hs20_eap_tls(dev, apdev):
876 """Hotspot 2.0 connection with EAP-TLS"""
877 bssid = apdev[0]['bssid']
878 params = hs20_ap_params()
879 params['nai_realm'] = [ "0,example.com,13[5:6]" ]
880 hostapd.add_ap(apdev[0], params)
883 dev[0].add_cred_values({ 'realm': "example.com",
884 'username': "certificate-user",
885 'ca_cert': "auth_serv/ca.pem",
886 'client_cert': "auth_serv/user.pem",
887 'private_key': "auth_serv/user.key"})
888 interworking_select(dev[0], bssid, freq="2412")
889 interworking_connect(dev[0], bssid, "TLS")
892 def test_ap_hs20_eap_cert_unknown(dev, apdev):
893 """Hotspot 2.0 connection with certificate, but unknown EAP method"""
894 bssid = apdev[0]['bssid']
895 params = hs20_ap_params()
896 params['nai_realm'] = [ "0,example.com,99[5:6]" ]
897 hostapd.add_ap(apdev[0], params)
900 dev[0].add_cred_values({ 'realm': "example.com",
901 'username': "certificate-user",
902 'ca_cert': "auth_serv/ca.pem",
903 'client_cert': "auth_serv/user.pem",
904 'private_key': "auth_serv/user.key"})
905 interworking_select(dev[0], None, no_match=True, freq="2412")
908 def test_ap_hs20_eap_cert_unsupported(dev, apdev):
909 """Hotspot 2.0 connection with certificate, but unsupported TTLS"""
910 bssid = apdev[0]['bssid']
911 params = hs20_ap_params()
912 params['nai_realm'] = [ "0,example.com,21[5:6]" ]
913 hostapd.add_ap(apdev[0], params)
916 dev[0].add_cred_values({ 'realm': "example.com",
917 'username': "certificate-user",
918 'ca_cert': "auth_serv/ca.pem",
919 'client_cert': "auth_serv/user.pem",
920 'private_key': "auth_serv/user.key"})
921 interworking_select(dev[0], None, no_match=True, freq="2412")
924 def test_ap_hs20_eap_invalid_cred(dev, apdev):
925 """Hotspot 2.0 connection with invalid cred configuration"""
926 bssid = apdev[0]['bssid']
927 params = hs20_ap_params()
928 hostapd.add_ap(apdev[0], params)
931 dev[0].add_cred_values({ 'realm': "example.com",
932 'username': "certificate-user",
933 'client_cert': "auth_serv/user.pem" })
934 interworking_select(dev[0], None, no_match=True, freq="2412")
936 def test_ap_hs20_nai_realms(dev, apdev):
937 """Hotspot 2.0 connection and multiple NAI realms and TTLS/PAP"""
938 bssid = apdev[0]['bssid']
939 params = hs20_ap_params()
940 params['hessid'] = bssid
941 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]" ]
942 hostapd.add_ap(apdev[0], params)
945 id = dev[0].add_cred_values({ 'realm': "example.com",
946 'ca_cert': "auth_serv/ca.pem",
947 'username': "pap user",
948 'password': "password",
949 'domain': "example.com" })
950 interworking_select(dev[0], bssid, "home", freq="2412")
951 interworking_connect(dev[0], bssid, "TTLS")
952 check_sp_type(dev[0], "home")
954 def test_ap_hs20_roaming_consortium(dev, apdev):
955 """Hotspot 2.0 connection based on roaming consortium match"""
956 bssid = apdev[0]['bssid']
957 params = hs20_ap_params()
958 params['hessid'] = bssid
959 hostapd.add_ap(apdev[0], params)
962 for consortium in [ "112233", "1020304050", "010203040506", "fedcba" ]:
963 id = dev[0].add_cred_values({ 'username': "user",
964 'password': "password",
965 'domain': "example.com",
966 'ca_cert': "auth_serv/ca.pem",
967 'roaming_consortium': consortium,
969 interworking_select(dev[0], bssid, "home", freq="2412")
970 interworking_connect(dev[0], bssid, "PEAP")
971 check_sp_type(dev[0], "home")
972 dev[0].request("INTERWORKING_SELECT auto freq=2412")
973 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
975 raise Exception("Timeout on already-connected event")
976 dev[0].remove_cred(id)
978 def test_ap_hs20_roaming_consortium_invalid(dev, apdev):
979 """Hotspot 2.0 connection and invalid roaming consortium ANQP-element"""
980 bssid = apdev[0]['bssid']
981 params = hs20_ap_params()
982 params['hessid'] = bssid
983 # Override Roaming Consortium ANQP-element with an incorrectly encoded
985 params['anqp_elem'] = "261:04fedcba"
986 hostapd.add_ap(apdev[0], params)
989 id = dev[0].add_cred_values({ 'username': "user",
990 'password': "password",
991 'domain': "example.com",
992 'ca_cert': "auth_serv/ca.pem",
993 'roaming_consortium': "fedcba",
995 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
997 def test_ap_hs20_roaming_consortium_element(dev, apdev):
998 """Hotspot 2.0 connection and invalid roaming consortium element"""
999 bssid = apdev[0]['bssid']
1000 params = hs20_ap_params()
1001 params['hessid'] = bssid
1002 del params['roaming_consortium']
1003 params['vendor_elements'] = '6f00'
1004 hapd = hostapd.add_ap(apdev[0], params)
1006 dev[0].hs20_enable()
1007 dev[0].scan_for_bss(bssid, freq="2412")
1008 id = dev[0].add_cred_values({ 'username': "user",
1009 'password': "password",
1010 'domain': "example.com",
1011 'ca_cert': "auth_serv/ca.pem",
1012 'roaming_consortium': "112233",
1014 interworking_select(dev[0], bssid, freq="2412", no_match=True)
1016 hapd.set('vendor_elements', '6f020001')
1017 if "OK" not in hapd.request("UPDATE_BEACON"):
1018 raise Exception("UPDATE_BEACON failed")
1019 dev[0].request("BSS_FLUSH 0")
1020 dev[0].scan_for_bss(bssid, freq="2412", force_scan=True)
1021 interworking_select(dev[0], bssid, freq="2412", no_match=True)
1023 def test_ap_hs20_roaming_consortium_constraints(dev, apdev):
1024 """Hotspot 2.0 connection and roaming consortium constraints"""
1025 bssid = apdev[0]['bssid']
1026 params = hs20_ap_params()
1027 params['hessid'] = bssid
1028 params['bss_load_test'] = "12:200:20000"
1029 hostapd.add_ap(apdev[0], params)
1031 dev[0].hs20_enable()
1033 vals = { 'username': "user",
1034 'password': "password",
1035 'domain': "example.com",
1036 'ca_cert': "auth_serv/ca.pem",
1037 'roaming_consortium': "fedcba",
1040 vals2['required_roaming_consortium'] = "223344"
1041 id = dev[0].add_cred_values(vals2)
1042 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
1043 dev[0].remove_cred(id)
1046 vals2['min_dl_bandwidth_home'] = "65500"
1047 id = dev[0].add_cred_values(vals2)
1048 dev[0].request("INTERWORKING_SELECT freq=2412")
1049 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1051 raise Exception("No AP found")
1052 if "below_min_backhaul=1" not in ev:
1053 raise Exception("below_min_backhaul not reported")
1054 dev[0].remove_cred(id)
1057 vals2['max_bss_load'] = "100"
1058 id = dev[0].add_cred_values(vals2)
1059 dev[0].request("INTERWORKING_SELECT freq=2412")
1060 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1062 raise Exception("No AP found")
1063 if "over_max_bss_load=1" not in ev:
1064 raise Exception("over_max_bss_load not reported")
1065 dev[0].remove_cred(id)
1068 vals2['req_conn_capab'] = "6:1234"
1069 vals2['domain'] = 'example.org'
1070 id = dev[0].add_cred_values(vals2)
1072 dev[0].request("INTERWORKING_SELECT freq=2412")
1073 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1075 raise Exception("No AP found")
1076 if "conn_capab_missing=1" not in ev:
1077 raise Exception("conn_capab_missing not reported")
1078 dev[0].remove_cred(id)
1080 values = default_cred()
1081 values['roaming_consortium'] = "fedcba"
1082 id3 = dev[0].add_cred_values(values)
1085 vals2['roaming_consortium'] = "fedcba"
1086 vals2['priority'] = "2"
1087 id = dev[0].add_cred_values(vals2)
1089 values = default_cred()
1090 values['roaming_consortium'] = "fedcba"
1091 id2 = dev[0].add_cred_values(values)
1093 dev[0].request("INTERWORKING_SELECT freq=2412")
1094 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1096 raise Exception("No AP found")
1097 dev[0].remove_cred(id)
1098 dev[0].remove_cred(id2)
1099 dev[0].remove_cred(id3)
1101 def test_ap_hs20_3gpp_constraints(dev, apdev):
1102 """Hotspot 2.0 connection and 3GPP credential constraints"""
1103 bssid = apdev[0]['bssid']
1104 params = hs20_ap_params()
1105 params['hessid'] = bssid
1106 params['anqp_3gpp_cell_net'] = "555,444"
1107 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
1108 params['bss_load_test'] = "12:200:20000"
1109 hapd = hostapd.add_ap(apdev[0], params)
1111 dev[0].hs20_enable()
1113 vals = { 'imsi': "555444-333222111",
1115 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
1117 vals2['required_roaming_consortium'] = "223344"
1118 id = dev[0].add_cred_values(vals2)
1119 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
1120 dev[0].remove_cred(id)
1123 vals2['min_dl_bandwidth_home'] = "65500"
1124 id = dev[0].add_cred_values(vals2)
1125 dev[0].request("INTERWORKING_SELECT freq=2412")
1126 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1128 raise Exception("No AP found")
1129 if "below_min_backhaul=1" not in ev:
1130 raise Exception("below_min_backhaul not reported")
1131 dev[0].remove_cred(id)
1134 vals2['max_bss_load'] = "100"
1135 id = dev[0].add_cred_values(vals2)
1136 dev[0].request("INTERWORKING_SELECT freq=2412")
1137 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1139 raise Exception("No AP found")
1140 if "over_max_bss_load=1" not in ev:
1141 raise Exception("over_max_bss_load not reported")
1142 dev[0].remove_cred(id)
1144 values = default_cred()
1145 values['roaming_consortium'] = "fedcba"
1146 id3 = dev[0].add_cred_values(values)
1149 vals2['roaming_consortium'] = "fedcba"
1150 vals2['priority'] = "2"
1151 id = dev[0].add_cred_values(vals2)
1153 values = default_cred()
1154 values['roaming_consortium'] = "fedcba"
1155 id2 = dev[0].add_cred_values(values)
1157 dev[0].request("INTERWORKING_SELECT freq=2412")
1158 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1160 raise Exception("No AP found")
1161 dev[0].remove_cred(id)
1162 dev[0].remove_cred(id2)
1163 dev[0].remove_cred(id3)
1166 params = hs20_ap_params()
1167 params['hessid'] = bssid
1168 params['anqp_3gpp_cell_net'] = "555,444"
1169 params['bss_load_test'] = "12:200:20000"
1170 hapd = hostapd.add_ap(apdev[0], params)
1172 vals2['req_conn_capab'] = "6:1234"
1173 id = dev[0].add_cred_values(vals2)
1174 dev[0].request("INTERWORKING_SELECT freq=2412")
1175 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1177 raise Exception("No AP found")
1178 if "conn_capab_missing=1" not in ev:
1179 raise Exception("conn_capab_missing not reported")
1180 dev[0].remove_cred(id)
1182 def test_ap_hs20_connect_no_full_match(dev, apdev):
1183 """Hotspot 2.0 connection and no full match"""
1184 bssid = apdev[0]['bssid']
1185 params = hs20_ap_params()
1186 params['hessid'] = bssid
1187 params['anqp_3gpp_cell_net'] = "555,444"
1188 hostapd.add_ap(apdev[0], params)
1190 dev[0].hs20_enable()
1192 vals = { 'username': "user",
1193 'password': "password",
1194 'domain': "example.com",
1195 'ca_cert': "auth_serv/ca.pem",
1196 'roaming_consortium': "fedcba",
1198 'min_dl_bandwidth_home': "65500" }
1199 id = dev[0].add_cred_values(vals)
1200 dev[0].request("INTERWORKING_SELECT freq=2412")
1201 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1203 raise Exception("No AP found")
1204 if "below_min_backhaul=1" not in ev:
1205 raise Exception("below_min_backhaul not reported")
1206 interworking_connect(dev[0], bssid, "TTLS")
1207 dev[0].remove_cred(id)
1208 dev[0].wait_disconnected()
1210 vals = { 'imsi': "555444-333222111", 'eap': "SIM",
1211 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1212 'min_dl_bandwidth_roaming': "65500" }
1213 id = dev[0].add_cred_values(vals)
1214 dev[0].request("INTERWORKING_SELECT freq=2412")
1215 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1217 raise Exception("No AP found")
1218 if "below_min_backhaul=1" not in ev:
1219 raise Exception("below_min_backhaul not reported")
1220 interworking_connect(dev[0], bssid, "SIM")
1221 dev[0].remove_cred(id)
1222 dev[0].wait_disconnected()
1224 def test_ap_hs20_username_roaming(dev, apdev):
1225 """Hotspot 2.0 connection in username/password credential (roaming)"""
1226 check_eap_capa(dev[0], "MSCHAPV2")
1227 bssid = apdev[0]['bssid']
1228 params = hs20_ap_params()
1229 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
1230 "0,roaming.example.com,21[2:4][5:7]",
1231 "0,another.example.com" ]
1232 params['domain_name'] = "another.example.com"
1233 params['hessid'] = bssid
1234 hostapd.add_ap(apdev[0], params)
1236 dev[0].hs20_enable()
1237 id = dev[0].add_cred_values({ 'realm': "roaming.example.com",
1238 'username': "hs20-test",
1239 'password': "password",
1240 'ca_cert': "auth_serv/ca.pem",
1241 'domain': "example.com" })
1242 interworking_select(dev[0], bssid, "roaming", freq="2412")
1243 interworking_connect(dev[0], bssid, "TTLS")
1244 check_sp_type(dev[0], "roaming")
1246 def test_ap_hs20_username_unknown(dev, apdev):
1247 """Hotspot 2.0 connection in username/password credential (no domain in cred)"""
1248 check_eap_capa(dev[0], "MSCHAPV2")
1249 bssid = apdev[0]['bssid']
1250 params = hs20_ap_params()
1251 params['hessid'] = bssid
1252 hostapd.add_ap(apdev[0], params)
1254 dev[0].hs20_enable()
1255 id = dev[0].add_cred_values({ 'realm': "example.com",
1256 'ca_cert': "auth_serv/ca.pem",
1257 'username': "hs20-test",
1258 'password': "password" })
1259 interworking_select(dev[0], bssid, "unknown", freq="2412")
1260 interworking_connect(dev[0], bssid, "TTLS")
1261 check_sp_type(dev[0], "unknown")
1263 def test_ap_hs20_username_unknown2(dev, apdev):
1264 """Hotspot 2.0 connection in username/password credential (no domain advertized)"""
1265 check_eap_capa(dev[0], "MSCHAPV2")
1266 bssid = apdev[0]['bssid']
1267 params = hs20_ap_params()
1268 params['hessid'] = bssid
1269 del params['domain_name']
1270 hostapd.add_ap(apdev[0], params)
1272 dev[0].hs20_enable()
1273 id = dev[0].add_cred_values({ 'realm': "example.com",
1274 'ca_cert': "auth_serv/ca.pem",
1275 'username': "hs20-test",
1276 'password': "password",
1277 'domain': "example.com" })
1278 interworking_select(dev[0], bssid, "unknown", freq="2412")
1279 interworking_connect(dev[0], bssid, "TTLS")
1280 check_sp_type(dev[0], "unknown")
1282 def test_ap_hs20_gas_while_associated(dev, apdev):
1283 """Hotspot 2.0 connection with GAS query while associated"""
1284 check_eap_capa(dev[0], "MSCHAPV2")
1285 bssid = apdev[0]['bssid']
1286 params = hs20_ap_params()
1287 params['hessid'] = bssid
1288 hostapd.add_ap(apdev[0], params)
1290 dev[0].hs20_enable()
1291 id = dev[0].add_cred_values({ 'realm': "example.com",
1292 'ca_cert': "auth_serv/ca.pem",
1293 'username': "hs20-test",
1294 'password': "password",
1295 'domain': "example.com" })
1296 interworking_select(dev[0], bssid, "home", freq="2412")
1297 interworking_connect(dev[0], bssid, "TTLS")
1299 logger.info("Verifying GAS query while associated")
1300 dev[0].request("FETCH_ANQP")
1301 for i in range(0, 6):
1302 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1304 raise Exception("Operation timed out")
1306 def test_ap_hs20_gas_with_another_ap_while_associated(dev, apdev):
1307 """GAS query with another AP while associated"""
1308 check_eap_capa(dev[0], "MSCHAPV2")
1309 bssid = apdev[0]['bssid']
1310 params = hs20_ap_params()
1311 params['hessid'] = bssid
1312 hostapd.add_ap(apdev[0], params)
1314 bssid2 = apdev[1]['bssid']
1315 params = hs20_ap_params()
1316 params['hessid'] = bssid2
1317 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1318 hostapd.add_ap(apdev[1], params)
1320 dev[0].hs20_enable()
1321 id = dev[0].add_cred_values({ 'realm': "example.com",
1322 'ca_cert': "auth_serv/ca.pem",
1323 'username': "hs20-test",
1324 'password': "password",
1325 'domain': "example.com" })
1326 interworking_select(dev[0], bssid, "home", freq="2412")
1327 interworking_connect(dev[0], bssid, "TTLS")
1328 dev[0].dump_monitor()
1330 logger.info("Verifying GAS query with same AP while associated")
1331 dev[0].request("ANQP_GET " + bssid + " 263")
1332 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1334 raise Exception("ANQP operation timed out")
1335 dev[0].dump_monitor()
1337 logger.info("Verifying GAS query with another AP while associated")
1338 dev[0].scan_for_bss(bssid2, 2412)
1339 dev[0].request("ANQP_GET " + bssid2 + " 263")
1340 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1342 raise Exception("ANQP operation timed out")
1344 def test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
1345 """Hotspot 2.0 connection with GAS query while associated and using PMF"""
1346 check_eap_capa(dev[0], "MSCHAPV2")
1348 _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev)
1350 dev[0].request("SET pmf 0")
1352 def _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
1353 bssid = apdev[0]['bssid']
1354 params = hs20_ap_params()
1355 params['hessid'] = bssid
1356 hostapd.add_ap(apdev[0], params)
1358 bssid2 = apdev[1]['bssid']
1359 params = hs20_ap_params()
1360 params['hessid'] = bssid2
1361 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1362 hostapd.add_ap(apdev[1], params)
1364 dev[0].hs20_enable()
1365 dev[0].request("SET pmf 2")
1366 id = dev[0].add_cred_values({ 'realm': "example.com",
1367 'ca_cert': "auth_serv/ca.pem",
1368 'username': "hs20-test",
1369 'password': "password",
1370 'domain': "example.com" })
1371 interworking_select(dev[0], bssid, "home", freq="2412")
1372 interworking_connect(dev[0], bssid, "TTLS")
1374 logger.info("Verifying GAS query while associated")
1375 dev[0].request("FETCH_ANQP")
1376 for i in range(0, 2 * 6):
1377 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1379 raise Exception("Operation timed out")
1381 def test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev):
1382 """GAS query with another AP while associated and using PMF"""
1383 check_eap_capa(dev[0], "MSCHAPV2")
1385 _test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev)
1387 dev[0].request("SET pmf 0")
1389 def _test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev):
1390 bssid = apdev[0]['bssid']
1391 params = hs20_ap_params()
1392 params['hessid'] = bssid
1393 hostapd.add_ap(apdev[0], params)
1395 bssid2 = apdev[1]['bssid']
1396 params = hs20_ap_params()
1397 params['hessid'] = bssid2
1398 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1399 hostapd.add_ap(apdev[1], params)
1401 dev[0].hs20_enable()
1402 dev[0].request("SET pmf 2")
1403 id = dev[0].add_cred_values({ 'realm': "example.com",
1404 'ca_cert': "auth_serv/ca.pem",
1405 'username': "hs20-test",
1406 'password': "password",
1407 'domain': "example.com" })
1408 interworking_select(dev[0], bssid, "home", freq="2412")
1409 interworking_connect(dev[0], bssid, "TTLS")
1410 dev[0].dump_monitor()
1412 logger.info("Verifying GAS query with same AP while associated")
1413 dev[0].request("ANQP_GET " + bssid + " 263")
1414 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1416 raise Exception("ANQP operation timed out")
1417 dev[0].dump_monitor()
1419 logger.info("Verifying GAS query with another AP while associated")
1420 dev[0].scan_for_bss(bssid2, 2412)
1421 dev[0].request("ANQP_GET " + bssid2 + " 263")
1422 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1424 raise Exception("ANQP operation timed out")
1426 def test_ap_hs20_gas_frag_while_associated(dev, apdev):
1427 """Hotspot 2.0 connection with fragmented GAS query while associated"""
1428 check_eap_capa(dev[0], "MSCHAPV2")
1429 bssid = apdev[0]['bssid']
1430 params = hs20_ap_params()
1431 params['hessid'] = bssid
1432 hapd = hostapd.add_ap(apdev[0], params)
1433 hapd.set("gas_frag_limit", "50")
1435 dev[0].hs20_enable()
1436 id = dev[0].add_cred_values({ 'realm': "example.com",
1437 'ca_cert': "auth_serv/ca.pem",
1438 'username': "hs20-test",
1439 'password': "password",
1440 'domain': "example.com" })
1441 interworking_select(dev[0], bssid, "home", freq="2412")
1442 interworking_connect(dev[0], bssid, "TTLS")
1444 logger.info("Verifying GAS query while associated")
1445 dev[0].request("FETCH_ANQP")
1446 for i in range(0, 6):
1447 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1449 raise Exception("Operation timed out")
1451 def test_ap_hs20_multiple_connects(dev, apdev):
1452 """Hotspot 2.0 connection through multiple network selections"""
1453 check_eap_capa(dev[0], "MSCHAPV2")
1454 bssid = apdev[0]['bssid']
1455 params = hs20_ap_params()
1456 params['hessid'] = bssid
1457 hostapd.add_ap(apdev[0], params)
1459 dev[0].hs20_enable()
1460 values = { 'realm': "example.com",
1461 'ca_cert': "auth_serv/ca.pem",
1462 'username': "hs20-test",
1463 'password': "password",
1464 'domain': "example.com" }
1465 id = dev[0].add_cred_values(values)
1467 dev[0].scan_for_bss(bssid, freq="2412")
1469 for i in range(0, 3):
1470 logger.info("Starting Interworking network selection")
1471 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1473 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1474 "INTERWORKING-ALREADY-CONNECTED",
