2 # Copyright (c) 2013-2015, Jouni Malinen <j@w1.fi>
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
7 from remotehost import remote_compatible
13 logger = logging.getLogger()
20 from utils import HwsimSkip, skip_with_fips, alloc_fail, wait_fail_trigger
22 from tshark import run_tshark
23 from wlantest import Wlantest
24 from wpasupplicant import WpaSupplicant
25 from test_ap_eap import check_eap_capa, check_domain_match_full
26 from test_gas import gas_rx, parse_gas, action_response, send_gas_resp, ACTION_CATEG_PUBLIC, GAS_INITIAL_RESPONSE
28 def hs20_ap_params(ssid="test-hs20"):
29 params = hostapd.wpa2_params(ssid=ssid)
30 params['wpa_key_mgmt'] = "WPA-EAP"
31 params['ieee80211w'] = "1"
32 params['ieee8021x'] = "1"
33 params['auth_server_addr'] = "127.0.0.1"
34 params['auth_server_port'] = "1812"
35 params['auth_server_shared_secret'] = "radius"
36 params['interworking'] = "1"
37 params['access_network_type'] = "14"
38 params['internet'] = "1"
42 params['venue_group'] = "7"
43 params['venue_type'] = "1"
44 params['venue_name'] = [ "eng:Example venue", "fin:Esimerkkipaikka" ]
45 params['roaming_consortium'] = [ "112233", "1020304050", "010203040506",
47 params['domain_name'] = "example.com,another.example.com"
48 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
49 "0,another.example.com" ]
51 params['hs20_wan_metrics'] = "01:8000:1000:80:240:3000"
52 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0" ]
53 params['hs20_operating_class'] = "5173"
54 params['anqp_3gpp_cell_net'] = "244,91"
57 def check_auto_select(dev, bssid):
58 dev.scan_for_bss(bssid, freq="2412")
59 dev.request("INTERWORKING_SELECT auto freq=2412")
60 ev = dev.wait_connected(timeout=15)
62 raise Exception("Connected to incorrect network")
63 dev.request("REMOVE_NETWORK all")
64 dev.wait_disconnected()
67 def interworking_select(dev, bssid, type=None, no_match=False, freq=None):
69 if bssid and freq and not no_match:
70 dev.scan_for_bss(bssid, freq=freq)
71 freq_extra = " freq=" + str(freq) if freq else ""
72 dev.request("INTERWORKING_SELECT" + freq_extra)
73 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
76 raise Exception("Network selection timed out")
78 if "INTERWORKING-NO-MATCH" not in ev:
79 raise Exception("Unexpected network match")
81 if "INTERWORKING-NO-MATCH" in ev:
82 logger.info("Matching network not found - try again")
84 dev.request("INTERWORKING_SELECT" + freq_extra)
85 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
88 raise Exception("Network selection timed out")
89 if "INTERWORKING-NO-MATCH" in ev:
90 raise Exception("Matching network not found")
91 if bssid and bssid not in ev:
92 raise Exception("Unexpected BSSID in match")
93 if type and "type=" + type not in ev:
94 raise Exception("Network type not recognized correctly")
96 def check_