1475 "CTRL-EVENT-CONNECTED"], timeout=15)
1477 raise Exception("Connection timed out")
1478 if "INTERWORKING-NO-MATCH" in ev:
1479 raise Exception("Matching AP not found")
1480 if "CTRL-EVENT-CONNECTED" in ev:
1482 if i == 2 and "INTERWORKING-ALREADY-CONNECTED" in ev:
1485 dev[0].request("DISCONNECT")
1486 dev[0].dump_monitor()
1488 networks = dev[0].list_networks()
1489 if len(networks) > 1:
1490 raise Exception("Duplicated network block detected")
1492 def test_ap_hs20_disallow_aps(dev, apdev):
1493 """Hotspot 2.0 connection and disallow_aps"""
1494 bssid = apdev[0]['bssid']
1495 params = hs20_ap_params()
1496 params['hessid'] = bssid
1497 hostapd.add_ap(apdev[0], params)
1499 dev[0].hs20_enable()
1500 values = { 'realm': "example.com",
1501 'ca_cert': "auth_serv/ca.pem",
1502 'username': "hs20-test",
1503 'password': "password",
1504 'domain': "example.com" }
1505 id = dev[0].add_cred_values(values)
1507 dev[0].scan_for_bss(bssid, freq="2412")
1509 logger.info("Verify disallow_aps bssid")
1510 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1511 dev[0].request("INTERWORKING_SELECT auto")
1512 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1514 raise Exception("Network selection timed out")
1515 dev[0].dump_monitor()
1517 logger.info("Verify disallow_aps ssid")
1518 dev[0].request("SET disallow_aps ssid 746573742d68733230")
1519 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1520 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1522 raise Exception("Network selection timed out")
1523 dev[0].dump_monitor()
1525 logger.info("Verify disallow_aps clear")
1526 dev[0].request("SET disallow_aps ")
1527 interworking_select(dev[0], bssid, "home", freq="2412")
1529 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1530 ret = dev[0].request("INTERWORKING_CONNECT " + bssid)
1531 if "FAIL" not in ret:
1532 raise Exception("INTERWORKING_CONNECT to disallowed BSS not rejected")
1534 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT foo"):
1535 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1536 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT 00:11:22:33:44:55"):
1537 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1539 def policy_test(dev, ap, values, only_one=True):
1542 logger.info("Verify network selection to AP " + ap['ifname'])
1544 dev.scan_for_bss(bssid, freq="2412")
1546 logger.info("Verify network selection")
1549 id = dev.add_cred_values(values)
1550 dev.request("INTERWORKING_SELECT auto freq=2412")
1553 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH",
1554 "INTERWORKING-BLACKLISTED",
1555 "INTERWORKING-SELECTED"], timeout=15)
1557 raise Exception("Network selection timed out")
1559 if "INTERWORKING-NO-MATCH" in ev:
1560 raise Exception("Matching AP not found")
1561 if bssid and only_one and "INTERWORKING-AP" in ev and bssid not in ev:
1562 raise Exception("Unexpected AP claimed acceptable")
1563 if "INTERWORKING-SELECTED" in ev:
1564 if bssid and bssid not in ev:
1565 raise Exception("Selected incorrect BSS")
1568 ev = dev.wait_connected(timeout=15)
1569 if bssid and bssid not in ev:
1570 raise Exception("Connected to incorrect BSS")
1572 conn_bssid = dev.get_status_field("bssid")
1573 if bssid and conn_bssid != bssid:
1574 raise Exception("bssid information points to incorrect BSS")
1580 def default_cred(domain=None, user="hs20-test"):
1581 cred = { 'realm': "example.com",
1582 'ca_cert': "auth_serv/ca.pem",
1584 'password': "password" }
1586 cred['domain'] = domain
1589 def test_ap_hs20_prefer_home(dev, apdev):
1590 """Hotspot 2.0 required roaming consortium"""
1591 check_eap_capa(dev[0], "MSCHAPV2")
1592 params = hs20_ap_params()
1593 params['domain_name'] = "example.org"
1594 hostapd.add_ap(apdev[0], params)
1596 params = hs20_ap_params()
1597 params['ssid'] = "test-hs20-other"
1598 params['domain_name'] = "example.com"
1599 hostapd.add_ap(apdev[1], params)
1601 values = default_cred()
1602 values['domain'] = "example.com"
1603 policy_test(dev[0], apdev[1], values, only_one=False)
1604 values['domain'] = "example.org"
1605 policy_test(dev[0], apdev[0], values, only_one=False)
1607 def test_ap_hs20_req_roaming_consortium(dev, apdev):
1608 """Hotspot 2.0 required roaming consortium"""
1609 check_eap_capa(dev[0], "MSCHAPV2")
1610 params = hs20_ap_params()
1611 hostapd.add_ap(apdev[0], params)
1613 params = hs20_ap_params()
1614 params['ssid'] = "test-hs20-other"
1615 params['roaming_consortium'] = [ "223344" ]
1616 hostapd.add_ap(apdev[1], params)
1618 values = default_cred()
1619 values['required_roaming_consortium'] = "223344"
1620 policy_test(dev[0], apdev[1], values)
1621 values['required_roaming_consortium'] = "112233"
1622 policy_test(dev[0], apdev[0], values)
1624 id = dev[0].add_cred()
1625 dev[0].set_cred(id, "required_roaming_consortium", "112233")
1626 dev[0].set_cred(id, "required_roaming_consortium", "112233445566778899aabbccddeeff")
1628 for val in [ "", "1", "11", "1122", "1122334", "112233445566778899aabbccddeeff00" ]:
1629 if "FAIL" not in dev[0].request('SET_CRED {} required_roaming_consortium {}'.format(id, val)):
1630 raise Exception("Invalid roaming consortium value accepted: " + val)
1632 def test_ap_hs20_req_roaming_consortium_no_match(dev, apdev):
1633 """Hotspot 2.0 required roaming consortium and no match"""
1634 check_eap_capa(dev[0], "MSCHAPV2")
1635 params = hs20_ap_params()
1636 del params['roaming_consortium']
1637 hostapd.add_ap(apdev[0], params)
1639 params = hs20_ap_params()
1640 params['ssid'] = "test-hs20-other"
1641 params['roaming_consortium'] = [ "223345" ]
1642 hostapd.add_ap(apdev[1], params)
1644 values = default_cred()
1645 values['required_roaming_consortium'] = "223344"
1646 dev[0].hs20_enable()
1647 id = dev[0].add_cred_values(values)
1648 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1649 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=10)
1651 raise Exception("INTERWORKING-NO-MATCH not reported")
1653 def test_ap_hs20_excluded_ssid(dev, apdev):
1654 """Hotspot 2.0 exclusion based on SSID"""
1655 check_eap_capa(dev[0], "MSCHAPV2")
1656 params = hs20_ap_params()
1657 params['roaming_consortium'] = [ "223344" ]
1658 params['anqp_3gpp_cell_net'] = "555,444"
1659 hostapd.add_ap(apdev[0], params)
1661 params = hs20_ap_params()
1662 params['ssid'] = "test-hs20-other"
1663 params['roaming_consortium'] = [ "223344" ]
1664 params['anqp_3gpp_cell_net'] = "555,444"
1665 hostapd.add_ap(apdev[1], params)
1667 values = default_cred()
1668 values['excluded_ssid'] = "test-hs20"
1669 events = policy_test(dev[0], apdev[1], values)
1670 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1672 raise Exception("Excluded network not reported")
1673 values['excluded_ssid'] = "test-hs20-other"
1674 events = policy_test(dev[0], apdev[0], values)
1675 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[1]['bssid'] in e]
1677 raise Exception("Excluded network not reported")
1679 values = default_cred()
1680 values['roaming_consortium'] = "223344"
1681 values['eap'] = "TTLS"
1682 values['phase2'] = "auth=MSCHAPV2"
1683 values['excluded_ssid'] = "test-hs20"
1684 events = policy_test(dev[0], apdev[1], values)
1685 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1687 raise Exception("Excluded network not reported")
1689 values = { 'imsi': "555444-333222111", 'eap': "SIM",
1690 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1691 'excluded_ssid': "test-hs20" }
1692 events = policy_test(dev[0], apdev[1], values)
1693 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1695 raise Exception("Excluded network not reported")
1697 def test_ap_hs20_roam_to_higher_prio(dev, apdev):
1698 """Hotspot 2.0 and roaming from current to higher priority network"""
1699 check_eap_capa(dev[0], "MSCHAPV2")
1700 bssid = apdev[0]['bssid']
1701 params = hs20_ap_params(ssid="test-hs20-visited")
1702 params['domain_name'] = "visited.example.org"
1703 hostapd.add_ap(apdev[0], params)
1705 dev[0].hs20_enable()
1706 id = dev[0].add_cred_values({ 'realm': "example.com",
1707 'ca_cert': "auth_serv/ca.pem",
1708 'username': "hs20-test",
1709 'password': "password",
1710 'domain': "example.com" })
1711 logger.info("Connect to the only network option")
1712 interworking_select(dev[0], bssid, "roaming", freq="2412")
1713 dev[0].dump_monitor()
1714 interworking_connect(dev[0], bssid, "TTLS")
1716 logger.info("Start another AP (home operator) and reconnect")
1717 bssid2 = apdev[1]['bssid']
1718 params = hs20_ap_params(ssid="test-hs20-home")
1719 params['domain_name'] = "example.com"
1720 hostapd.add_ap(apdev[1], params)
1722 dev[0].scan_for_bss(bssid2, freq="2412", force_scan=True)
1723 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1724 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1725 "INTERWORKING-ALREADY-CONNECTED",
1726 "CTRL-EVENT-CONNECTED"], timeout=15)
1728 raise Exception("Connection timed out")
1729 if "INTERWORKING-NO-MATCH" in ev:
1730 raise Exception("Matching AP not found")
1731 if "INTERWORKING-ALREADY-CONNECTED" in ev:
1732 raise Exception("Unexpected AP selected")
1733 if bssid2 not in ev:
1734 raise Exception("Unexpected BSSID after reconnection")
1736 def test_ap_hs20_domain_suffix_match_full(dev, apdev):
1737 """Hotspot 2.0 and domain_suffix_match"""
1738 check_domain_match_full(dev[0])
1739 check_eap_capa(dev[0], "MSCHAPV2")
1740 bssid = apdev[0]['bssid']
1741 params = hs20_ap_params()
1742 hostapd.add_ap(apdev[0], params)
1744 dev[0].hs20_enable()
1745 id = dev[0].add_cred_values({ 'realm': "example.com",
1746 'username': "hs20-test",
1747 'password': "password",
1748 'ca_cert': "auth_serv/ca.pem",
1749 'domain': "example.com",
1750 'domain_suffix_match': "server.w1.fi" })
1751 interworking_select(dev[0], bssid, "home", freq="2412")
1752 dev[0].dump_monitor()
1753 interworking_connect(dev[0], bssid, "TTLS")
1754 dev[0].request("REMOVE_NETWORK all")
1755 dev[0].dump_monitor()
1757 dev[0].set_cred_quoted(id, "domain_suffix_match", "no-match.example.com")
1758 interworking_select(dev[0], bssid, "home", freq="2412")
1759 dev[0].dump_monitor()
1760 dev[0].request("INTERWORKING_CONNECT " + bssid)
1761 ev = dev[0].wait_event(["CTRL-EVENT-EAP-TLS-CERT-ERROR"])
1763 raise Exception("TLS certificate error not reported")
1764 if "Domain suffix mismatch" not in ev:
1765 raise Exception("Domain suffix mismatch not reported")
1767 def test_ap_hs20_domain_suffix_match(dev, apdev):
1768 """Hotspot 2.0 and domain_suffix_match"""
1769 check_eap_capa(dev[0], "MSCHAPV2")
1770 check_domain_match_full(dev[0])
1771 bssid = apdev[0]['bssid']
1772 params = hs20_ap_params()
1773 hostapd.add_ap(apdev[0], params)
1775 dev[0].hs20_enable()
1776 id = dev[0].add_cred_values({ 'realm': "example.com",
1777 'username': "hs20-test",
1778 'password': "password",
1779 'ca_cert': "auth_serv/ca.pem",
1780 'domain': "example.com",
1781 'domain_suffix_match': "w1.fi" })
1782 interworking_select(dev[0], bssid, "home", freq="2412")
1783 dev[0].dump_monitor()
1784 interworking_connect(dev[0], bssid, "TTLS")
1786 def test_ap_hs20_roaming_partner_preference(dev, apdev):
1787 """Hotspot 2.0 and roaming partner preference"""
1788 check_eap_capa(dev[0], "MSCHAPV2")
1789 params = hs20_ap_params()
1790 params['domain_name'] = "roaming.example.org"
1791 hostapd.add_ap(apdev[0], params)
1793 params = hs20_ap_params()
1794 params['ssid'] = "test-hs20-other"
1795 params['domain_name'] = "roaming.example.net"
1796 hostapd.add_ap(apdev[1], params)
1798 logger.info("Verify default vs. specified preference")
1799 values = default_cred()
1800 values['roaming_partner'] = "roaming.example.net,1,127,*"
1801 policy_test(dev[0], apdev[1], values, only_one=False)
1802 values['roaming_partner'] = "roaming.example.net,1,129,*"
1803 policy_test(dev[0], apdev[0], values, only_one=False)
1805 logger.info("Verify partial FQDN match")
1806 values['roaming_partner'] = "example.net,0,0,*"
1807 policy_test(dev[0], apdev[1], values, only_one=False)
1808 values['roaming_partner'] = "example.net,0,255,*"
1809 policy_test(dev[0], apdev[0], values, only_one=False)
1811 def test_ap_hs20_max_bss_load(dev, apdev):
1812 """Hotspot 2.0 and maximum BSS load"""
1813 check_eap_capa(dev[0], "MSCHAPV2")
1814 params = hs20_ap_params()
1815 params['bss_load_test'] = "12:200:20000"
1816 hostapd.add_ap(apdev[0], params)
1818 params = hs20_ap_params()
1819 params['ssid'] = "test-hs20-other"
1820 params['bss_load_test'] = "5:20:10000"
1821 hostapd.add_ap(apdev[1], params)
1823 logger.info("Verify maximum BSS load constraint")
1824 values = default_cred()
1825 values['domain'] = "example.com"
1826 values['max_bss_load'] = "100"
1827 events = policy_test(dev[0], apdev[1], values, only_one=False)
1829 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1830 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1831 raise Exception("Maximum BSS Load case not noticed")
1832 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1833 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1834 raise Exception("Maximum BSS Load case reported incorrectly")
1836 logger.info("Verify maximum BSS load does not prevent connection")
1837 values['max_bss_load'] = "1"
1838 events = policy_test(dev[0], None, values)
1840 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1841 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1842 raise Exception("Maximum BSS Load case not noticed")
1843 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1844 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1845 raise Exception("Maximum BSS Load case not noticed")
1847 def test_ap_hs20_max_bss_load2(dev, apdev):
1848 """Hotspot 2.0 and maximum BSS load with one AP not advertising"""
1849 check_eap_capa(dev[0], "MSCHAPV2")
1850 params = hs20_ap_params()
1851 params['bss_load_test'] = "12:200:20000"
1852 hostapd.add_ap(apdev[0], params)
1854 params = hs20_ap_params()
1855 params['ssid'] = "test-hs20-other"
1856 hostapd.add_ap(apdev[1], params)
1858 logger.info("Verify maximum BSS load constraint with AP advertisement")
1859 values = default_cred()
1860 values['domain'] = "example.com"
1861 values['max_bss_load'] = "100"
1862 events = policy_test(dev[0], apdev[1], values, only_one=False)
1864 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1865 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1866 raise Exception("Maximum BSS Load case not noticed")
1867 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1868 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1869 raise Exception("Maximum BSS Load case reported incorrectly")
1871 def test_ap_hs20_max_bss_load_roaming(dev, apdev):
1872 """Hotspot 2.0 and maximum BSS load (roaming)"""
1873 check_eap_capa(dev[0], "MSCHAPV2")
1874 params = hs20_ap_params()
1875 params['bss_load_test'] = "12:200:20000"
1876 hostapd.add_ap(apdev[0], params)
1878 values = default_cred()
1879 values['domain'] = "roaming.example.com"
1880 values['max_bss_load'] = "100"
1881 events = policy_test(dev[0], apdev[0], values, only_one=True)
1882 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1884 raise Exception("No INTERWORKING-AP event")
1885 if "over_max_bss_load=1" in ev[0]:
1886 raise Exception("Maximum BSS Load reported for roaming")
1888 def test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1889 """Hotspot 2.0 multi-cred sp_priority"""
1890 check_eap_capa(dev[0], "MSCHAPV2")
1892 _test_ap_hs20_multi_cred_sp_prio(dev, apdev)
1894 dev[0].request("SET external_sim 0")
1896 def _test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1897 hlr_auc_gw_available()
1898 bssid = apdev[0]['bssid']
1899 params = hs20_ap_params()
1900 params['hessid'] = bssid
1901 del params['domain_name']
1902 params['anqp_3gpp_cell_net'] = "232,01"
1903 hostapd.add_ap(apdev[0], params)
1905 dev[0].hs20_enable()
1906 dev[0].scan_for_bss(bssid, freq="2412")
1907 dev[0].request("SET external_sim 1")
1908 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1909 'provisioning_sp': "example.com",
1910 'sp_priority' :"1" })
1911 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1912 'ca_cert': "auth_serv/ca.pem",
1913 'username': "hs20-test",
1914 'password': "password",
1915 'domain': "example.com",
1916 'provisioning_sp': "example.com",
1917 'sp_priority': "2" })
1918 dev[0].dump_monitor()
1919 dev[0].scan_for_bss(bssid, freq="2412")
1920 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1921 interworking_ext_sim_auth(dev[0], "SIM")
1922 check_sp_type(dev[0], "unknown")
1923 dev[0].request("REMOVE_NETWORK all")
1925 dev[0].set_cred(id1, "sp_priority", "2")
1926 dev[0].set_cred(id2, "sp_priority", "1")
1927 dev[0].dump_monitor()
1928 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1929 interworking_auth(dev[0], "TTLS")
1930 check_sp_type(dev[0], "unknown")
1932 def test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1933 """Hotspot 2.0 multi-cred sp_priority with two BSSes"""
1934 check_eap_capa(dev[0], "MSCHAPV2")
1936 _test_ap_hs20_multi_cred_sp_prio2(dev, apdev)
1938 dev[0].request("SET external_sim 0")
1940 def _test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1941 hlr_auc_gw_available()
1942 bssid = apdev[0]['bssid']
1943 params = hs20_ap_params()
1944 params['hessid'] = bssid
1945 del params['nai_realm']
1946 del params['domain_name']
1947 params['anqp_3gpp_cell_net'] = "232,01"
1948 hostapd.add_ap(apdev[0], params)
1950 bssid2 = apdev[1]['bssid']
1951 params = hs20_ap_params()
1952 params['ssid'] = "test-hs20-other"
1953 params['hessid'] = bssid2
1954 del params['domain_name']
1955 del params['anqp_3gpp_cell_net']
1956 hostapd.add_ap(apdev[1], params)
1958 dev[0].hs20_enable()
1959 dev[0].request("SET external_sim 1")
1960 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1961 'provisioning_sp': "example.com",
1962 'sp_priority': "1" })
1963 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1964 'ca_cert': "auth_serv/ca.pem",
1965 'username': "hs20-test",
1966 'password': "password",
1967 'domain': "example.com",
1968 'provisioning_sp': "example.com",
1969 'sp_priority': "2" })
1970 dev[0].dump_monitor()
1971 dev[0].scan_for_bss(bssid, freq="2412")
1972 dev[0].scan_for_bss(bssid2, freq="2412")
1973 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1974 interworking_ext_sim_auth(dev[0], "SIM")
1975 check_sp_type(dev[0], "unknown")
1976 conn_bssid = dev[0].get_status_field("bssid")
1977 if conn_bssid != bssid:
1978 raise Exception("Connected to incorrect BSS")
1979 dev[0].request("REMOVE_NETWORK all")
1981 dev[0].set_cred(id1, "sp_priority", "2")
1982 dev[0].set_cred(id2, "sp_priority", "1")
1983 dev[0].dump_monitor()
1984 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1985 interworking_auth(dev[0], "TTLS")
1986 check_sp_type(dev[0], "unknown")
1987 conn_bssid = dev[0].get_status_field("bssid")
1988 if conn_bssid != bssid2:
1989 raise Exception("Connected to incorrect BSS")
1991 def test_ap_hs20_multi_cred_sp_prio_same(dev, apdev):
1992 """Hotspot 2.0 multi-cred and same sp_priority"""
1993 check_eap_capa(dev[0], "MSCHAPV2")
1994 hlr_auc_gw_available()
1995 bssid = apdev[0]['bssid']
1996 params = hs20_ap_params()
1997 params['hessid'] = bssid
1998 del params['domain_name']
1999 params['anqp_3gpp_cell_net'] = "232,01"
2000 hostapd.add_ap(apdev[0], params)
2002 dev[0].hs20_enable()
2003 dev[0].scan_for_bss(bssid, freq="2412")
2004 id1 = dev[0].add_cred_values({ 'realm': "example.com",
2005 'ca_cert': "auth_serv/ca.pem",
2006 'username': "hs20-test",
2007 'password': "password",
2008 'domain': "domain1.example.com",
2009 'provisioning_sp': "example.com",
2010 'sp_priority': "1" })
2011 id2 = dev[0].add_cred_values({ 'realm': "example.com",
2012 'ca_cert': "auth_serv/ca.pem",
2013 'username': "hs20-test",
2014 'password': "password",
2015 'domain': "domain2.example.com",
2016 'provisioning_sp': "example.com",
2017 'sp_priority': "1" })
2018 dev[0].dump_monitor()
2019 dev[0].scan_for_bss(bssid, freq="2412")
2020 check_auto_select(dev[0], bssid)
2022 def check_conn_capab_selection(dev, type, missing):
2023 dev.request("INTERWORKING_SELECT freq=2412")
2024 ev = dev.wait_event(["INTERWORKING-AP"])
2026 raise Exception("Network selection timed out")
2027 if "type=" + type not in ev:
2028 raise Exception("Unexpected network type")
2029 if missing and "conn_capab_missing=1" not in ev:
2030 raise Exception("conn_capab_missing not reported")
2031 if not missing and "conn_capab_missing=1" in ev:
2032 raise Exception("conn_capab_missing reported unexpectedly")
2034 def conn_capab_cred(domain=None, req_conn_capab=None):
2035 cred = default_cred(domain=domain)
2037 cred['req_conn_capab'] = req_conn_capab
2040 def test_ap_hs20_req_conn_capab(dev, apdev):
2041 """Hotspot 2.0 network selection with req_conn_capab"""
2042 check_eap_capa(dev[0], "MSCHAPV2")
2043 bssid = apdev[0]['bssid']
2044 params = hs20_ap_params()
2045 hostapd.add_ap(apdev[0], params)
2047 dev[0].hs20_enable()
2048 dev[0].scan_for_bss(bssid, freq="2412")
2049 logger.info("Not used in home network")
2050 values = conn_capab_cred(domain="example.com", req_conn_capab="6:1234")
2051 id = dev[0].add_cred_values(values)
2052 check_conn_capab_selection(dev[0], "home", False)
2054 logger.info("Used in roaming network")
2055 dev[0].remove_cred(id)
2056 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
2057 id = dev[0].add_cred_values(values)
2058 check_conn_capab_selection(dev[0], "roaming", True)
2060 logger.info("Verify that req_conn_capab does not prevent connection if no other network is available")
2061 check_auto_select(dev[0], bssid)
2063 logger.info("Additional req_conn_capab checks")
2065 dev[0].remove_cred(id)
2066 values = conn_capab_cred(domain="example.org", req_conn_capab="1:0")
2067 id = dev[0].add_cred_values(values)
2068 check_conn_capab_selection(dev[0], "roaming", True)
2070 dev[0].remove_cred(id)
2071 values = conn_capab_cred(domain="example.org", req_conn_capab="17:5060")
2072 id = dev[0].add_cred_values(values)
2073 check_conn_capab_selection(dev[0], "roaming", True)
2075 bssid2 = apdev[1]['bssid']
2076 params = hs20_ap_params(ssid="test-hs20b")
2077 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
2078 hostapd.add_ap(apdev[1], params)
2080 dev[0].remove_cred(id)
2081 values = conn_capab_cred(domain="example.org", req_conn_capab="50")
2082 id = dev[0].add_cred_values(values)
2083 dev[0].set_cred(id, "req_conn_capab", "6:22")
2084 dev[0].scan_for_bss(bssid2, freq="2412")
2085 dev[0].request("INTERWORKING_SELECT freq=2412")
2086 for i in range(0, 2):
2087 ev = dev[0].wait_event(["INTERWORKING-AP"])
2089 raise Exception("Network selection timed out")
2090 if bssid in ev and "conn_capab_missing=1" not in ev:
2091 raise Exception("Missing protocol connection capability not reported")
2092 if bssid2 in ev and "conn_capab_missing=1" in ev:
2093 raise Exception("Protocol connection capability not reported correctly")
2095 def test_ap_hs20_req_conn_capab2(dev, apdev):
2096 """Hotspot 2.0 network selection with req_conn_capab (not present)"""
2097 check_eap_capa(dev[0], "MSCHAPV2")
2098 bssid = apdev[0]['bssid']
2099 params = hs20_ap_params()
2100 del params['hs20_conn_capab']
2101 hostapd.add_ap(apdev[0], params)
2103 dev[0].hs20_enable()
2104 dev[0].scan_for_bss(bssid, freq="2412")
2105 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
2106 id = dev[0].add_cred_values(values)
2107 check_conn_capab_selection(dev[0], "roaming", False)
2109 def test_ap_hs20_req_conn_capab_and_roaming_partner_preference(dev, apdev):
2110 """Hotspot 2.0 and req_conn_capab with roaming partner preference"""
2111 check_eap_capa(dev[0], "MSCHAPV2")
2112 bssid = apdev[0]['bssid']
2113 params = hs20_ap_params()
2114 params['domain_name'] = "roaming.example.org"
2115 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
2116 hostapd.add_ap(apdev[0], params)
2118 bssid2 = apdev[1]['bssid']
2119 params = hs20_ap_params(ssid="test-hs20-b")
2120 params['domain_name'] = "roaming.example.net"
2121 hostapd.add_ap(apdev[1], params)
2123 values = default_cred()
2124 values['roaming_partner'] = "roaming.example.net,1,127,*"
2125 id = dev[0].add_cred_values(values)
2126 check_auto_select(dev[0], bssid2)
2128 dev[0].set_cred(id, "req_conn_capab", "50")
2129 check_auto_select(dev[0], bssid)
2131 dev[0].remove_cred(id)
2132 id = dev[0].add_cred_values(values)
2133 dev[0].set_cred(id, "req_conn_capab", "51")
2134 check_auto_select(dev[0], bssid2)
2136 def check_bandwidth_selection(dev, type, below):
2137 dev.request("INTERWORKING_SELECT freq=2412")
2138 ev = dev.wait_event(["INTERWORKING-AP"])
2140 raise Exception("Network selection timed out")
2141 logger.debug("BSS entries:\n" + dev.request("BSS RANGE=ALL"))
2142 if "type=" + type not in ev:
2143 raise Exception("Unexpected network type")
2144 if below and "below_min_backhaul=1" not in ev:
2145 raise Exception("below_min_backhaul not reported")
2146 if not below and "below_min_backhaul=1" in ev:
2147 raise Exception("below_min_backhaul reported unexpectedly")
2149 def bw_cred(domain=None, dl_home=None, ul_home=None, dl_roaming=None, ul_roaming=None):
2150 cred = default_cred(domain=domain)
2152 cred['min_dl_bandwidth_home'] = str(dl_home)
2154 cred['min_ul_bandwidth_home'] = str(ul_home)
2156 cred['min_dl_bandwidth_roaming'] = str(dl_roaming)
2158 cred['min_ul_bandwidth_roaming'] = str(ul_roaming)
2161 def test_ap_hs20_min_bandwidth_home(dev, apdev):
2162 """Hotspot 2.0 network selection with min bandwidth (home)"""
2163 check_eap_capa(dev[0], "MSCHAPV2")
2164 bssid = apdev[0]['bssid']
2165 params = hs20_ap_params()
2166 hostapd.add_ap(apdev[0], params)
2168 dev[0].hs20_enable()
2169 dev[0].scan_for_bss(bssid, freq="2412")
2170 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2171 id = dev[0].add_cred_values(values)
2172 check_bandwidth_selection(dev[0], "home", False)
2173 dev[0].remove_cred(id)
2175 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
2176 id = dev[0].add_cred_values(values)
2177 check_bandwidth_selection(dev[0], "home", True)
2178 dev[0].remove_cred(id)
2180 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
2181 id = dev[0].add_cred_values(values)
2182 check_bandwidth_selection(dev[0], "home", True)
2183 dev[0].remove_cred(id)
2185 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
2186 id = dev[0].add_cred_values(values)
2187 check_bandwidth_selection(dev[0], "home", True)
2188 check_auto_select(dev[0], bssid)
2190 bssid2 = apdev[1]['bssid']
2191 params = hs20_ap_params(ssid="test-hs20-b")
2192 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2193 hostapd.add_ap(apdev[1], params)
2195 check_auto_select(dev[0], bssid2)
2197 def test_ap_hs20_min_bandwidth_home2(dev, apdev):
2198 """Hotspot 2.0 network selection with min bandwidth - special cases"""
2199 check_eap_capa(dev[0], "MSCHAPV2")
2200 bssid = apdev[0]['bssid']
2201 params = hs20_ap_params()
2202 hapd = hostapd.add_ap(apdev[0], params)
2204 dev[0].hs20_enable()
2205 dev[0].scan_for_bss(bssid, freq="2412")
2206 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2207 id = dev[0].add_cred_values(values)
2208 check_bandwidth_selection(dev[0], "home", False)
2210 logger.info("WAN link at capacity")
2211 hapd.set('hs20_wan_metrics', "09:8000:1000:80:240:3000")
2212 check_bandwidth_selection(dev[0], "home", True)
2214 logger.info("Downlink/Uplink Load was not measured")
2215 hapd.set('hs20_wan_metrics', "01:8000:1000:80:240:0")
2216 check_bandwidth_selection(dev[0], "home", False)
2218 logger.info("Uplink and Downlink max values")
2219 hapd.set('hs20_wan_metrics', "01:4294967295:4294967295:80:240:3000")
2220 check_bandwidth_selection(dev[0], "home", False)
2222 dev[0].remove_cred(id)
2224 def test_ap_hs20_min_bandwidth_home_hidden_ssid_in_scan_res(dev, apdev):
2225 """Hotspot 2.0 network selection with min bandwidth (home) while hidden SSID is included in scan results"""
2226 check_eap_capa(dev[0], "MSCHAPV2")
2227 bssid = apdev[0]['bssid']
2229 hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret',
2230 "ignore_broadcast_ssid": "1" })
2231 dev[0].scan_for_bss(bssid, freq=2412)
2233 hapd_global = hostapd.HostapdGlobal(apdev[0])
2235 hapd_global.remove(apdev[0]['ifname'])
2237 params = hs20_ap_params()
2238 hostapd.add_ap(apdev[0], params)
2240 dev[0].hs20_enable()
2241 dev[0].scan_for_bss(bssid, freq="2412")
2242 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2243 id = dev[0].add_cred_values(values)
2244 check_bandwidth_selection(dev[0], "home", False)
2245 dev[0].remove_cred(id)
2247 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
2248 id = dev[0].add_cred_values(values)
2249 check_bandwidth_selection(dev[0], "home", True)
2250 dev[0].remove_cred(id)
2252 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
2253 id = dev[0].add_cred_values(values)
2254 check_bandwidth_selection(dev[0], "home", True)
2255 dev[0].remove_cred(id)
2257 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
2258 id = dev[0].add_cred_values(values)
2259 check_bandwidth_selection(dev[0], "home", True)
2260 check_auto_select(dev[0], bssid)
2262 bssid2 = apdev[1]['bssid']
2263 params = hs20_ap_params(ssid="test-hs20-b")
2264 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2265 hostapd.add_ap(apdev[1], params)
2267 check_auto_select(dev[0], bssid2)
2269 dev[0].flush_scan_cache()
2271 def test_ap_hs20_min_bandwidth_roaming(dev, apdev):
2272 """Hotspot 2.0 network selection with min bandwidth (roaming)"""
2273 check_eap_capa(dev[0], "MSCHAPV2")
2274 bssid = apdev[0]['bssid']
2275 params = hs20_ap_params()
2276 hostapd.add_ap(apdev[0], params)
2278 dev[0].hs20_enable()
2279 dev[0].scan_for_bss(bssid, freq="2412")
2280 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=58)
2281 id = dev[0].add_cred_values(values)
2282 check_bandwidth_selection(dev[0], "roaming", False)
2283 dev[0].remove_cred(id)
2285 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=58)
2286 id = dev[0].add_cred_values(values)
2287 check_bandwidth_selection(dev[0], "roaming", True)
2288 dev[0].remove_cred(id)
2290 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=59)
2291 id = dev[0].add_cred_values(values)
2292 check_bandwidth_selection(dev[0], "roaming", True)
2293 dev[0].remove_cred(id)
2295 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=59)
2296 id = dev[0].add_cred_values(values)
2297 check_bandwidth_selection(dev[0], "roaming", True)
2298 check_auto_select(dev[0], bssid)
2300 bssid2 = apdev[1]['bssid']
2301 params = hs20_ap_params(ssid="test-hs20-b")
2302 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2303 hostapd.add_ap(apdev[1], params)
2305 check_auto_select(dev[0], bssid2)
2307 def test_ap_hs20_min_bandwidth_and_roaming_partner_preference(dev, apdev):
2308 """Hotspot 2.0 and minimum bandwidth with roaming partner preference"""
2309 check_eap_capa(dev[0], "MSCHAPV2")
2310 bssid = apdev[0]['bssid']
2311 params = hs20_ap_params()
2312 params['domain_name'] = "roaming.example.org"
2313 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2314 hostapd.add_ap(apdev[0], params)
2316 bssid2 = apdev[1]['bssid']
2317 params = hs20_ap_params(ssid="test-hs20-b")
2318 params['domain_name'] = "roaming.example.net"
2319 hostapd.add_ap(apdev[1], params)
2321 values = default_cred()
2322 values['roaming_partner'] = "roaming.example.net,1,127,*"
2323 id = dev[0].add_cred_values(values)
2324 check_auto_select(dev[0], bssid2)
2326 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "6000")
2327 check_auto_select(dev[0], bssid)
2329 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "10000")
2330 check_auto_select(dev[0], bssid2)
2332 def test_ap_hs20_min_bandwidth_no_wan_metrics(dev, apdev):
2333 """Hotspot 2.0 network selection with min bandwidth but no WAN Metrics"""
2334 bssid = apdev[0]['bssid']
2335 params = hs20_ap_params()
2336 del params['hs20_wan_metrics']
2337 hostapd.add_ap(apdev[0], params)
2339 dev[0].hs20_enable()
2340 dev[0].scan_for_bss(bssid, freq="2412")
2341 values = bw_cred(domain="example.com", dl_home=10000, ul_home=10000,
2342 dl_roaming=10000, ul_roaming=10000)
2343 dev[0].add_cred_values(values)
2344 check_bandwidth_selection(dev[0], "home", False)
2346 def test_ap_hs20_deauth_req_ess(dev, apdev):
2347 """Hotspot 2.0 connection and deauthentication request for ESS"""
2348 check_eap_capa(dev[0], "MSCHAPV2")
2350 _test_ap_hs20_deauth_req_ess(dev, apdev)
2352 dev[0].request("SET pmf 0")
2354 def _test_ap_hs20_deauth_req_ess(dev, apdev):
2355 dev[0].request("SET pmf 2")
2356 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2357 dev[0].dump_monitor()
2358 addr = dev[0].p2p_interface_addr()
2359 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2360 hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
2361 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
2363 raise Exception("Timeout on deauth imminent notice")
2364 if "1 120 http://example.com/" not in ev:
2365 raise Exception("Unexpected deauth imminent notice: " + ev)
2366 hapd.request("DEAUTHENTICATE " + addr)
2367 dev[0].wait_disconnected(timeout=10)
2368 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
2369 raise Exception("Network not marked temporarily disabled")
2370 ev = dev[0].wait_event(["SME: Trying to authenticate",
2371 "Trying to associate",
2372 "CTRL-EVENT-CONNECTED"], timeout=5)
2374 raise Exception("Unexpected connection attempt")
2376 def test_ap_hs20_deauth_req_bss(dev, apdev):
2377 """Hotspot 2.0 connection and deauthentication request for BSS"""
2378 check_eap_capa(dev[0], "MSCHAPV2")
2380 _test_ap_hs20_deauth_req_bss(dev, apdev)
2382 dev[0].request("SET pmf 0")
2384 def _test_ap_hs20_deauth_req_bss(dev, apdev):
2385 dev[0].request("SET pmf 2")
2386 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2387 dev[0].dump_monitor()
2388 addr = dev[0].p2p_interface_addr()
2389 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2390 hapd.request("HS20_DEAUTH_REQ " + addr + " 0 120 http://example.com/")
2391 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
2393 raise Exception("Timeout on deauth imminent notice")
2394 if "0 120 http://example.com/" not in ev:
2395 raise Exception("Unexpected deauth imminent notice: " + ev)
2396 hapd.request("DEAUTHENTICATE " + addr + " reason=4")
2397 ev = dev[0].wait_disconnected(timeout=10)
2398 if "reason=4" not in ev:
2399 raise Exception("Unexpected disconnection reason")
2400 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
2401 raise Exception("Network not marked temporarily disabled")
2402 ev = dev[0].wait_event(["SME: Trying to authenticate",
2403 "Trying to associate",
2404 "CTRL-EVENT-CONNECTED"], timeout=5)
2406 raise Exception("Unexpected connection attempt")
2408 def test_ap_hs20_deauth_req_from_radius(dev, apdev):
2409 """Hotspot 2.0 connection and deauthentication request from RADIUS"""
2410 check_eap_capa(dev[0], "MSCHAPV2")
2412 _test_ap_hs20_deauth_req_from_radius(dev, apdev)
2414 dev[0].request("SET pmf 0")
2416 def _test_ap_hs20_deauth_req_from_radius(dev, apdev):
2417 bssid = apdev[0]['bssid']
2418 params = hs20_ap_params()
2419 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2420 params['hs20_deauth_req_timeout'] = "2"
2421 hostapd.add_ap(apdev[0], params)
2423 dev[0].request("SET pmf 2")
2424 dev[0].hs20_enable()
2425 dev[0].add_cred_values({ 'realm': "example.com",
2426 'username': "hs20-deauth-test",
2427 'password': "password" })
2428 interworking_select(dev[0], bssid, freq="2412")
2429 interworking_connect(dev[0], bssid, "TTLS")
2430 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=5)
2432 raise Exception("Timeout on deauth imminent notice")
2433 if " 1 100" not in ev:
2434 raise Exception("Unexpected deauth imminent contents")
2435 dev[0].wait_disconnected(timeout=3)
2437 def test_ap_hs20_deauth_req_without_pmf(dev, apdev):
2438 """Hotspot 2.0 connection and deauthentication request without PMF"""
2439 check_eap_capa(dev[0], "MSCHAPV2")
2440 dev[0].request("SET pmf 0")
2441 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2442 dev[0].dump_monitor()
2443 addr = dev[0].own_addr()
2444 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2445 hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
2446 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=0.2)
2448 raise Exception("Deauth imminent notice without PMF accepted")
2450 def test_ap_hs20_remediation_required(dev, apdev):
2451 """Hotspot 2.0 connection and remediation required from RADIUS"""
2452 check_eap_capa(dev[0], "MSCHAPV2")
2454 _test_ap_hs20_remediation_required(dev, apdev)
2456 dev[0].request("SET pmf 0")
2458 def _test_ap_hs20_remediation_required(dev, apdev):
2459 bssid = apdev[0]['bssid']
2460 params = hs20_ap_params()
2461 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2462 hostapd.add_ap(apdev[0], params)
2464 dev[0].request("SET pmf 1")
2465 dev[0].hs20_enable()
2466 dev[0].add_cred_values({ 'realm': "example.com",
2467 'username': "hs20-subrem-test",
2468 'password': "password" })
2469 interworking_select(dev[0], bssid, freq="2412")
2470 interworking_connect(dev[0], bssid, "TTLS")
2471 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2473 raise Exception("Timeout on subscription remediation notice")
2474 if " 1 https://example.com/" not in ev:
2475 raise Exception("Unexpected subscription remediation event contents")
2477 def test_ap_hs20_remediation_required_ctrl(dev, apdev):
2478 """Hotspot 2.0 connection and subrem from ctrl_iface"""
2479 check_eap_capa(dev[0], "MSCHAPV2")
2481 _test_ap_hs20_remediation_required_ctrl(dev, apdev)
2483 dev[0].request("SET pmf 0")
2485 def _test_ap_hs20_remediation_required_ctrl(dev, apdev):
2486 bssid = apdev[0]['bssid']
2487 addr = dev[0].own_addr()
2488 params = hs20_ap_params()
2489 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2490 hapd = hostapd.add_ap(apdev[0], params)
2492 dev[0].request("SET pmf 1")
2493 dev[0].hs20_enable()
2494 dev[0].add_cred_values(default_cred())
2495 interworking_select(dev[0], bssid, freq="2412")
2496 interworking_connect(dev[0], bssid, "TTLS")
2498 hapd.request("HS20_WNM_NOTIF " + addr + " https://example.com/")
2499 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2501 raise Exception("Timeout on subscription remediation notice")
2502 if " 1 https://example.com/" not in ev:
2503 raise Exception("Unexpected subscription remediation event contents")
2505 hapd.request("HS20_WNM_NOTIF " + addr)
2506 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2508 raise Exception("Timeout on subscription remediation notice")
2509 if not ev.endswith("HS20-SUBSCRIPTION-REMEDIATION "):
2510 raise Exception("Unexpected subscription remediation event contents: " + ev)
2512 if "FAIL" not in hapd.request("HS20_WNM_NOTIF "):
2513 raise Exception("Unexpected HS20_WNM_NOTIF success")
2514 if "FAIL" not in hapd.request("HS20_WNM_NOTIF foo"):
2515 raise Exception("Unexpected HS20_WNM_NOTIF success")
2516 if "FAIL" not in hapd.request("HS20_WNM_NOTIF " + addr + " https://12345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678927.very.long.example.com/"):
2517 raise Exception("Unexpected HS20_WNM_NOTIF success")
2519 def test_ap_hs20_session_info(dev, apdev):
2520 """Hotspot 2.0 connection and session information from RADIUS"""
2521 check_eap_capa(dev[0], "MSCHAPV2")
2523 _test_ap_hs20_session_info(dev, apdev)
2525 dev[0].request("SET pmf 0")
2527 def _test_ap_hs20_session_info(dev, apdev):
2528 bssid = apdev[0]['bssid']
2529 params = hs20_ap_params()
2530 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2531 hostapd.add_ap(apdev[0], params)
2533 dev[0].request("SET pmf 1")
2534 dev[0].hs20_enable()
2535 dev[0].add_cred_values({ 'realm': "example.com",
2536 'username': "hs20-session-info-test",
2537 'password': "password" })
2538 interworking_select(dev[0], bssid, freq="2412")
2539 interworking_connect(dev[0], bssid, "TTLS")
2540 ev = dev[0].wait_event(["ESS-DISASSOC-IMMINENT"], timeout=10)
2542 raise Exception("Timeout on ESS disassociation imminent notice")
2543 if " 1 59904 https://example.com/" not in ev:
2544 raise Exception("Unexpected ESS disassociation imminent event contents")
2545 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"])
2547 raise Exception("Scan not started")
2548 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=30)
2550 raise Exception("Scan not completed")
2552 def test_ap_hs20_osen(dev, apdev):
2553 """Hotspot 2.0 OSEN connection"""
2554 params = { 'ssid': "osen",
2556 'auth_server_addr': "127.0.0.1",
2557 'auth_server_port': "1812",
2558 'auth_server_shared_secret': "radius" }
2559 hostapd.add_ap(apdev[0], params)
2561 dev[1].connect("osen", key_mgmt="NONE", scan_freq="2412",
2563 dev[2].connect("osen", key_mgmt="NONE", wep_key0='"hello"',
2564 scan_freq="2412", wait_connect=False)
2565 dev[0].flush_scan_cache()
2566 dev[0].connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
2567 group="GTK_NOT_USED",
2568 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
2569 ca_cert="auth_serv/ca.pem",
2571 res = dev[0].get_bss(apdev[0]['bssid'])['flags']
2572 if "[OSEN-OSEN-CCMP]" not in res:
2573 raise Exception("OSEN not reported in BSS")
2575 raise Exception("WEP reported in BSS")
2576 res = dev[0].request("SCAN_RESULTS")
2577 if "[OSEN-OSEN-CCMP]" not in res:
2578 raise Exception("OSEN not reported in SCAN_RESULTS")
2580 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
2581 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
2582 wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
2583 group="GTK_NOT_USED",
2584 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
2585 ca_cert="auth_serv/ca.pem",
2587 wpas.request("DISCONNECT")
2589 def test_ap_hs20_network_preference(dev, apdev):
2590 """Hotspot 2.0 network selection with preferred home network"""
2591 check_eap_capa(dev[0], "MSCHAPV2")
2592 bssid = apdev[0]['bssid']
2593 params = hs20_ap_params()
2594 hostapd.add_ap(apdev[0], params)
2596 dev[0].hs20_enable()
2597 values = { 'realm': "example.com",
2598 'username': "hs20-test",
2599 'password': "password",
2600 'domain': "example.com" }
2601 dev[0].add_cred_values(values)
2603 id = dev[0].add_network()
2604 dev[0].set_network_quoted(id, "ssid", "home")
2605 dev[0].set_network_quoted(id, "psk", "12345678")
2606 dev[0].set_network(id, "priority", "1")
2607 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2609 dev[0].scan_for_bss(bssid, freq="2412")
2610 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2611 ev = dev[0].wait_connected(timeout=15)
2613 raise Exception("Unexpected network selected")
2615 bssid2 = apdev[1]['bssid']
2616 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
2617 hostapd.add_ap(apdev[1], params)
2619 dev[0].scan_for_bss(bssid2, freq="2412")
2620 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2621 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2622 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2624 raise Exception("Connection timed out")
2625 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2626 raise Exception("No roam to higher priority network")
2627 if bssid2 not in ev:
2628 raise Exception("Unexpected network selected")
2630 def test_ap_hs20_network_preference2(dev, apdev):
2631 """Hotspot 2.0 network selection with preferred credential"""
2632 check_eap_capa(dev[0], "MSCHAPV2")
2633 bssid2 = apdev[1]['bssid']
2634 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
2635 hostapd.add_ap(apdev[1], params)
2637 dev[0].hs20_enable()
2638 values = { 'realm': "example.com",
2639 'username': "hs20-test",
2640 'password': "password",
2641 'domain': "example.com",
2643 dev[0].add_cred_values(values)
2645 id = dev[0].add_network()
2646 dev[0].set_network_quoted(id, "ssid", "home")
2647 dev[0].set_network_quoted(id, "psk", "12345678")
2648 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2650 dev[0].scan_for_bss(bssid2, freq="2412")
2651 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2652 ev = dev[0].wait_connected(timeout=15)
2653 if bssid2 not in ev:
2654 raise Exception("Unexpected network selected")
2656 bssid = apdev[0]['bssid']
2657 params = hs20_ap_params()
2658 hostapd.add_ap(apdev[0], params)
2660 dev[0].scan_for_bss(bssid, freq="2412")
2661 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2662 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2663 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2665 raise Exception("Connection timed out")
2666 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2667 raise Exception("No roam to higher priority network")
2669 raise Exception("Unexpected network selected")
2671 def test_ap_hs20_network_preference3(dev, apdev):
2672 """Hotspot 2.0 network selection with two credential (one preferred)"""
2673 check_eap_capa(dev[0], "MSCHAPV2")
2674 bssid = apdev[0]['bssid']
2675 params = hs20_ap_params()
2676 hostapd.add_ap(apdev[0], params)
2678 bssid2 = apdev[1]['bssid']
2679 params = hs20_ap_params(ssid="test-hs20b")
2680 params['nai_realm'] = "0,example.org,13[5:6],21[2:4][5:7]"
2681 hostapd.add_ap(apdev[1], params)
2683 dev[0].hs20_enable()
2684 values = { 'realm': "example.com",
2685 'username': "hs20-test",
2686 'password': "password",
2688 dev[0].add_cred_values(values)
2689 values = { 'realm': "example.org",
2690 'username': "hs20-test",
2691 'password': "password" }
2692 id = dev[0].add_cred_values(values)
2694 dev[0].scan_for_bss(bssid, freq="2412")
2695 dev[0].scan_for_bss(bssid2, freq="2412")
2696 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2697 ev = dev[0].wait_connected(timeout=15)
2699 raise Exception("Unexpected network selected")
2701 dev[0].set_cred(id, "priority", "2")
2702 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2703 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2704 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2706 raise Exception("Connection timed out")
2707 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2708 raise Exception("No roam to higher priority network")
2709 if bssid2 not in ev:
2710 raise Exception("Unexpected network selected")
2712 def test_ap_hs20_network_preference4(dev, apdev):
2713 """Hotspot 2.0 network selection with username vs. SIM credential"""
2714 check_eap_capa(dev[0], "MSCHAPV2")
2715 bssid = apdev[0]['bssid']
2716 params = hs20_ap_params()
2717 hostapd.add_ap(apdev[0], params)
2719 bssid2 = apdev[1]['bssid']
2720 params = hs20_ap_params(ssid="test-hs20b")
2721 params['hessid'] = bssid2
2722 params['anqp_3gpp_cell_net'] = "555,444"
2723 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
2724 hostapd.add_ap(apdev[1], params)
2726 dev[0].hs20_enable()
2727 values = { 'realm': "example.com",
2728 'username': "hs20-test",
2729 'password': "password",
2731 dev[0].add_cred_values(values)
2732 values = { 'imsi': "555444-333222111",
2734 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
2735 id = dev[0].add_cred_values(values)
2737 dev[0].scan_for_bss(bssid, freq="2412")
2738 dev[0].scan_for_bss(bssid2, freq="2412")
2739 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2740 ev = dev[0].wait_connected(timeout=15)
2742 raise Exception("Unexpected network selected")
2744 dev[0].set_cred(id, "priority", "2")
2745 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2746 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2747 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2749 raise Exception("Connection timed out")
2750 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2751 raise Exception("No roam to higher priority network")
2752 if bssid2 not in ev:
2753 raise Exception("Unexpected network selected")
2755 def test_ap_hs20_interworking_select_blocking_scan(dev, apdev):
2756 """Ongoing INTERWORKING_SELECT blocking SCAN"""
2757 check_eap_capa(dev[0], "MSCHAPV2")
2758 bssid = apdev[0]['bssid']
2759 params = hs20_ap_params()
2760 hostapd.add_ap(apdev[0], params)
2762 dev[0].hs20_enable()
2763 values = { 'realm': "example.com",
2764 'username': "hs20-test",
2765 'password': "password",
2766 'domain': "example.com" }
2767 dev[0].add_cred_values(values)
2769 dev[0].scan_for_bss(bssid, freq="2412")
2770 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2771 if "FAIL-BUSY" not in dev[0].request("SCAN"):
2772 raise Exception("Unexpected SCAN command result")
2773 dev[0].wait_connected(timeout=15)
2775 def test_ap_hs20_fetch_osu(dev, apdev):
2776 """Hotspot 2.0 OSU provider and icon fetch"""
2777 bssid = apdev[0]['bssid']
2778 params = hs20_ap_params()
2779 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2780 params['osu_ssid'] = '"HS 2.0 OSU open"'
2781 params['osu_method_list'] = "1"
2782 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2783 params['osu_icon'] = "w1fi_logo"
2784 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2785 params['osu_server_uri'] = "https://example.com/osu/"
2786 hostapd.add_ap(apdev[0], params)
2788 bssid2 = apdev[1]['bssid']
2789 params = hs20_ap_params(ssid="test-hs20b")
2790 params['hessid'] = bssid2
2791 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2792 params['osu_ssid'] = '"HS 2.0 OSU OSEN"'
2793 params['osu_method_list'] = "0"
2794 params['osu_nai'] = "osen@example.com"
2795 params['osu_friendly_name'] = [ "eng:Test2 OSU", "fin:Testi2-OSU" ]
2796 params['osu_icon'] = "w1fi_logo"
2797 params['osu_service_desc'] = [ "eng:Example services2", "fin:Esimerkkipalveluja2" ]
2798 params['osu_server_uri'] = "https://example.org/osu/"
2799 hostapd.add_ap(apdev[1], params)
2801 with open("w1fi_logo.png", "r") as f:
2802 orig_logo = f.read()
2803 dev[0].hs20_enable()
2804 dir = "/tmp/osu-fetch"
2805 if os.path.isdir(dir):
2806 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2808 os.remove(dir + "/" + f)
2815 dev[1].scan_for_bss(bssid, freq="2412")
2816 dev[2].scan_for_bss(bssid, freq="2412")
2817 dev[0].request("SET osu_dir " + dir)
2818 dev[0].request("FETCH_OSU")
2819 if "FAIL" not in dev[1].request("HS20_ICON_REQUEST foo w1fi_logo"):
2820 raise Exception("Invalid HS20_ICON_REQUEST accepted")
2821 if "OK" not in dev[1].request("HS20_ICON_REQUEST " + bssid + " w1fi_logo"):
2822 raise Exception("HS20_ICON_REQUEST failed")
2823 if "OK" not in dev[2].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2824 raise Exception("REQ_HS20_ICON failed")
2827 ev = dev[0].wait_event(["OSU provider fetch completed",
2828 "RX-HS20-ANQP-ICON"], timeout=15)
2830 raise Exception("Timeout on OSU fetch")
2831 if "OSU provider fetch completed" in ev:
2833 if "RX-HS20-ANQP-ICON" in ev:
2834 with open(ev.split(' ')[1], "r") as f:
2836 if logo == orig_logo:
2839 with open(dir + "/osu-providers.txt", "r") as f:
2841 logger.debug("osu-providers.txt: " + prov)
2842 if "OSU-PROVIDER " + bssid not in prov:
2843 raise Exception("Missing OSU_PROVIDER(1)")
2844 if "OSU-PROVIDER " + bssid2 not in prov:
2845 raise Exception("Missing OSU_PROVIDER(2)")
2847 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2849 os.remove(dir + "/" + f)
2853 raise Exception("Unexpected number of icons fetched")
2855 ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=5)
2857 raise Exception("Timeout on GAS-QUERY-DONE")
2858 ev = dev[1].wait_event(["GAS-QUERY-DONE"], timeout=5)
2860 raise Exception("Timeout on GAS-QUERY-DONE")
2861 if "freq=2412 status_code=0 result=SUCCESS" not in ev:
2862 raise Exception("Unexpected GAS-QUERY-DONE: " + ev)
2863 ev = dev[1].wait_event(["RX-HS20-ANQP"], timeout=15)
2865 raise Exception("Timeout on icon fetch")
2866 if "Icon Binary File" not in ev:
2867 raise Exception("Unexpected ANQP element")
2869 ev = dev[2].wait_event(["RX-HS20-ICON"], timeout=5)
2871 raise Exception("Timeout on RX-HS20-ICON")
2872 event_icon_len = ev.split(' ')[3]
2873 if " w1fi_logo " not in ev:
2874 raise Exception("RX-HS20-ICON did not have the expected file name")
2876 raise Exception("RX-HS20-ICON did not have the expected BSSID")
2877 if "FAIL" in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 10"):
2878 raise Exception("GET_HS20_ICON 0..10 failed")
2879 if "FAIL" in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 5 10"):
2880 raise Exception("GET_HS20_ICON 5..15 failed")
2881 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 100000 10"):
2882 raise Exception("Unexpected success of GET_HS20_ICON with too large offset")
2883 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " no_such_logo 0 10"):
2884 raise Exception("GET_HS20_ICON for not existing icon succeeded")
2885 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 3070"):
2886 raise Exception("GET_HS20_ICON with too many output bytes to fit the buffer succeeded")
2887 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 0"):
2888 raise Exception("GET_HS20_ICON 0..0 succeeded")
2893 raise Exception("Unexpectedly long icon")
2894 res = dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo %d 1000" % pos)
2895 if res.startswith("FAIL"):
2897 icon += base64.b64decode(res)
2899 hex = binascii.hexlify(icon)
2900 if not hex.startswith("0009696d6167652f706e677d1d"):
2901 raise Exception("Unexpected beacon binary header: " + hex)
2902 with open('w1fi_logo.png', 'r') as f:
2904 if icon[13:] != data:
2905 raise Exception("Unexpected icon data")
2906 if len(icon) != int(event_icon_len):
2907 raise Exception("Unexpected RX-HS20-ICON event length: " + event_icon_len)
2910 if "OK" not in dev[i].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2911 raise Exception("REQ_HS20_ICON failed [2]")
2913 ev = dev[i].wait_event(["RX-HS20-ICON"], timeout=5)
2915 raise Exception("Timeout on RX-HS20-ICON [2]")
2917 if "FAIL" not in dev[2].request("DEL_HS20_ICON foo w1fi_logo"):
2918 raise Exception("Invalid DEL_HS20_ICON accepted")
2919 if "OK" not in dev[2].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
2920 raise Exception("DEL_HS20_ICON failed")
2921 if "OK" not in dev[1].request("DEL_HS20_ICON " + bssid):
2922 raise Exception("DEL_HS20_ICON failed")
2923 if "OK" not in dev[0].request("DEL_HS20_ICON "):
2924 raise Exception("DEL_HS20_ICON failed")
2926 if "FAIL" not in dev[i].request("DEL_HS20_ICON "):
2927 raise Exception("DEL_HS20_ICON accepted when no icons left")
2929 def test_ap_hs20_fetch_osu_no_info(dev, apdev):
2930 """Hotspot 2.0 OSU provider and no AP with info"""
2931 bssid = apdev[0]['bssid']
2932 params = hs20_ap_params()
2933 hostapd.add_ap(apdev[0], params)
2935 dev[0].hs20_enable()
2936 dir = "/tmp/osu-fetch"
2937 if os.path.isdir(dir):
2938 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2940 os.remove(dir + "/" + f)
2946 dev[0].scan_for_bss(bssid, freq="2412")
2948 dev[0].request("SET osu_dir " + dir)
2949 dev[0].request("FETCH_OSU")
2950 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
2952 raise Exception("Timeout on OSU fetch")
2954 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2956 os.remove(dir + "/" + f)
2959 def test_ap_hs20_fetch_osu_no_icon(dev, apdev):
2960 """Hotspot 2.0 OSU provider and no icon found"""
2961 bssid = apdev[0]['bssid']
2962 params = hs20_ap_params()
2963 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo-no-file.png"
2964 params['osu_ssid'] = '"HS 2.0 OSU open"'
2965 params['osu_method_list'] = "1"
2966 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2967 params['osu_icon'] = "w1fi_logo"
2968 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2969 params['osu_server_uri'] = "https://example.com/osu/"
2970 hostapd.add_ap(apdev[0], params)
2972 dev[0].hs20_enable()
2973 dir = "/tmp/osu-fetch"
2974 if os.path.isdir(dir):
2975 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2977 os.remove(dir + "/" + f)
2983 dev[0].scan_for_bss(bssid, freq="2412")
2985 dev[0].request("SET osu_dir " + dir)
2986 dev[0].request("FETCH_OSU")
2987 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
2989 raise Exception("Timeout on OSU fetch")
2991 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2993 os.remove(dir + "/" + f)
2996 def get_icon(dev, bssid, iconname):
3001 raise Exception("Unexpectedly long icon")
3002 res = dev.request("GET_HS20_ICON " + bssid + " " + iconname + " %d 3000" % pos)
3003 if res.startswith("FAIL"):
3005 icon += base64.b64decode(res)
3008 raise Exception("Too short GET_HS20_ICON response")
3009 return icon[0:13], icon[13:]
3011 def test_ap_hs20_req_hs20_icon(dev, apdev):
3012 """Hotspot 2.0 OSU provider and multi-icon fetch with REQ_HS20_ICON"""
3013 bssid = apdev[0]['bssid']
3014 params = hs20_ap_params()
3015 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
3016 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
3017 params['osu_ssid'] = '"HS 2.0 OSU open"'
3018 params['osu_method_list'] = "1"
3019 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3020 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
3021 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3022 params['osu_server_uri'] = "https://example.com/osu/"
3023 hostapd.add_ap(apdev[0], params)
3025 dev[0].scan_for_bss(bssid, freq="2412")
3027 # First, fetch two icons from the AP to wpa_supplicant
3029 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3030 raise Exception("REQ_HS20_ICON failed")
3031 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3033 raise Exception("Timeout on RX-HS20-ICON (1)")
3035 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " test_logo"):
3036 raise Exception("REQ_HS20_ICON failed")
3037 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3039 raise Exception("Timeout on RX-HS20-ICON (2)")
3041 # Then, fetch the icons from wpa_supplicant for validation
3043 hdr, data1 = get_icon(dev[0], bssid, "w1fi_logo")
3044 hdr, data2 = get_icon(dev[0], bssid, "test_logo")
3046 with open('w1fi_logo.png', 'r') as f:
3049 raise Exception("Unexpected icon data (1)")
3051 with open('auth_serv/sha512-server.pem', 'r') as f:
3054 raise Exception("Unexpected icon data (2)")
3056 # Finally, delete the icons from wpa_supplicant
3058 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
3059 raise Exception("DEL_HS20_ICON failed")
3060 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " test_logo"):
3061 raise Exception("DEL_HS20_ICON failed")
3063 def test_ap_hs20_req_hs20_icon_oom(dev, apdev):
3064 """Hotspot 2.0 icon fetch OOM with REQ_HS20_ICON"""
3065 bssid = apdev[0]['bssid']
3066 params = hs20_ap_params()
3067 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
3068 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
3069 params['osu_ssid'] = '"HS 2.0 OSU open"'
3070 params['osu_method_list'] = "1"
3071 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3072 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
3073 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3074 params['osu_server_uri'] = "https://example.com/osu/"
3075 hostapd.add_ap(apdev[0], params)
3077 dev[0].scan_for_bss(bssid, freq="2412")
3079 if "FAIL" not in dev[0].request("REQ_HS20_ICON 11:22:33:44:55:66 w1fi_logo"):
3080 raise Exception("REQ_HS20_ICON succeeded with unknown BSSID")
3082 with alloc_fail(dev[0], 1, "hs20_build_anqp_req;hs20_anqp_send_req"):
3083 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3084 raise Exception("REQ_HS20_ICON succeeded during OOM")
3086 with alloc_fail(dev[0], 1, "gas_query_req;hs20_anqp_send_req"):
3087 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3088 raise Exception("REQ_HS20_ICON succeeded during OOM")
3090 with alloc_fail(dev[0], 1, "=hs20_anqp_send_req"):
3091 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3092 raise Exception("REQ_HS20_ICON succeeded during OOM")
3093 with alloc_fail(dev[0], 2, "=hs20_anqp_send_req"):
3094 if "FAIL" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3095 raise Exception("REQ_HS20_ICON succeeded during OOM")
3097 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3098 raise Exception("REQ_HS20_ICON failed")
3099 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3101 raise Exception("Timeout on RX-HS20-ICON (1)")
3103 with alloc_fail(dev[0], 1, "hs20_get_icon"):
3104 if "FAIL" not in dev[0].request("GET_HS20_ICON " + bssid + "w1fi_logo 0 100"):
3105 raise Exception("GET_HS20_ICON succeeded during OOM")
3107 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
3108 raise Exception("DEL_HS20_ICON failed")
3110 with alloc_fail(dev[0], 1, "=hs20_process_icon_binary_file"):
3111 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3112 raise Exception("REQ_HS20_ICON failed")
3113 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
3115 def test_ap_hs20_req_hs20_icon_parallel(dev, apdev):
3116 """Hotspot 2.0 OSU provider and multi-icon parallel fetch with REQ_HS20_ICON"""
3117 bssid = apdev[0]['bssid']
3118 params = hs20_ap_params()
3119 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
3120 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
3121 params['osu_ssid'] = '"HS 2.0 OSU open"'
3122 params['osu_method_list'] = "1"
3123 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3124 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
3125 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3126 params['osu_server_uri'] = "https://example.com/osu/"
3127 hostapd.add_ap(apdev[0], params)
3129 dev[0].scan_for_bss(bssid, freq="2412")
3131 # First, fetch two icons from the AP to wpa_supplicant
3133 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
3134 raise Exception("REQ_HS20_ICON failed")
3136 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " test_logo"):
3137 raise Exception("REQ_HS20_ICON failed")
3138 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3140 raise Exception("Timeout on RX-HS20-ICON (1)")
3141 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
3143 raise Exception("Timeout on RX-HS20-ICON (2)")
3145 # Then, fetch the icons from wpa_supplicant for validation
3147 hdr, data1 = get_icon(dev[0], bssid, "w1fi_logo")
3148 hdr, data2 = get_icon(dev[0], bssid, "test_logo")
3150 with open('w1fi_logo.png', 'r') as f:
3153 raise Exception("Unexpected icon data (1)")
3155 with open('auth_serv/sha512-server.pem', 'r') as f:
3158 raise Exception("Unexpected icon data (2)")
3160 # Finally, delete the icons from wpa_supplicant
3162 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
3163 raise Exception("DEL_HS20_ICON failed")
3164 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " test_logo"):
3165 raise Exception("DEL_HS20_ICON failed")
3167 def test_ap_hs20_fetch_osu_stop(dev, apdev):
3168 """Hotspot 2.0 OSU provider fetch stopped"""
3169 bssid = apdev[0]['bssid']
3170 params = hs20_ap_params()
3171 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
3172 params['osu_ssid'] = '"HS 2.0 OSU open"'
3173 params['osu_method_list'] = "1"
3174 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3175 params['osu_icon'] = "w1fi_logo"
3176 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3177 params['osu_server_uri'] = "https://example.com/osu/"
3178 hapd = hostapd.add_ap(apdev[0], params)
3180 dev[0].hs20_enable()
3181 dir = "/tmp/osu-fetch"
3182 if os.path.isdir(dir):
3183 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3185 os.remove(dir + "/" + f)
3192 dev[0].request("SET osu_dir " + dir)
3193 dev[0].request("SCAN freq=2412-2462")
3194 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=10)
3196 raise Exception("Scan did not start")
3197 if "FAIL" not in dev[0].request("FETCH_OSU"):
3198 raise Exception("FETCH_OSU accepted while scanning")
3199 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
3201 raise Exception("Scan timed out")
3202 hapd.set("ext_mgmt_frame_handling", "1")
3203 dev[0].request("FETCH_ANQP")
3204 if "FAIL" not in dev[0].request("FETCH_OSU"):
3205 raise Exception("FETCH_OSU accepted while in FETCH_ANQP")
3206 dev[0].request("STOP_FETCH_ANQP")
3207 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=5)
3208 dev[0].dump_monitor()
3210 dev[0].request("INTERWORKING_SELECT freq=2412")
3212 msg = hapd.mgmt_rx()
3213 if msg['subtype'] == 13:
3215 if "FAIL" not in dev[0].request("FETCH_OSU"):
3216 raise Exception("FETCH_OSU accepted while in INTERWORKING_SELECT")
3217 ev = dev[0].wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
3220 raise Exception("Network selection timed out")
3222 dev[0].dump_monitor()
3223 if "OK" not in dev[0].request("FETCH_OSU"):
3224 raise Exception("FETCH_OSU failed")
3225 dev[0].request("CANCEL_FETCH_OSU")
3229 if dev[0].get_driver_status_field("scan_state") == "SCAN_COMPLETED":
3232 dev[0].dump_monitor()
3233 if "OK" not in dev[0].request("FETCH_OSU"):
3234 raise Exception("FETCH_OSU failed")
3235 if "FAIL" not in dev[0].request("FETCH_OSU"):
3236 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
3237 ev = dev[0].wait_event(["GAS-QUERY-START"], 10)
3239 raise Exception("GAS timed out")
3240 if "FAIL" not in dev[0].request("FETCH_OSU"):
3241 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
3242 dev[0].request("CANCEL_FETCH_OSU")
3243 ev = dev[0].wait_event(["GAS-QUERY-DONE"], 10)
3245 raise Exception("GAS event timed out after CANCEL_FETCH_OSU")
3247 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3249 os.remove(dir + "/" + f)
3252 def test_ap_hs20_fetch_osu_proto(dev, apdev):
3253 """Hotspot 2.0 OSU provider and protocol testing"""
3254 bssid = apdev[0]['bssid']
3255 params = hs20_ap_params()
3256 hapd = hostapd.add_ap(apdev[0], params)
3258 dev[0].hs20_enable()
3259 dir = "/tmp/osu-fetch"
3260 if os.path.isdir(dir):
3261 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3263 os.remove(dir + "/" + f)
3270 tests = [ ( "Empty provider list (no OSU SSID field)", '' ),
3271 ( "HS 2.0: Not enough room for OSU SSID",
3272 binascii.unhexlify('01') ),
3273 ( "HS 2.0: Invalid OSU SSID Length 33",
3274 binascii.unhexlify('21') + 33*'A' ),
3275 ( "HS 2.0: Not enough room for Number of OSU Providers",
3276 binascii.unhexlify('0130') ),
3277 ( "Truncated OSU Provider",
3278 binascii.unhexlify('013001020000') ),
3279 ( "HS 2.0: Ignored 5 bytes of extra data after OSU Providers",
3280 binascii.unhexlify('0130001122334455') ),
3281 ( "HS 2.0: Not enough room for OSU Friendly Name Length",
3282 binascii.unhexlify('013001000000') ),
3283 ( "HS 2.0: Not enough room for OSU Friendly Name Duples",
3284 build_prov('0100') ),
3285 ( "Invalid OSU Friendly Name", build_prov('040000000000') ),
3286 ( "Invalid OSU Friendly Name(2)", build_prov('040004000000') ),
3287 ( "HS 2.0: Not enough room for OSU Server URI length",
3288 build_prov('0000') ),
3289 ( "HS 2.0: Not enough room for OSU Server URI",
3290 build_prov('000001') ),
3291 ( "HS 2.0: Not enough room for OSU Method list length",
3292 build_prov('000000') ),
3293 ( "HS 2.0: Not enough room for OSU Method list",
3294 build_prov('00000001') ),
3295 ( "HS 2.0: Not enough room for Icons Available Length",
3296 build_prov('00000000') ),
3297 ( "HS 2.0: Not enough room for Icons Available Length(2)",
3298 build_prov('00000001ff00') ),
3299 ( "HS 2.0: Not enough room for Icons Available",
3300 build_prov('000000000100') ),
3301 ( "HS 2.0: Invalid Icon Metadata",
3302 build_prov('00000000010000') ),
3303 ( "HS 2.0: Not room for Icon Type",
3304 build_prov('000000000900111122223333330200') ),
3305 ( "HS 2.0: Not room for Icon Filename length",
3306 build_prov('000000000900111122223333330100') ),
3307 ( "HS 2.0: Not room for Icon Filename",
3308 build_prov('000000000900111122223333330001') ),
3309 ( "HS 2.0: Not enough room for OSU_NAI",
3310 build_prov('000000000000') ),
3311 ( "HS 2.0: Not enough room for OSU_NAI(2)",
3312 build_prov('00000000000001') ),
3313 ( "HS 2.0: Not enough room for OSU Service Description Length",
3314 build_prov('00000000000000') ),
3315 ( "HS 2.0: Not enough room for OSU Service Description Length(2)",
3316 build_prov('0000000000000000') ),
3317 ( "HS 2.0: Not enough room for OSU Service Description Duples",
3318 build_prov('000000000000000100') ),
3319 ( "Invalid OSU Service Description",
3320 build_prov('00000000000000040000000000') ),
3321 ( "Invalid OSU Service Description(2)",
3322 build_prov('00000000000000040004000000') ) ]
3325 dev[0].request("SET osu_dir " + dir)
3326 run_fetch_osu_icon_failure(hapd, dev, bssid)
3327 for note, prov in tests:
3328 run_fetch_osu(hapd, dev, bssid, note, prov)
3330 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3332 os.remove(dir + "/" + f)
3335 def test_ap_hs20_fetch_osu_invalid_dir(dev, apdev):
3336 """Hotspot 2.0 OSU provider and invalid directory"""
3337 bssid = apdev[0]['bssid']
3338 params = hs20_ap_params()
3339 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
3340 params['osu_ssid'] = '"HS 2.0 OSU open"'
3341 params['osu_method_list'] = "1"
3342 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3343 params['osu_icon'] = "w1fi_logo"
3344 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3345 params['osu_server_uri'] = "https://example.com/osu/"
3346 hostapd.add_ap(apdev[0], params)
3348 dev[0].hs20_enable()
3349 dir = "/tmp/osu-fetch-no-such-dir"
3350 dev[0].scan_for_bss(bssid, freq="2412")
3351 dev[0].request("SET osu_dir " + dir)
3352 dev[0].request("FETCH_OSU no-scan")
3353 ev = dev[0].wait_event(["Could not write OSU provider information"],
3356 raise Exception("Timeout on OSU fetch")
3358 def test_ap_hs20_fetch_osu_oom(dev, apdev):
3359 """Hotspot 2.0 OSU provider and OOM"""
3360 bssid = apdev[0]['bssid']
3361 params = hs20_ap_params()
3362 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
3363 params['osu_ssid'] = '"HS 2.0 OSU open"'
3364 params['osu_method_list'] = "1"
3365 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3366 params['osu_icon'] = "w1fi_logo"
3367 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3368 params['osu_server_uri'] = "https://example.com/osu/"
3369 hostapd.add_ap(apdev[0], params)
3371 dev[0].hs20_enable()
3372 dir = "/tmp/osu-fetch"
3373 if os.path.isdir(dir):
3374 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3376 os.remove(dir + "/" + f)
3382 dev[0].scan_for_bss(bssid, freq="2412")
3384 dev[0].request("SET osu_dir " + dir)
3385 with alloc_fail(dev[0], 1, "=hs20_osu_add_prov"):
3386 dev[0].request("FETCH_OSU no-scan")
3387 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
3389 raise Exception("Timeout on OSU fetch")
3390 with alloc_fail(dev[0], 1, "hs20_anqp_send_req;hs20_next_osu_icon"):
3391 dev[0].request("FETCH_OSU no-scan")
3392 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
3394 raise Exception("Timeout on OSU fetch")
3396 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3398 os.remove(dir + "/" + f)
3401 def build_prov(prov):
3402 data = binascii.unhexlify(prov)
3403 return binascii.unhexlify('013001') + struct.pack('<H', len(data)) + data
3405 def handle_osu_prov_fetch(hapd, dev, prov):
3406 # GAS/ANQP query for OSU Providers List
3407 query = gas_rx(hapd)
3408 gas = parse_gas(query['payload'])
3409 dialog_token = gas['dialog_token']
3411 resp = action_response(query)
3412 osu_prov = struct.pack('<HH', 0xdddd, len(prov) + 6) + binascii.unhexlify('506f9a110800') + prov
3413 data = struct.pack('<H', len(osu_prov)) + osu_prov
3414 resp['payload'] = anqp_initial_resp(dialog_token, 0) + data
3415 send_gas_resp(hapd, resp)
3417 ev = dev[0].wait_event(["RX-HS20-ANQP"], timeout=5)
3419 raise Exception("ANQP query response for OSU Providers not received")
3420 if "OSU Providers list" not in ev:
3421 raise Exception("ANQP query response for OSU Providers not received(2)")
3422 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
3424 raise Exception("ANQP query for OSU Providers list not completed")
3426 def start_osu_fetch(hapd, dev, bssid, note):
3427 hapd.set("ext_mgmt_frame_handling", "0")
3428 dev[0].request("BSS_FLUSH 0")
3429 dev[0].scan_for_bss(bssid, freq="2412")
3430 hapd.set("ext_mgmt_frame_handling", "1")
3431 dev[0].dump_monitor()
3432 dev[0].request("NOTE " + note)
3433 dev[0].request("FETCH_OSU no-scan")
3435 def wait_osu_fetch_completed(dev):
3436 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=5)
3438 raise Exception("Timeout on OSU fetch")
3440 def run_fetch_osu_icon_failure(hapd, dev, bssid):
3441 start_osu_fetch(hapd, dev, bssid, "Icon fetch failure")
3443 prov = binascii.unhexlify('01ff' + '01' + '800019000b656e6754657374204f53550c66696e54657374692d4f53551868747470733a2f2f6578616d706c652e636f6d2f6f73752f01011b00800050007a787809696d6167652f706e6709773166695f6c6f676f002a0013656e674578616d706c652073657276696365731566696e4573696d65726b6b6970616c76656c756a61')
3444 handle_osu_prov_fetch(hapd, dev, prov)
3446 # GAS/ANQP query for icon
3447 query = gas_rx(hapd)
3448 gas = parse_gas(query['payload'])
3449 dialog_token = gas['dialog_token']
3451 resp = action_response(query)
3452 # Unexpected Advertisement Protocol in response
3453 adv_proto = struct.pack('8B', 108, 6, 127, 0xdd, 0x00, 0x11, 0x22, 0x33)
3454 data = struct.pack('<H', 0)
3455 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
3456 GAS_INITIAL_RESPONSE,
3457 gas['dialog_token'], 0, 0) + adv_proto + data
3458 send_gas_resp(hapd, resp)
3460 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
3462 raise Exception("ANQP query for icon not completed")
3464 wait_osu_fetch_completed(dev)
3466 def run_fetch_osu(hapd, dev, bssid, note, prov):
3467 start_osu_fetch(hapd, dev, bssid, note)
3468 handle_osu_prov_fetch(hapd, dev, prov)
3469 wait_osu_fetch_completed(dev)
3471 def test_ap_hs20_ft(dev, apdev):
3472 """Hotspot 2.0 connection with FT"""
3473 check_eap_capa(dev[0], "MSCHAPV2")
3474 bssid = apdev[0]['bssid']
3475 params = hs20_ap_params()
3476 params['wpa_key_mgmt'] = "FT-EAP"
3477 params['nas_identifier'] = "nas1.w1.fi"
3478 params['r1_key_holder'] = "000102030405"
3479 params["mobility_domain"] = "a1b2"
3480 params["reassociation_deadline"] = "1000"
3481 hostapd.add_ap(apdev[0], params)
3483 dev[0].hs20_enable()
3484 id = dev[0].add_cred_values({ 'realm': "example.com",
3485 'username': "hs20-test",
3486 'password': "password",
3487 'ca_cert': "auth_serv/ca.pem",
3488 'domain': "example.com",
3489 'update_identifier': "1234" })
3490 interworking_select(dev[0], bssid, "home", freq="2412")
3491 interworking_connect(dev[0], bssid, "TTLS")
3493 def test_ap_hs20_remediation_sql(dev, apdev, params):
3494 """Hotspot 2.0 connection and remediation required using SQLite for user DB"""
3495 check_eap_capa(dev[0], "MSCHAPV2")
3499 raise HwsimSkip("No sqlite3 module available")
3500 dbfile = os.path.join(params['logdir'], "eap-user.db")
3505 con = sqlite3.connect(dbfile)
3508 cur.execute("CREATE TABLE users(identity TEXT PRIMARY KEY, methods TEXT, password TEXT, remediation TEXT, phase2 INTEGER)")
3509 cur.execute("CREATE TABLE wildcards(identity TEXT PRIMARY KEY, methods TEXT)")
3510 cur.execute("INSERT INTO users(identity,methods,password,phase2,remediation) VALUES ('user-mschapv2','TTLS-MSCHAPV2','password',1,'user')")
3511 cur.execute("INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS')")
3512 cur.execute("CREATE TABLE authlog(timestamp TEXT, session TEXT, nas_ip TEXT, username TEXT, note TEXT)")
3515 params = { "ssid": "as", "beacon_int": "2000",
3516 "radius_server_clients": "auth_serv/radius_clients.conf",
3517 "radius_server_auth_port": '18128',
3519 "eap_user_file": "sqlite:" + dbfile,
3520 "ca_cert": "auth_serv/ca.pem",
3521 "server_cert": "auth_serv/server.pem",
3522 "private_key": "auth_serv/server.key",
3523 "subscr_remediation_url": "https://example.org/",
3524 "subscr_remediation_method": "1" }
3525 hostapd.add_ap(apdev[1], params)
3527 bssid = apdev[0]['bssid']
3528 params = hs20_ap_params()
3529 params['auth_server_port'] = "18128"
3530 hostapd.add_ap(apdev[0], params)
3532 dev[0].request("SET pmf 1")
3533 dev[0].hs20_enable()
3534 id = dev[0].add_cred_values({ 'realm': "example.com",
3535 'username': "user-mschapv2",
3536 'password': "password",
3537 'ca_cert': "auth_serv/ca.pem" })
3538 interworking_select(dev[0], bssid, freq="2412")
3539 interworking_connect(dev[0], bssid, "TTLS")
3540 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
3542 raise Exception("Timeout on subscription remediation notice")
3543 if " 1 https://example.org/" not in ev:
3544 raise Exception("Unexpected subscription remediation event contents")
3548 cur.execute("SELECT * from authlog")
3549 rows = cur.fetchall()
3551 raise Exception("No authlog entries")
3555 dev[0].request("SET pmf 0")
3557 def test_ap_hs20_external_selection(dev, apdev):
3558 """Hotspot 2.0 connection using external network selection and creation"""
3559 check_eap_capa(dev[0], "MSCHAPV2")
3560 bssid = apdev[0]['bssid']
3561 params = hs20_ap_params()
3562 params['hessid'] = bssid
3563 params['disable_dgaf'] = '1'
3564 hostapd.add_ap(apdev[0], params)
3566 dev[0].hs20_enable()
3567 dev[0].connect("test-hs20", proto="RSN", key_mgmt="WPA-EAP", eap="TTLS",
3568 identity="hs20-test", password="password",
3569 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3570 scan_freq="2412", update_identifier="54321")
3571 if dev[0].get_status_field("hs20") != "2":
3572 raise Exception("Unexpected hs20 indication")
3574 def test_ap_hs20_random_mac_addr(dev, apdev):
3575 """Hotspot 2.0 connection with random MAC address"""
3576 check_eap_capa(dev[0], "MSCHAPV2")
3577 bssid = apdev[0]['bssid']
3578 params = hs20_ap_params()
3579 params['hessid'] = bssid
3580 params['disable_dgaf'] = '1'
3581 hapd = hostapd.add_ap(apdev[0], params)
3583 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
3584 wpas.interface_add("wlan5")
3585 addr = wpas.p2p_interface_addr()
3586 wpas.request("SET mac_addr 1")
3587 wpas.request("SET preassoc_mac_addr 1")
3588 wpas.request("SET rand_addr_lifetime 60")
3590 wpas.flush_scan_cache()
3591 id = wpas.add_cred_values({ 'realm': "example.com",
3592 'username': "hs20-test",
3593 'password': "password",
3594 'ca_cert': "auth_serv/ca.pem",
3595 'domain': "example.com",
3596 'update_identifier': "1234" })
3597 interworking_select(wpas, bssid, "home", freq="2412")
3598 interworking_connect(wpas, bssid, "TTLS")
3599 addr1 = wpas.get_driver_status_field("addr")
3601 raise Exception("Did not use random MAC address")
3603 sta = hapd.get_sta(addr)
3604 if sta['addr'] != "FAIL":
3605 raise Exception("Unexpected STA association with permanent address")
3606 sta = hapd.get_sta(addr1)
3607 if sta['addr'] != addr1:
3608 raise Exception("STA association with random address not found")
3610 def test_ap_hs20_multi_network_and_cred_removal(dev, apdev):
3611 """Multiple networks and cred removal"""
3612 check_eap_capa(dev[0], "MSCHAPV2")
3613 bssid = apdev[0]['bssid']
3614 params = hs20_ap_params()
3615 params['nai_realm'] = [ "0,example.com,25[3:26]"]
3616 hapd = hostapd.add_ap(apdev[0], params)
3618 dev[0].add_network()
3619 dev[0].hs20_enable()
3620 id = dev[0].add_cred_values({ 'realm': "example.com",
3622 'password': "password" })
3623 interworking_select(dev[0], bssid, freq="2412")
3624 interworking_connect(dev[0], bssid, "PEAP")
3625 dev[0].add_network()
3627 dev[0].request("DISCONNECT")
3628 dev[0].wait_disconnected(timeout=10)
3631 hapd.set("ssid", "another ssid")
3634 interworking_select(dev[0], bssid, freq="2412")
3635 interworking_connect(dev[0], bssid, "PEAP")
3636 dev[0].add_network()
3637 if len(dev[0].list_networks()) != 5:
3638 raise Exception("Unexpected number of networks prior to remove_crec")
3640 dev[0].dump_monitor()
3641 dev[0].remove_cred(id)
3642 if len(dev[0].list_networks()) != 3:
3643 raise Exception("Unexpected number of networks after to remove_crec")
3644 dev[0].wait_disconnected(timeout=10)
3646 def test_ap_hs20_interworking_add_network(dev, apdev):
3647 """Hotspot 2.0 connection using INTERWORKING_ADD_NETWORK"""
3648 check_eap_capa(dev[0], "MSCHAPV2")
3649 bssid = apdev[0]['bssid']
3650 params = hs20_ap_params()
3651 params['nai_realm'] = [ "0,example.com,21[3:26][6:7][99:99]" ]
3652 hostapd.add_ap(apdev[0], params)
3654 dev[0].hs20_enable()
3655 dev[0].add_cred_values(default_cred(user="user"))
3656 interworking_select(dev[0], bssid, freq=2412)
3657 id = dev[0].interworking_add_network(bssid)
3658 dev[0].select_network(id, freq=2412)
3659 dev[0].wait_connected()
3661 def _test_ap_hs20_proxyarp(dev, apdev):
3662 bssid = apdev[0]['bssid']
3663 params = hs20_ap_params()
3664 params['hessid'] = bssid
3665 params['disable_dgaf'] = '0'
3666 params['proxy_arp'] = '1'
3667 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3668 if "OK" in hapd.request("ENABLE"):
3669 raise Exception("Incomplete hostapd configuration was accepted")
3670 hapd.set("ap_isolate", "1")
3671 if "OK" in hapd.request("ENABLE"):
3672 raise Exception("Incomplete hostapd configuration was accepted")
3673 hapd.set('bridge', 'ap-br0')
3678 # For now, do not report failures due to missing kernel support
3679 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3680 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
3682 raise Exception("AP startup timed out")
3683 if "AP-ENABLED" not in ev:
3684 raise Exception("AP startup failed")
3686 dev[0].hs20_enable()
3687 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3688 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3690 id = dev[0].add_cred_values({ 'realm': "example.com",
3691 'username': "hs20-test",
3692 'password': "password",
3693 'ca_cert': "auth_serv/ca.pem",
3694 'domain': "example.com",
3695 'update_identifier': "1234" })
3696 interworking_select(dev[0], bssid, "home", freq="2412")
3697 interworking_connect(dev[0], bssid, "TTLS")
3699 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
3700 identity="hs20-test", password="password",
3701 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3705 addr0 = dev[0].p2p_interface_addr()
3706 addr1 = dev[1].p2p_interface_addr()
3708 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3709 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
3711 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
3712 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
3714 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3715 raise Exception("DATA_TEST_FRAME failed")
3717 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:dddd::2",
3718 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:dddd::2",
3720 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3721 raise Exception("DATA_TEST_FRAME failed")
3723 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:eeee::2",
3724 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:eeee::2",
3726 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3727 raise Exception("DATA_TEST_FRAME failed")
3729 matches = get_permanent_neighbors("ap-br0")
3730 logger.info("After connect: " + str(matches))
3731 if len(matches) != 3:
3732 raise Exception("Unexpected number of neighbor entries after connect")
3733 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3734 raise Exception("dev0 addr missing")
3735 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3736 raise Exception("dev1 addr(1) missing")
3737 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3738 raise Exception("dev1 addr(2) missing")
3739 dev[0].request("DISCONNECT")
3740 dev[1].request("DISCONNECT")
3742 matches = get_permanent_neighbors("ap-br0")
3743 logger.info("After disconnect: " + str(matches))
3744 if len(matches) > 0:
3745 raise Exception("Unexpected neighbor entries after disconnect")
3747 def test_ap_hs20_hidden_ssid_in_scan_res(dev, apdev):
3748 """Hotspot 2.0 connection with hidden SSId in scan results"""
3749 check_eap_capa(dev[0], "MSCHAPV2")
3750 bssid = apdev[0]['bssid']
3752 hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret',
3753 "ignore_broadcast_ssid": "1" })
3754 dev[0].scan_for_bss(bssid, freq=2412)
3756 hapd_global = hostapd.HostapdGlobal(apdev[0])
3758 hapd_global.remove(apdev[0]['ifname'])
3760 params = hs20_ap_params()
3761 params['hessid'] = bssid
3762 hapd = hostapd.add_ap(apdev[0], params)
3764 dev[0].hs20_enable()
3765 id = dev[0].add_cred_values({ 'realm': "example.com",
3766 'username': "hs20-test",
3767 'password': "password",
3768 'ca_cert': "auth_serv/ca.pem",
3769 'domain': "example.com" })
3770 interworking_select(dev[0], bssid, "home", freq="2412")
3771 interworking_connect(dev[0], bssid, "TTLS")
3773 # clear BSS table to avoid issues in following test cases
3774 dev[0].request("DISCONNECT")
3775 dev[0].wait_disconnected()
3777 dev[0].flush_scan_cache()
3778 dev[0].flush_scan_cache()
3780 def test_ap_hs20_proxyarp(dev, apdev):
3781 """Hotspot 2.0 and ProxyARP"""
3782 check_eap_capa(dev[0], "MSCHAPV2")
3784 _test_ap_hs20_proxyarp(dev, apdev)
3786 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3787 stderr=open('/dev/null', 'w'))
3788 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3789 stderr=open('/dev/null', 'w'))
3791 def _test_ap_hs20_proxyarp_dgaf(dev, apdev, disabled):
3792 bssid = apdev[0]['bssid']
3793 params = hs20_ap_params()
3794 params['hessid'] = bssid
3795 params['disable_dgaf'] = '1' if disabled else '0'
3796 params['proxy_arp'] = '1'
3797 params['na_mcast_to_ucast'] = '1'
3798 params['ap_isolate'] = '1'
3799 params['bridge'] = 'ap-br0'
3800 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3804 # For now, do not report failures due to missing kernel support
3805 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3806 ev = hapd.wait_event(["AP-ENABLED"], timeout=10)
3808 raise Exception("AP startup timed out")
3810 dev[0].hs20_enable()
3811 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3812 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3814 id = dev[0].add_cred_values({ 'realm': "example.com",
3815 'username': "hs20-test",
3816 'password': "password",
3817 'ca_cert': "auth_serv/ca.pem",
3818 'domain': "example.com",
3819 'update_identifier': "1234" })
3820 interworking_select(dev[0], bssid, "home", freq="2412")
3821 interworking_connect(dev[0], bssid, "TTLS")
3823 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
3824 identity="hs20-test", password="password",
3825 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3829 addr0 = dev[0].p2p_interface_addr()
3831 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3833 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
3834 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
3836 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3837 raise Exception("DATA_TEST_FRAME failed")
3839 pkt = build_ra(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::33",
3841 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3842 raise Exception("DATA_TEST_FRAME failed")
3844 pkt = build_na(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::44",
3845 ip_dst="ff01::1", target="aaaa:bbbb:cccc::55")
3846 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3847 raise Exception("DATA_TEST_FRAME failed")
3849 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3850 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3851 yiaddr="192.168.1.123", chaddr=addr0)
3852 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3853 raise Exception("DATA_TEST_FRAME failed")
3854 # another copy for additional code coverage
3855 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
3856 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3857 yiaddr="192.168.1.123", chaddr=addr0)
3858 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3859 raise Exception("DATA_TEST_FRAME failed")
3861 matches = get_permanent_neighbors("ap-br0")
3862 logger.info("After connect: " + str(matches))
3863 if len(matches) != 2:
3864 raise Exception("Unexpected number of neighbor entries after connect")
3865 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3866 raise Exception("dev0 addr missing")
3867 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3868 raise Exception("dev0 IPv4 addr missing")
3869 dev[0].request("DISCONNECT")
3870 dev[1].request("DISCONNECT")
3872 matches = get_permanent_neighbors("ap-br0")
3873 logger.info("After disconnect: " + str(matches))
3874 if len(matches) > 0:
3875 raise Exception("Unexpected neighbor entries after disconnect")
3877 def test_ap_hs20_proxyarp_disable_dgaf(dev, apdev):
3878 """Hotspot 2.0 and ProxyARP with DGAF disabled"""
3879 check_eap_capa(dev[0], "MSCHAPV2")
3881 _test_ap_hs20_proxyarp_dgaf(dev, apdev, True)
3883 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3884 stderr=open('/dev/null', 'w'))
3885 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3886 stderr=open('/dev/null', 'w'))
3888 def test_ap_hs20_proxyarp_enable_dgaf(dev, apdev):
3889 """Hotspot 2.0 and ProxyARP with DGAF enabled"""
3890 check_eap_capa(dev[0], "MSCHAPV2")
3892 _test_ap_hs20_proxyarp_dgaf(dev, apdev, False)
3894 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3895 stderr=open('/dev/null', 'w'))
3896 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3897 stderr=open('/dev/null', 'w'))
3899 def ip_checksum(buf):
3903 for i in range(0, len(buf), 2):
3904 val, = struct.unpack('H', buf[i:i+2])
3907 sum = (sum & 0xffff) + (sum >> 16)
3908 return struct.pack('H', ~sum & 0xffff)
3910 def ipv6_solicited_node_mcaddr(target):
3911 prefix = socket.inet_pton(socket.AF_INET6, "ff02::1:ff00:0")
3912 mask = socket.inet_pton(socket.AF_INET6, "::ff:ffff")
3913 _target = socket.inet_pton(socket.AF_INET6, target)
3914 p = struct.unpack('4I', prefix)
3915 m = struct.unpack('4I', mask)
3916 t = struct.unpack('4I', _target)
3917 res = (p[0] | (t[0] & m[0]),
3918 p[1] | (t[1] & m[1]),
3919 p[2] | (t[2] & m[2]),
3920 p[3] | (t[3] & m[3]))
3921 return socket.inet_ntop(socket.AF_INET6, struct.pack('4I', *res))
3923 def build_icmpv6(ipv6_addrs, type, code, payload):
3924 start = struct.pack("BB", type, code)
3926 icmp = start + '\x00\x00' + end
3927 pseudo = ipv6_addrs + struct.pack(">LBBBB", len(icmp), 0, 0, 0, 58)
3928 csum = ip_checksum(pseudo + icmp)
3929 return start + csum + end
3931 def build_ra(src_ll, ip_src, ip_dst, cur_hop_limit=0, router_lifetime=0,
3932 reachable_time=0, retrans_timer=0, opt=None):
3933 link_mc = binascii.unhexlify("3333ff000002")
3934 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3936 ehdr = link_mc + _src_ll + proto
3937 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3938 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3940 adv = struct.pack('>BBHLL', cur_hop_limit, 0, router_lifetime,
3941 reachable_time, retrans_timer)
3946 icmp = build_icmpv6(_ip_src + _ip_dst, 134, 0, payload)
3948 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3949 ipv6 += _ip_src + _ip_dst
3951 return ehdr + ipv6 + icmp
3953 def build_ns(src_ll, ip_src, ip_dst, target, opt=None):
3954 link_mc = binascii.unhexlify("3333ff000002")
3955 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3957 ehdr = link_mc + _src_ll + proto
3958 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3960 ip_dst = ipv6_solicited_node_mcaddr(target)
3961 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3963 reserved = '\x00\x00\x00\x00'
3964 _target = socket.inet_pton(socket.AF_INET6, target)
3966 payload = reserved + _target + opt
3968 payload = reserved + _target
3969 icmp = build_icmpv6(_ip_src + _ip_dst, 135, 0, payload)
3971 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3972 ipv6 += _ip_src + _ip_dst
3974 return ehdr + ipv6 + icmp
3976 def send_ns(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
3981 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
3984 src_ll = dev.p2p_interface_addr()
3985 cmd = "DATA_TEST_FRAME "
3988 opt = "\x01\x01" + binascii.unhexlify(src_ll.replace(':',''))
3990 pkt = build_ns(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
3992 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
3993 raise Exception("DATA_TEST_FRAME failed")
3995 def build_na(src_ll, ip_src, ip_dst, target, opt=None, flags=0):
3996 link_mc = binascii.unhexlify("3333ff000002")
3997 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3999 ehdr = link_mc + _src_ll + proto
4000 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
4001 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
4003 _target = socket.inet_pton(socket.AF_INET6, target)
4005 payload = struct.pack('>Bxxx', flags) + _target + opt
4007 payload = struct.pack('>Bxxx', flags) + _target
4008 icmp = build_icmpv6(_ip_src + _ip_dst, 136, 0, payload)
4010 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
4011 ipv6 += _ip_src + _ip_dst
4013 return ehdr + ipv6 + icmp
4015 def send_na(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
4020 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
4023 src_ll = dev.p2p_interface_addr()
4024 cmd = "DATA_TEST_FRAME "
4026 pkt = build_na(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
4028 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
4029 raise Exception("DATA_TEST_FRAME failed")
4031 def build_dhcp_ack(dst_ll, src_ll, ip_src, ip_dst, yiaddr, chaddr,
4032 subnet_mask="255.255.255.0", truncated_opt=False,
4033 wrong_magic=False, force_tot_len=None, no_dhcp=False):
4034 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
4035 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
4037 ehdr = _dst_ll + _src_ll + proto
4038 _ip_src = socket.inet_pton(socket.AF_INET, ip_src)
4039 _ip_dst = socket.inet_pton(socket.AF_INET, ip_dst)
4040 _subnet_mask = socket.inet_pton(socket.AF_INET, subnet_mask)
4042 _ciaddr = '\x00\x00\x00\x00'
4043 _yiaddr = socket.inet_pton(socket.AF_INET, yiaddr)
4044 _siaddr = '\x00\x00\x00\x00'
4045 _giaddr = '\x00\x00\x00\x00'
4046 _chaddr = binascii.unhexlify(chaddr.replace(':','') + "00000000000000000000")
4047 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
4048 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
4051 payload += '\x63\x82\x53\x00'
4053 payload += '\x63\x82\x53\x63'
4055 payload += '\x22\xff\x00'
4056 # Option: DHCP Message Type = ACK
4057 payload += '\x35\x01\x05'
4060 # Option: Subnet Mask
4061 payload += '\x01\x04' + _subnet_mask
4062 # Option: Time Offset
4063 payload += struct.pack('>BBL', 2, 4, 0)
4067 payload += '\x00\x00\x00\x00'
4070 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
4071 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
4073 udp = struct.pack('>HHHH', 67, 68, 8 + len(payload), 0) + payload
4076 tot_len = force_tot_len
4078 tot_len = 20 + len(udp)
4079 start = struct.pack('>BBHHBBBB', 0x45, 0, tot_len, 0, 0, 0, 128, 17)
4080 ipv4 = start + '\x00\x00' + _ip_src + _ip_dst
4081 csum = ip_checksum(ipv4)
4082 ipv4 = start + csum + _ip_src + _ip_dst
4084 return ehdr + ipv4 + udp
4086 def build_arp(dst_ll, src_ll, opcode, sender_mac, sender_ip,
4087 target_mac, target_ip):
4088 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
4089 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
4091 ehdr = _dst_ll + _src_ll + proto
4093 _sender_mac = binascii.unhexlify(sender_mac.replace(':',''))
4094 _sender_ip = socket.inet_pton(socket.AF_INET, sender_ip)
4095 _target_mac = binascii.unhexlify(target_mac.replace(':',''))
4096 _target_ip = socket.inet_pton(socket.AF_INET, target_ip)
4098 arp = struct.pack('>HHBBH', 1, 0x0800, 6, 4, opcode)
4099 arp += _sender_mac + _sender_ip
4100 arp += _target_mac + _target_ip
4104 def send_arp(dev, dst_ll="ff:ff:ff:ff:ff:ff", src_ll=None, opcode=1,
4105 sender_mac=None, sender_ip="0.0.0.0",
4106 target_mac="00:00:00:00:00:00", target_ip="0.0.0.0",
4111 if sender_mac is None:
4112 sender_mac = hapd_bssid
4113 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
4116 src_ll = dev.p2p_interface_addr()
4117 if sender_mac is None:
4118 sender_mac = dev.p2p_interface_addr()
4119 cmd = "DATA_TEST_FRAME "
4121 pkt = build_arp(dst_ll=dst_ll, src_ll=src_ll, opcode=opcode,
4122 sender_mac=sender_mac, sender_ip=sender_ip,
4123 target_mac=target_mac, target_ip=target_ip)
4124 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
4125 raise Exception("DATA_TEST_FRAME failed")
4127 def get_permanent_neighbors(ifname):
4128 cmd = subprocess.Popen(['ip', 'nei'], stdout=subprocess.PIPE)
4129 res = cmd.stdout.read()
4131 return [ line for line in res.splitlines() if "PERMANENT" in line and ifname in line ]
4133 def get_bridge_macs(ifname):
4134 cmd = subprocess.Popen(['brctl', 'showmacs', ifname],
4135 stdout=subprocess.PIPE)
4136 res = cmd.stdout.read()
4140 def tshark_get_arp(cap, filter):
4141 res = run_tshark(cap, filter,
4142 [ "eth.dst", "eth.src",
4143 "arp.src.hw_mac", "arp.src.proto_ipv4",
4144 "arp.dst.hw_mac", "arp.dst.proto_ipv4" ],
4147 for l in res.splitlines():
4148 frames.append(l.split('\t'))
4151 def tshark_get_ns(cap):
4152 res = run_tshark(cap, "icmpv6.type == 135",
4153 [ "eth.dst", "eth.src",
4154 "ipv6.src", "ipv6.dst",
4155 "icmpv6.nd.ns.target_address",
4156 "icmpv6.opt.linkaddr" ],
4159 for l in res.splitlines():
4160 frames.append(l.split('\t'))
4163 def tshark_get_na(cap):
4164 res = run_tshark(cap, "icmpv6.type == 136",
4165 [ "eth.dst", "eth.src",
4166 "ipv6.src", "ipv6.dst",
4167 "icmpv6.nd.na.target_address",
4168 "icmpv6.opt.linkaddr" ],
4171 for l in res.splitlines():
4172 frames.append(l.split('\t'))
4175 def _test_proxyarp_open(dev, apdev, params, ebtables=False):
4176 prefix = "proxyarp_open"
4178 prefix += "_ebtables"
4179 cap_br = os.path.join(params['logdir'], prefix + ".ap-br0.pcap")
4180 cap_dev0 = os.path.join(params['logdir'],
4181 prefix + ".%s.pcap" % dev[0].ifname)
4182 cap_dev1 = os.path.join(params['logdir'],
4183 prefix + ".%s.pcap" % dev[1].ifname)
4184 cap_dev2 = os.path.join(params['logdir'],
4185 prefix + ".%s.pcap" % dev[2].ifname)
4187 bssid = apdev[0]['bssid']
4188 params = { 'ssid': 'open' }
4189 params['proxy_arp'] = '1'
4190 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
4191 hapd.set("ap_isolate", "1")
4192 hapd.set('bridge', 'ap-br0')
4197 # For now, do not report failures due to missing kernel support
4198 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
4199 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
4201 raise Exception("AP startup timed out")
4202 if "AP-ENABLED" not in ev:
4203 raise Exception("AP startup failed")
4205 params2 = { 'ssid': 'another' }
4206 hapd2 = hostapd.add_ap(apdev[1], params2, no_enable=True)
4207 hapd2.set('bridge', 'ap-br0')
4210 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
4211 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
4214 for chain in [ 'FORWARD', 'OUTPUT' ]:
4215 subprocess.call(['ebtables', '-A', chain, '-p', 'ARP',
4216 '-d', 'Broadcast', '-o', apdev[0]['ifname'],
4218 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
4219 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4220 '--ip6-icmp-type', 'neighbor-solicitation',
4221 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4222 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
4223 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4224 '--ip6-icmp-type', 'neighbor-advertisement',
4225 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4226 subprocess.call(['ebtables', '-A', chain,
4227 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4228 '--ip6-icmp-type', 'router-solicitation',
4229 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4230 # Multicast Listener Report Message
4231 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
4232 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
4233 '--ip6-icmp-type', '143',
4234 '-o', apdev[0]['ifname'], '-j', 'DROP'])
4238 cmd[0] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', 'ap-br0',
4239 '-w', cap_br, '-s', '2000'],
4240 stderr=open('/dev/null', 'w'))
4241 cmd[1] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[0].ifname,
4242 '-w', cap_dev0, '-s', '2000'],
4243 stderr=open('/dev/null', 'w'))
4244 cmd[2] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[1].ifname,
4245 '-w', cap_dev1, '-s', '2000'],
4246 stderr=open('/dev/null', 'w'))
4247 cmd[3] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[2].ifname,
4248 '-w', cap_dev2, '-s', '2000'],
4249 stderr=open('/dev/null', 'w'))
4251 dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
4252 dev[1].connect("open", key_mgmt="NONE", scan_freq="2412")
4253 dev[2].connect("another", key_mgmt="NONE", scan_freq="2412")
4256 brcmd = subprocess.Popen(['brctl', 'show'], stdout=subprocess.PIPE)
4257 res = brcmd.stdout.read()
4258 brcmd.stdout.close()
4259 logger.info("Bridge setup: " + res)
4261 brcmd = subprocess.Popen(['brctl', 'showstp', 'ap-br0'],
4262 stdout=subprocess.PIPE)
4263 res = brcmd.stdout.read()
4264 brcmd.stdout.close()
4265 logger.info("Bridge showstp: " + res)
4267 addr0 = dev[0].p2p_interface_addr()
4268 addr1 = dev[1].p2p_interface_addr()
4269 addr2 = dev[2].p2p_interface_addr()
4271 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
4272 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
4275 send_ns(dev[0], ip_src="::", target="aaaa:bbbb:cccc::2")
4277 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2")
4278 # test frame without source link-layer address option
4279 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4281 # test frame with bogus option
4282 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4283 opt="\x70\x01\x01\x02\x03\x04\x05\x05")
4284 # test frame with truncated source link-layer address option
4285 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4286 opt="\x01\x01\x01\x02\x03\x04")
4287 # test frame with foreign source link-layer address option
4288 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
4289 opt="\x01\x01\x01\x02\x03\x04\x05\x06")
4291 send_ns(dev[1], ip_src="aaaa:bbbb:dddd::2", target="aaaa:bbbb:dddd::2")
4293 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
4294 # another copy for additional code coverage
4295 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
4297 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
4298 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4299 yiaddr="192.168.1.124", chaddr=addr0)
4300 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4301 raise Exception("DATA_TEST_FRAME failed")
4302 # Change address and verify unicast
4303 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
4304 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4305 yiaddr="192.168.1.123", chaddr=addr0)
4306 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4307 raise Exception("DATA_TEST_FRAME failed")
4309 # Not-associated client MAC address
4310 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
4311 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4312 yiaddr="192.168.1.125", chaddr="22:33:44:55:66:77")
4313 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4314 raise Exception("DATA_TEST_FRAME failed")
4317 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4318 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4319 yiaddr="0.0.0.0", chaddr=addr1)
4320 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4321 raise Exception("DATA_TEST_FRAME failed")
4324 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4325 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4326 yiaddr="192.168.1.126", chaddr=addr1,
4327 subnet_mask="0.0.0.0")
4328 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4329 raise Exception("DATA_TEST_FRAME failed")
4332 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4333 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4334 yiaddr="192.168.1.127", chaddr=addr1,
4336 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4337 raise Exception("DATA_TEST_FRAME failed")
4340 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4341 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4342 yiaddr="192.168.1.128", chaddr=addr1,
4344 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4345 raise Exception("DATA_TEST_FRAME failed")
4347 # Wrong IPv4 total length
4348 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4349 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4350 yiaddr="192.168.1.129", chaddr=addr1,
4352 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4353 raise Exception("DATA_TEST_FRAME failed")
4356 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
4357 ip_src="192.168.1.1", ip_dst="255.255.255.255",
4358 yiaddr="192.168.1.129", chaddr=addr1,
4360 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
4361 raise Exception("DATA_TEST_FRAME failed")
4363 macs = get_bridge_macs("ap-br0")
4364 logger.info("After connect (showmacs): " + str(macs))
4366 matches = get_permanent_neighbors("ap-br0")
4367 logger.info("After connect: " + str(matches))
4368 if len(matches) != 4:
4369 raise Exception("Unexpected number of neighbor entries after connect")
4370 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
4371 raise Exception("dev0 addr missing")
4372 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
4373 raise Exception("dev1 addr(1) missing")
4374 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
4375 raise Exception("dev1 addr(2) missing")
4376 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
4377 raise Exception("dev0 IPv4 addr missing")
4379 targets = [ "192.168.1.123", "192.168.1.124", "192.168.1.125",
4381 for target in targets:
4382 send_arp(dev[1], sender_ip="192.168.1.100", target_ip=target)
4384 for target in targets:
4385 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.101",
4388 for target in targets:
4389 send_arp(dev[2], sender_ip="192.168.1.103", target_ip=target)
4391 # ARP Probe from wireless STA
4392 send_arp(dev[1], target_ip="192.168.1.127")
4393 # ARP Announcement from wireless STA
4394 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127")
4395 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127",
4398 macs = get_bridge_macs("ap-br0")
4399 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
4401 matches = get_permanent_neighbors("ap-br0")
4402 logger.info("After ARP Probe + Announcement: " + str(matches))
4404 # ARP Request for the newly introduced IP address from wireless STA
4405 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
4407 # ARP Request for the newly introduced IP address from bridge
4408 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
4409 target_ip="192.168.1.127")
4410 send_arp(dev[2], sender_ip="192.168.1.103", target_ip="192.168.1.127")
4412 # ARP Probe from bridge
4413 send_arp(hapd, hapd_bssid=bssid, target_ip="192.168.1.130")
4414 send_arp(dev[2], target_ip="192.168.1.131")
4415 # ARP Announcement from bridge (not to be learned by AP for proxyarp)
4416 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
4417 target_ip="192.168.1.130")
4418 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
4419 target_ip="192.168.1.130", opcode=2)
4420 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131")
4421 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131",
4424 macs = get_bridge_macs("ap-br0")
4425 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
4427 matches = get_permanent_neighbors("ap-br0")
4428 logger.info("After ARP Probe + Announcement: " + str(matches))
4430 # ARP Request for the newly introduced IP address from wireless STA
4431 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.130")
4432 # ARP Response from bridge (AP does not proxy for non-wireless devices)
4433 send_arp(hapd, hapd_bssid=bssid, dst_ll=addr0, sender_ip="192.168.1.130",
4434 target_ip="192.168.1.123", opcode=2)
4436 # ARP Request for the newly introduced IP address from wireless STA
4437 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.131")
4438 # ARP Response from bridge (AP does not proxy for non-wireless devices)
4439 send_arp(dev[2], dst_ll=addr0, sender_ip="192.168.1.131",
4440 target_ip="192.168.1.123", opcode=2)
4442 # ARP Request for the newly introduced IP address from bridge
4443 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
4444 target_ip="192.168.1.130")
4445 send_arp(dev[2], sender_ip="192.168.1.104", target_ip="192.168.1.131")
4447 # ARP Probe from wireless STA (duplicate address; learned through DHCP)
4448 send_arp(dev[1], target_ip="192.168.1.123")
4449 # ARP Probe from wireless STA (duplicate address; learned through ARP)
4450 send_arp(dev[0], target_ip="192.168.1.127")
4452 # Gratuitous ARP Reply for another STA's IP address
4453 send_arp(dev[0], opcode=2, sender_mac=addr0, sender_ip="192.168.1.127",
4454 target_mac=addr1, target_ip="192.168.1.127")
4455 send_arp(dev[1], opcode=2, sender_mac=addr1, sender_ip="192.168.1.123",
4456 target_mac=addr0, target_ip="192.168.1.123")
4457 # ARP Request to verify previous mapping
4458 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.123")
4459 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
4463 send_ns(dev[0], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:cccc::2")
4465 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:dddd::2")
4467 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:dddd::2",
4468 ip_src="aaaa:bbbb:ffff::2")
4470 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:ff00::2")
4472 send_ns(dev[2], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:ff00::2")
4474 send_ns(dev[2], target="aaaa:bbbb:eeee::2", ip_src="aaaa:bbbb:ff00::2")
4477 # Try to probe for an already assigned address
4478 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="::")
4480 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc::2", ip_src="::")
4482 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="::")
4486 send_na(dev[1], target="aaaa:bbbb:cccc:aeae::3",
4487 ip_src="aaaa:bbbb:cccc:aeae::3", ip_dst="ff02::1")
4488 send_na(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc:aeae::4",
4489 ip_src="aaaa:bbbb:cccc:aeae::4", ip_dst="ff02::1")
4490 send_na(dev[2], target="aaaa:bbbb:cccc:aeae::5",
4491 ip_src="aaaa:bbbb:cccc:aeae::5", ip_dst="ff02::1")
4494 hwsim_utils.test_connectivity_iface(dev[0], hapd, "ap-br0")
4495 except Exception, e:
4496 logger.info("test_connectibity_iface failed: " + str(e))
4497 raise HwsimSkip("Assume kernel did not have the required patches for proxyarp")
4498 hwsim_utils.test_connectivity_iface(dev[1], hapd, "ap-br0")
4499 hwsim_utils.test_connectivity(dev[0], dev[1])
4501 dev[0].request("DISCONNECT")
4502 dev[1].request("DISCONNECT")
4504 for i in range(len(cmd)):
4506 macs = get_bridge_macs("ap-br0")
4507 logger.info("After disconnect (showmacs): " + str(macs))
4508 matches = get_permanent_neighbors("ap-br0")
4509 logger.info("After disconnect: " + str(matches))
4510 if len(matches) > 0:
4511 raise Exception("Unexpected neighbor entries after disconnect")
4513 cmd = subprocess.Popen(['ebtables', '-L', '--Lc'],
4514 stdout=subprocess.PIPE)
4515 res = cmd.stdout.read()
4517 logger.info("ebtables results:\n" + res)
4519 # Verify that expected ARP messages were seen and no unexpected
4520 # ARP messages were seen.
4522 arp_req = tshark_get_arp(cap_dev0, "arp.opcode == 1")
4523 arp_reply = tshark_get_arp(cap_dev0, "arp.opcode == 2")
4524 logger.info("dev0 seen ARP requests:\n" + str(arp_req))
4525 logger.info("dev0 seen ARP replies:\n" + str(arp_reply))
4527 if [ 'ff:ff:ff:ff:ff:ff', addr1,
4528 addr1, '192.168.1.100',
4529 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4530 raise Exception("dev0 saw ARP request from dev1")
4531 if [ 'ff:ff:ff:ff:ff:ff', addr2,
4532 addr2, '192.168.1.103',
4533 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4534 raise Exception("dev0 saw ARP request from dev2")
4535 # TODO: Uncomment once fixed in kernel
4536 #if [ 'ff:ff:ff:ff:ff:ff', bssid,
4537 # bssid, '192.168.1.101',
4538 # '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4539 # raise Exception("dev0 saw ARP request from br")
4544 raise Exception("Unexpected foreign ARP request on dev0")
4546 arp_req = tshark_get_arp(cap_dev1, "arp.opcode == 1")
4547 arp_reply = tshark_get_arp(cap_dev1, "arp.opcode == 2")
4548 logger.info("dev1 seen ARP requests:\n" + str(arp_req))
4549 logger.info("dev1 seen ARP replies:\n" + str(arp_reply))
4551 if [ 'ff:ff:ff:ff:ff:ff', addr2,
4552 addr2, '192.168.1.103',
4553 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4554 raise Exception("dev1 saw ARP request from dev2")
4555 if [addr1, addr0, addr0, '192.168.1.123', addr1, '192.168.1.100'] not in arp_reply:
4556 raise Exception("dev1 did not get ARP response for 192.168.1.123")
4561 raise Exception("Unexpected foreign ARP request on dev1")
4563 arp_req = tshark_get_arp(cap_dev2, "arp.opcode == 1")
4564 arp_reply = tshark_get_arp(cap_dev2, "arp.opcode == 2")
4565 logger.info("dev2 seen ARP requests:\n" + str(arp_req))
4566 logger.info("dev2 seen ARP replies:\n" + str(arp_reply))
4569 addr0, '192.168.1.123',
4570 addr2, '192.168.1.103' ] not in arp_reply:
4571 raise Exception("dev2 did not get ARP response for 192.168.1.123")
4573 arp_req = tshark_get_arp(cap_br, "arp.opcode == 1")
4574 arp_reply = tshark_get_arp(cap_br, "arp.opcode == 2")
4575 logger.info("br seen ARP requests:\n" + str(arp_req))
4576 logger.info("br seen ARP replies:\n" + str(arp_reply))
4578 # TODO: Uncomment once fixed in kernel
4580 # addr0, '192.168.1.123',
4581 # bssid, '192.168.1.101' ] not in arp_reply:
4582 # raise Exception("br did not get ARP response for 192.168.1.123")
4584 ns = tshark_get_ns(cap_dev0)
4585 logger.info("dev0 seen NS: " + str(ns))
4586 na = tshark_get_na(cap_dev0)
4587 logger.info("dev0 seen NA: " + str(na))
4589 if [ addr0, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:cccc::2',
4590 'aaaa:bbbb:dddd::2', addr1 ] not in na:
4591 raise Exception("dev0 did not get NA for aaaa:bbbb:dddd::2")
4596 raise Exception("Unexpected foreign NS on dev0: " + str(req))
4598 ns = tshark_get_ns(cap_dev1)
4599 logger.info("dev1 seen NS: " + str(ns))
4600 na = tshark_get_na(cap_dev1)
4601 logger.info("dev1 seen NA: " + str(na))
4603 if [ addr1, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:dddd::2',
4604 'aaaa:bbbb:cccc::2', addr0 ] not in na:
4605 raise Exception("dev1 did not get NA for aaaa:bbbb:cccc::2")
4610 raise Exception("Unexpected foreign NS on dev1: " + str(req))
4612 ns = tshark_get_ns(cap_dev2)
4613 logger.info("dev2 seen NS: " + str(ns))
4614 na = tshark_get_na(cap_dev2)
4615 logger.info("dev2 seen NA: " + str(na))
4617 # FIX: enable once kernel implementation for proxyarp IPv6 is fixed
4618 #if [ addr2, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:ff00::2',
4619 # 'aaaa:bbbb:cccc::2', addr0 ] not in na:
4620 # raise Exception("dev2 did not get NA for aaaa:bbbb:cccc::2")
4621 #if [ addr2, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:ff00::2',
4622 # 'aaaa:bbbb:dddd::2', addr1 ] not in na:
4623 # raise Exception("dev2 did not get NA for aaaa:bbbb:dddd::2")
4624 #if [ addr2, addr1, 'aaaa:bbbb:eeee::2', 'aaaa:bbbb:ff00::2',
4625 # 'aaaa:bbbb:eeee::2', addr1 ] not in na:
4626 # raise Exception("dev2 did not get NA for aaaa:bbbb:eeee::2")
4628 def test_proxyarp_open(dev, apdev, params):
4629 """ProxyARP with open network"""
4631 _test_proxyarp_open(dev, apdev, params)
4633 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
4634 stderr=open('/dev/null', 'w'))
4635 subprocess.call(['brctl', 'delbr', 'ap-br0'],
4636 stderr=open('/dev/null', 'w'))
4638 def test_proxyarp_open_ebtables(dev, apdev, params):
4639 """ProxyARP with open network"""
4641 _test_proxyarp_open(dev, apdev, params, ebtables=True)
4644 subprocess.call(['ebtables', '-F', 'FORWARD'])
4645 subprocess.call(['ebtables', '-F', 'OUTPUT'])
4648 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
4649 stderr=open('/dev/null', 'w'))
4650 subprocess.call(['brctl', 'delbr', 'ap-br0'],
4651 stderr=open('/dev/null', 'w'))
4653 def test_ap_hs20_connect_deinit(dev, apdev):
4654 """Hotspot 2.0 connection interrupted with deinit"""
4655 check_eap_capa(dev[0], "MSCHAPV2")
4656 bssid = apdev[0]['bssid']
4657 params = hs20_ap_params()
4658 params['hessid'] = bssid
4659 hapd = hostapd.add_ap(apdev[0], params)
4661 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
4662 wpas.interface_add("wlan5", drv_params="")
4664 wpas.flush_scan_cache()
4665 wpas.add_cred_values({ 'realm': "example.com",
4666 'username': "hs20-test",
4667 'password': "password",
4668 'ca_cert': "auth_serv/ca.pem",
4669 'domain': "example.com" })
4671 wpas.scan_for_bss(bssid, freq=2412)
4674 wpas.request("INTERWORKING_SELECT freq=2412")
4676 id = wpas.request("RADIO_WORK add block-work")
4677 ev = wpas.wait_event(["GAS-QUERY-START", "EXT-RADIO-WORK-START"], timeout=5)
4679 raise Exception("Timeout while waiting radio work to start")
4680 ev = wpas.wait_event(["GAS-QUERY-START", "EXT-RADIO-WORK-START"], timeout=5)
4682 raise Exception("Timeout while waiting radio work to start (2)")
4684 # Remove the interface while the gas-query radio work is still pending and
4685 # GAS query has not yet been started.
4686 wpas.interface_remove("wlan5")
4688 def test_ap_hs20_anqp_format_errors(dev, apdev):
4689 """Interworking network selection and ANQP format errors"""
4690 bssid = apdev[0]['bssid']
4691 params = hs20_ap_params()
4692 params['hessid'] = bssid
4693 hapd = hostapd.add_ap(apdev[0], params)
4695 dev[0].hs20_enable()
4696 values = { 'realm': "example.com",
4697 'ca_cert': "auth_serv/ca.pem",
4698 'username': "hs20-test",
4699 'password': "password",
4700 'domain': "example.com" }
4701 id = dev[0].add_cred_values(values)
4703 dev[0].scan_for_bss(bssid, freq="2412")
4705 tests = [ "00", "ffff", "010011223344", "020008000005112233445500",
4706 "01000400000000", "01000000000000",
4707 "01000300000200", "0100040000ff0000", "01000300000100",
4709 "01000600000056112233",
4710 "01000900000002050001000111",
4711 "01000600000001000000", "01000600000001ff0000",
4712 "01000600000001020001",
4713 "010008000000010400010001", "0100080000000104000100ff",
4714 "010011000000010d00050200020100030005000600",
4717 hapd.set("anqp_elem", "263:" + t)
4718 dev[0].request("INTERWORKING_SELECT freq=2412")
4719 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=5)
4721 raise Exception("Network selection timed out")
4722 dev[0].dump_monitor()
4724 dev[0].remove_cred(id)
4725 id = dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "AKA",
4726 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
4728 tests = [ "00", "0100", "0001", "00ff", "000200ff", "0003000101",
4731 hapd.set("anqp_elem", "264:" + t)
4732 dev[0].request("INTERWORKING_SELECT freq=2412")
4733 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=5)
4735 raise Exception("Network selection timed out")
4736 dev[0].dump_monitor()
4738 def test_ap_hs20_cred_with_nai_realm(dev, apdev):
4739 """Hotspot 2.0 network selection and cred_with_nai_realm cred->realm"""
4740 bssid = apdev[0]['bssid']
4741 params = hs20_ap_params()
4742 params['hessid'] = bssid
4743 hostapd.add_ap(apdev[0], params)
4745 dev[0].hs20_enable()
4747 id = dev[0].add_cred_values({ 'realm': "example.com",
4749 'password': "secret",
4750 'domain': "example.com",
4752 interworking_select(dev[0], bssid, "home", freq=2412)
4753 dev[0].remove_cred(id)
4755 id = dev[0].add_cred_values({ 'realm': "foo.com",
4757 'password': "secret",
4758 'domain': "example.com",
4759 'roaming_consortium': "112234",
4761 interworking_select(dev[0], bssid, "home", freq=2412, no_match=True)
4762 dev[0].remove_cred(id)
4764 def test_ap_hs20_cred_and_no_roaming_consortium(dev, apdev):
4765 """Hotspot 2.0 network selection and no roaming consortium"""
4766 bssid = apdev[0]['bssid']
4767 params = hs20_ap_params()
4768 params['hessid'] = bssid
4769 del params['roaming_consortium']
4770 hostapd.add_ap(apdev[0], params)
4772 dev[0].hs20_enable()
4774 id = dev[0].add_cred_values({ 'realm': "example.com",
4776 'password': "secret",
4777 'domain': "example.com",
4778 'roaming_consortium': "112234",
4780 interworking_select(dev[0], bssid, "home", freq=2412, no_match=True)
4782 def test_ap_hs20_interworking_oom(dev, apdev):
4783 """Hotspot 2.0 network selection and OOM"""
4784 bssid = apdev[0]['bssid']
4785 params = hs20_ap_params()
4786 params['hessid'] = bssid
4787 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]",
4788 "0,example.com,13[5:6],21[2:4][5:7]",
4789 "0,another.example.com" ]
4790 hostapd.add_ap(apdev[0], params)
4792 dev[0].hs20_enable()
4794 id = dev[0].add_cred_values({ 'realm': "example.com",
4796 'password': "secret",
4797 'domain': "example.com",
4800 dev[0].scan_for_bss(bssid, freq="2412")
4802 funcs = [ "wpabuf_alloc;interworking_anqp_send_req",
4803 "anqp_build_req;interworking_anqp_send_req",
4804 "gas_query_req;interworking_anqp_send_req",
4805 "dup_binstr;nai_realm_parse_realm",
4806 "=nai_realm_parse_realm",
4808 "=nai_realm_match" ]
4810 with alloc_fail(dev[0], 1, func):
4811 dev[0].request("INTERWORKING_SELECT auto freq=2412")
4812 ev = dev[0].wait_event(["Starting ANQP"], timeout=5)
4814 raise Exception("ANQP did not start")
4815 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4817 def test_ap_hs20_no_cred_connect(dev, apdev):
4818 """Hotspot 2.0 and connect attempt without credential"""
4819 bssid = apdev[0]['bssid']
4820 params = hs20_ap_params()
4821 params['hessid'] = bssid
4822 hapd = hostapd.add_ap(apdev[0], params)
4824 dev[0].hs20_enable()
4825 dev[0].scan_for_bss(bssid, freq="2412")
4826 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4827 raise Exception("Unexpected INTERWORKING_CONNECT success")
4829 def test_ap_hs20_no_rsn_connect(dev, apdev):
4830 """Hotspot 2.0 and connect attempt without RSN"""
4831 bssid = apdev[0]['bssid']
4832 params = hostapd.wpa_params(ssid="test-hs20")
4833 params['wpa_key_mgmt'] = "WPA-EAP"
4834 params['ieee80211w'] = "1"
4835 params['ieee8021x'] = "1"
4836 params['auth_server_addr'] = "127.0.0.1"
4837 params['auth_server_port'] = "1812"
4838 params['auth_server_shared_secret'] = "radius"
4839 params['interworking'] = "1"
4840 params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
4842 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
4843 "0,another.example.com" ]
4844 hapd = hostapd.add_ap(apdev[0], params)
4846 dev[0].hs20_enable()
4847 dev[0].scan_for_bss(bssid, freq="2412")
4849 id = dev[0].add_cred_values({ 'realm': "example.com",
4851 'password': "secret",
4852 'domain': "example.com",
4853 'roaming_consortium': "112233",
4856 interworking_select(dev[0], bssid, freq=2412, no_match=True)
4857 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4858 raise Exception("Unexpected INTERWORKING_CONNECT success")
4860 def test_ap_hs20_no_match_connect(dev, apdev):
4861 """Hotspot 2.0 and connect attempt without matching cred"""
4862 bssid = apdev[0]['bssid']
4863 params = hs20_ap_params()
4864 hapd = hostapd.add_ap(apdev[0], params)
4866 dev[0].hs20_enable()
4867 dev[0].scan_for_bss(bssid, freq="2412")
4869 id = dev[0].add_cred_values({ 'realm': "example.org",
4871 'password': "secret",
4872 'domain': "example.org",
4873 'roaming_consortium': "112234",
4876 interworking_select(dev[0], bssid, freq=2412, no_match=True)
4877 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4878 raise Exception("Unexpected INTERWORKING_CONNECT success")
4880 def test_ap_hs20_multiple_home_cred(dev, apdev):
4881 """Hotspot 2.0 and select with multiple matching home credentials"""
4882 bssid = apdev[0]['bssid']
4883 params = hs20_ap_params()
4884 params['hessid'] = bssid
4885 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
4886 params['domain_name'] = "example.com"
4887 hapd = hostapd.add_ap(apdev[0], params)
4889 bssid2 = apdev[1]['bssid']
4890 params = hs20_ap_params(ssid="test-hs20-other")
4891 params['hessid'] = bssid2
4892 params['nai_realm'] = [ "0,example.org,13[5:6],21[2:4][5:7]" ]
4893 params['domain_name'] = "example.org"
4894 hapd2 = hostapd.add_ap(apdev[1], params)
4896 dev[0].hs20_enable()
4897 dev[0].scan_for_bss(bssid2, freq="2412")
4898 dev[0].scan_for_bss(bssid, freq="2412")
4899 id = dev[0].add_cred_values({ 'realm': "example.com",
4901 'username': "hs20-test",
4902 'password': "password",
4903 'domain': "example.com" })
4904 id2 = dev[0].add_cred_values({ 'realm': "example.org",
4906 'username': "hs20-test",
4907 'password': "password",
4908 'domain': "example.org" })
4909 dev[0].request("INTERWORKING_SELECT auto freq=2412")
4910 ev = dev[0].wait_connected(timeout=15)
4911 if bssid2 not in ev:
4912 raise Exception("Connected to incorrect network")
4914 def test_ap_hs20_anqp_invalid_gas_response(dev, apdev):
4915 """Hotspot 2.0 network selection and invalid GAS response"""
4916 bssid = apdev[0]['bssid']
4917 params = hs20_ap_params()
4918 params['hessid'] = bssid
4919 hapd = hostapd.add_ap(apdev[0], params)
4921 dev[0].scan_for_bss(bssid, freq="2412")
4922 hapd.set("ext_mgmt_frame_handling", "1")
4924 dev[0].hs20_enable()
4926 id = dev[0].add_cred_values({ 'realm': "example.com",
4928 'password': "secret",
4929 'domain': "example.com",
4930 'roaming_consortium': "112234",
4932 dev[0].request("INTERWORKING_SELECT freq=2412")
4934 query = gas_rx(hapd)
4935 gas = parse_gas(query['payload'])
4937 logger.info("ANQP: Unexpected Advertisement Protocol in response")
4938 resp = action_response(query)
4939 adv_proto = struct.pack('8B', 108, 6, 127, 0xdd, 0x00, 0x11, 0x22, 0x33)
4940 data = struct.pack('<H', 0)
4941 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4942 GAS_INITIAL_RESPONSE,
4943 gas['dialog_token'], 0, 0) + adv_proto + data
4944 send_gas_resp(hapd, resp)
4946 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4948 raise Exception("No ANQP-QUERY-DONE seen")
4949 if "result=INVALID_FRAME" not in ev:
4950 raise Exception("Unexpected result: " + ev)
4952 dev[0].request("INTERWORKING_SELECT freq=2412")
4954 query = gas_rx(hapd)
4955 gas = parse_gas(query['payload'])
4957 logger.info("ANQP: Invalid element length for Info ID 1234")
4958 resp = action_response(query)
4959 adv_proto = struct.pack('BBBB', 108, 2, 127, 0)
4960 elements = struct.pack('<HH', 1234, 1)
4961 data = struct.pack('<H', len(elements)) + elements
4962 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4963 GAS_INITIAL_RESPONSE,
4964 gas['dialog_token'], 0, 0) + adv_proto + data
4965 send_gas_resp(hapd, resp)
4967 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4969 raise Exception("No ANQP-QUERY-DONE seen")
4970 if "result=INVALID_FRAME" not in ev:
4971 raise Exception("Unexpected result: " + ev)
4973 with alloc_fail(dev[0], 1, "=anqp_add_extra"):
4974 dev[0].request("INTERWORKING_SELECT freq=2412")
4976 query = gas_rx(hapd)
4977 gas = parse_gas(query['payload'])
4979 resp = action_response(query)
4980 elements = struct.pack('<HHHH', 1, 0, 1, 0)
4981 data = struct.pack('<H', len(elements)) + elements
4982 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4983 GAS_INITIAL_RESPONSE,
4984 gas['dialog_token'], 0, 0) + adv_proto + data
4985 send_gas_resp(hapd, resp)
4987 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4989 raise Exception("No ANQP-QUERY-DONE seen")
4990 if "result=SUCCESS" not in ev:
4991 raise Exception("Unexpected result: " + ev)
4993 with alloc_fail(dev[0], 1, "wpabuf_alloc_copy;anqp_add_extra"):
4994 dev[0].request("INTERWORKING_SELECT freq=2412")
4996 query = gas_rx(hapd)
4997 gas = parse_gas(query['payload'])
4999 resp = action_response(query)
5000 elements = struct.pack('<HHHH', 1, 0, 1, 0)
5001 data = struct.pack('<H', len(elements)) + elements
5002 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
5003 GAS_INITIAL_RESPONSE,
5004 gas['dialog_token'], 0, 0) + adv_proto + data
5005 send_gas_resp(hapd, resp)
5007 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
5009 raise Exception("No ANQP-QUERY-DONE seen")
5010 if "result=SUCCESS" not in ev:
5011 raise Exception("Unexpected result: " + ev)
5013 tests = [ struct.pack('<HH', 0xdddd, 0),
5014 struct.pack('<HH3B', 0xdddd, 3, 0x50, 0x6f, 0x9a),
5015 struct.pack('<HH4B', 0xdddd, 4, 0x50, 0x6f, 0x9a, 0),
5016 struct.pack('<HH4B', 0xdddd, 4, 0x11, 0x22, 0x33, 0),
5017 struct.pack('<HHHH', 1, 0, 1, 0) ]
5018 for elements in tests:
5019 dev[0].request("INTERWORKING_SELECT freq=2412")
5021 query = gas_rx(hapd)
5022 gas = parse_gas(query['payload'])
5024 resp = action_response(query)
5025 data = struct.pack('<H', len(elements)) + elements
5026 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
5027 GAS_INITIAL_RESPONSE,
5028 gas['dialog_token'], 0, 0) + adv_proto + data
5029 send_gas_resp(hapd, resp)
5031 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
5033 raise Exception("No ANQP-QUERY-DONE seen")
5034 if "result=SUCCESS" not in ev:
5035 raise Exception("Unexpected result: " + ev)
5037 def test_ap_hs20_set_profile_failures(dev, apdev):
5038 """Hotspot 2.0 and failures during profile configuration"""
5039 bssid = apdev[0]['bssid']
5040 params = hs20_ap_params()
5041 params['hessid'] = bssid
5042 params['anqp_3gpp_cell_net'] = "555,444"
5043 hapd = hostapd.add_ap(apdev[0], params)
5045 dev[0].hs20_enable()
5046 dev[0].scan_for_bss(bssid, freq="2412")
5048 id = dev[0].add_cred_values({ 'realm': "example.com",
5049 'domain': "example.com",
5051 'password': "secret",
5053 interworking_select(dev[0], bssid, "home", freq=2412)
5054 dev[0].dump_monitor()
5055 dev[0].request("NOTE ssid->eap.eap_methods = os_malloc()")
5056 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
5057 dev[0].request("INTERWORKING_CONNECT " + bssid)
5058 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5059 dev[0].remove_cred(id)
5061 id = dev[0].add_cred_values({ 'realm': "example.com",
5062 'domain': "example.com",
5063 'username': "hs20-test-with-domain@example.com",
5064 'password': "password" })
5065 interworking_select(dev[0], bssid, "home", freq=2412)
5066 dev[0].dump_monitor()
5067 dev[0].request("NOTE anon = os_malloc()")
5068 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
5069 dev[0].request("INTERWORKING_CONNECT " + bssid)
5070 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5071 dev[0].request("NOTE Successful connection with cred->username including realm")
5072 dev[0].request("INTERWORKING_CONNECT " + bssid)
5073 dev[0].wait_connected()
5074 dev[0].remove_cred(id)
5075 dev[0].wait_disconnected()
5077 id = dev[0].add_cred_values({ 'realm': "example.com",
5078 'domain': "example.com",
5079 'username': "hs20-test",
5080 'password': "password" })
5081 interworking_select(dev[0], bssid, "home", freq=2412)
5082 dev[0].dump_monitor()
5083 dev[0].request("NOTE anon = os_malloc() (second)")
5084 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
5085 dev[0].request("INTERWORKING_CONNECT " + bssid)
5086 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5087 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect"):
5088 dev[0].request("INTERWORKING_CONNECT " + bssid)
5089 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5090 with alloc_fail(dev[0], 1, "=interworking_connect"):
5091 dev[0].request("INTERWORKING_CONNECT " + bssid)
5092 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5093 dev[0].request("NOTE wpa_config_set(eap)")
5094 with alloc_fail(dev[0], 1, "wpa_config_parse_eap;wpa_config_set;interworking_connect"):
5095 dev[0].request("INTERWORKING_CONNECT " + bssid)
5096 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5097 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_MSCHAPV2-phase2)")
5098 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5099 dev[0].request("INTERWORKING_CONNECT " + bssid)
5100 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5101 dev[0].remove_cred(id)
5103 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5104 'domain': "example.com",
5105 'username': "hs20-test",
5106 'password': "password",
5108 'phase2': "auth=MSCHAPV2" })
5109 interworking_select(dev[0], bssid, "home", freq=2412)
5110 dev[0].dump_monitor()
5111 dev[0].request("NOTE anon = os_strdup()")
5112 with alloc_fail(dev[0], 2, "interworking_set_eap_params"):
5113 dev[0].request("INTERWORKING_CONNECT " + bssid)
5114 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5115 dev[0].request("NOTE wpa_config_set_quoted(anonymous_identity)")
5116 with alloc_fail(dev[0], 1, "=wpa_config_set_quoted;interworking_set_eap_params"):
5117 dev[0].request("INTERWORKING_CONNECT " + bssid)
5118 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5119 dev[0].request("NOTE Successful connection with cred->realm not included")
5120 dev[0].request("INTERWORKING_CONNECT " + bssid)
5121 dev[0].wait_connected()
5122 dev[0].remove_cred(id)
5123 dev[0].wait_disconnected()
5125 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5126 'domain': "example.com",
5127 'realm': "example.com",
5129 'password': "password",
5131 interworking_select(dev[0], bssid, "home", freq=2412)
5132 dev[0].dump_monitor()
5133 dev[0].request("NOTE id = os_strdup()")
5134 with alloc_fail(dev[0], 2, "interworking_set_eap_params"):
5135 dev[0].request("INTERWORKING_CONNECT " + bssid)
5136 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5137 dev[0].request("NOTE wpa_config_set_quoted(identity)")
5138 with alloc_fail(dev[0], 1, "=wpa_config_set_quoted;interworking_set_eap_params"):
5139 dev[0].request("INTERWORKING_CONNECT " + bssid)
5140 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5141 dev[0].remove_cred(id)
5143 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5144 'domain': "example.com",
5145 'realm': "example.com",
5147 'password': "password",
5149 interworking_select(dev[0], bssid, "home", freq=2412)
5150 dev[0].dump_monitor()
5151 dev[0].request("NOTE wpa_config_set_quoted(identity) (second)")
5152 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_set_eap_params"):
5153 dev[0].request("INTERWORKING_CONNECT " + bssid)
5154 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5155 dev[0].request("NOTE wpa_config_set_quoted(password)")
5156 with alloc_fail(dev[0], 3, "=wpa_config_set_quoted;interworking_set_eap_params"):
5157 dev[0].request("INTERWORKING_CONNECT " + bssid)
5158 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5159 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect_roaming_consortium"):
5160 dev[0].request("INTERWORKING_CONNECT " + bssid)
5161 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5162 with alloc_fail(dev[0], 1, "=interworking_connect_roaming_consortium"):
5163 dev[0].request("INTERWORKING_CONNECT " + bssid)
5164 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5165 dev[0].remove_cred(id)
5167 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5168 'domain': "example.com",
5169 'realm': "example.com",
5172 dev[0].set_cred(id, "password", "ext:password");
5173 interworking_select(dev[0], bssid, "home", freq=2412)
5174 dev[0].dump_monitor()
5175 dev[0].request("NOTE wpa_config_set(password)")
5176 with alloc_fail(dev[0], 3, "wpa_config_set;interworking_set_eap_params"):
5177 dev[0].request("INTERWORKING_CONNECT " + bssid)
5178 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5179 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
5180 dev[0].request("INTERWORKING_CONNECT " + bssid)
5181 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5182 dev[0].remove_cred(id)
5184 id = dev[0].add_cred_values({ 'realm': "example.com",
5185 'domain': "example.com",
5186 'username': "certificate-user",
5187 'phase1': "include_tls_length=0",
5188 'domain_suffix_match': "example.com",
5189 'ca_cert': "auth_serv/ca.pem",
5190 'client_cert': "auth_serv/user.pem",
5191 'private_key': "auth_serv/user.key",
5192 'private_key_passwd': "secret" })
5193 interworking_select(dev[0], bssid, "home", freq=2412)
5194 dev[0].dump_monitor()
5195 dev[0].request("NOTE wpa_config_set_quoted(client_cert)")
5196 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_set_eap_params"):
5197 dev[0].request("INTERWORKING_CONNECT " + bssid)
5198 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5199 dev[0].request("NOTE wpa_config_set_quoted(private_key)")
5200 with alloc_fail(dev[0], 3, "=wpa_config_set_quoted;interworking_set_eap_params"):
5201 dev[0].request("INTERWORKING_CONNECT " + bssid)
5202 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5203 dev[0].request("NOTE wpa_config_set_quoted(private_key_passwd)")
5204 with alloc_fail(dev[0], 4, "=wpa_config_set_quoted;interworking_set_eap_params"):
5205 dev[0].request("INTERWORKING_CONNECT " + bssid)
5206 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5207 dev[0].request("NOTE wpa_config_set_quoted(ca_cert)")
5208 with alloc_fail(dev[0], 5, "=wpa_config_set_quoted;interworking_set_eap_params"):
5209 dev[0].request("INTERWORKING_CONNECT " + bssid)
5210 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5211 dev[0].request("NOTE wpa_config_set_quoted(domain_suffix_match)")
5212 with alloc_fail(dev[0], 6, "=wpa_config_set_quoted;interworking_set_eap_params"):
5213 dev[0].request("INTERWORKING_CONNECT " + bssid)
5214 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5215 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
5216 dev[0].request("INTERWORKING_CONNECT " + bssid)
5217 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5218 dev[0].remove_cred(id)
5220 id = dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "SIM",
5221 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
5222 interworking_select(dev[0], bssid, freq=2412)
5223 dev[0].dump_monitor()
5224 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
5225 dev[0].request("INTERWORKING_CONNECT " + bssid)
5226 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5227 dev[0].request("NOTE wpa_config_set_quoted(password;milenage)")
5228 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_connect_3gpp"):
5229 dev[0].request("INTERWORKING_CONNECT " + bssid)
5230 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5231 dev[0].request("NOTE wpa_config_set(eap)")
5232 with alloc_fail(dev[0], 1, "wpa_config_parse_eap;wpa_config_set;interworking_connect_3gpp"):
5233 dev[0].request("INTERWORKING_CONNECT " + bssid)
5234 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5235 dev[0].request("NOTE set_root_nai:wpa_config_set(identity)")
5236 with alloc_fail(dev[0], 1, "wpa_config_parse_str;interworking_connect_3gpp"):
5237 dev[0].request("INTERWORKING_CONNECT " + bssid)
5238 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5239 dev[0].remove_cred(id)
5241 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
5242 'username': "user@example.com",
5243 'password': "password" })
5244 interworking_select(dev[0], bssid, freq=2412)
5245 dev[0].dump_monitor()
5246 dev[0].request("NOTE Interworking: No EAP method set for credential using roaming consortium")
5247 dev[0].request("INTERWORKING_CONNECT " + bssid)
5248 dev[0].remove_cred(id)
5251 params = hs20_ap_params()
5252 params['nai_realm'] = "0,example.com,25[3:26]"
5253 hapd = hostapd.add_ap(apdev[0], params)
5254 id = dev[0].add_cred_values({ 'realm': "example.com",
5255 'domain': "example.com",
5256 'username': "hs20-test",
5257 'password': "password" })
5258 interworking_select(dev[0], bssid, freq=2412)
5259 dev[0].dump_monitor()
5260 dev[0].request("NOTE wpa_config_set(PEAP/FAST-phase1)")
5261 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5262 dev[0].request("INTERWORKING_CONNECT " + bssid)
5263 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5264 dev[0].request("NOTE wpa_config_set(PEAP/FAST-pac_interworking)")
5265 with alloc_fail(dev[0], 2, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5266 dev[0].request("INTERWORKING_CONNECT " + bssid)
5267 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5268 dev[0].request("NOTE wpa_config_set(PEAP/FAST-phase2)")
5269 with alloc_fail(dev[0], 3, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5270 dev[0].request("INTERWORKING_CONNECT " + bssid)
5271 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5274 params = hs20_ap_params()
5275 params['nai_realm'] = "0,example.com,21"
5276 hapd = hostapd.add_ap(apdev[0], params)
5277 interworking_select(dev[0], bssid, freq=2412)
5278 dev[0].request("NOTE wpa_config_set(TTLS-defaults-phase2)")
5279 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5280 dev[0].request("INTERWORKING_CONNECT " + bssid)
5281 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5284 params = hs20_ap_params()
5285 params['nai_realm'] = "0,example.com,21[2:3]"
5286 hapd = hostapd.add_ap(apdev[0], params)
5287 interworking_select(dev[0], bssid, freq=2412)
5288 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_MSCHAP-phase2)")
5289 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5290 dev[0].request("INTERWORKING_CONNECT " + bssid)
5291 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5294 params = hs20_ap_params()
5295 params['nai_realm'] = "0,example.com,21[2:2]"
5296 hapd = hostapd.add_ap(apdev[0], params)
5297 interworking_select(dev[0], bssid, freq=2412)
5298 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_CHAP-phase2)")
5299 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5300 dev[0].request("INTERWORKING_CONNECT " + bssid)
5301 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5304 params = hs20_ap_params()
5305 params['nai_realm'] = "0,example.com,21[2:1]"
5306 hapd = hostapd.add_ap(apdev[0], params)
5307 interworking_select(dev[0], bssid, freq=2412)
5308 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_PAP-phase2)")
5309 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5310 dev[0].request("INTERWORKING_CONNECT " + bssid)
5311 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5314 params = hs20_ap_params()
5315 params['nai_realm'] = "0,example.com,21[3:26]"
5316 hapd = hostapd.add_ap(apdev[0], params)
5317 interworking_select(dev[0], bssid, freq=2412)
5318 dev[0].request("NOTE wpa_config_set(TTLS-EAP-MSCHAPV2-phase2)")
5319 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
5320 dev[0].request("INTERWORKING_CONNECT " + bssid)
5321 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5323 dev[0].remove_cred(id)
5325 def test_ap_hs20_unexpected(dev, apdev):
5326 """Unexpected Hotspot 2.0 AP configuration"""
5327 check_eap_capa(dev[0], "MSCHAPV2")
5328 bssid = apdev[0]['bssid']
5329 params = hostapd.wpa_eap_params(ssid="test-hs20-fake")
5331 params['wpa_pairwise'] = "TKIP CCMP"
5332 params['rsn_pairwise'] = "CCMP"
5333 #params['vendor_elements'] = 'dd07506f9a10140000'
5334 params['vendor_elements'] = 'dd04506f9a10'
5335 hostapd.add_ap(apdev[0], params)
5337 dev[0].hs20_enable()
5338 dev[0].scan_for_bss(bssid, freq="2412")
5339 dev[0].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
5341 identity="hs20-test", password="password",
5342 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
5345 dev[1].hs20_enable()
5346 dev[1].scan_for_bss(bssid, freq="2412")
5347 dev[1].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
5349 identity="hs20-test", password="password",
5350 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
5353 dev[2].hs20_enable()
5354 dev[2].scan_for_bss(bssid, freq="2412")
5355 dev[2].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
5356 proto="RSN", pairwise="CCMP",
5357 identity="hs20-test", password="password",
5358 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
5361 def test_ap_interworking_element_update(dev, apdev):
5362 """Dynamic Interworking element update"""
5363 bssid = apdev[0]['bssid']
5364 params = hs20_ap_params()
5365 params['hessid'] = bssid
5366 hapd = hostapd.add_ap(apdev[0], params)
5368 dev[0].hs20_enable()
5369 dev[0].scan_for_bss(bssid, freq="2412")
5370 bss = dev[0].get_bss(bssid)
5371 logger.info("Before update: " + str(bss))
5372 if '6b091e0701020000000300' not in bss['ie']:
5373 raise Exception("Expected Interworking element not seen before update")
5375 # Update configuration parameters related to Interworking element
5376 hapd.set('access_network_type', '2')
5377 hapd.set('asra', '1')
5378 hapd.set('esr', '1')
5379 hapd.set('uesa', '1')
5380 hapd.set('venue_group', '2')
5381 hapd.set('venue_type', '8')
5382 if "OK" not in hapd.request("UPDATE_BEACON"):
5383 raise Exception("UPDATE_BEACON failed")
5384 dev[0].request("BSS_FLUSH 0")
5385 dev[0].scan_for_bss(bssid, freq="2412", force_scan=True)
5386 bss = dev[0].get_bss(bssid)
5387 logger.info("After update: " + str(bss))
5388 if '6b09f20208020000000300' not in bss['ie']:
5389 raise Exception("Expected Interworking element not seen after update")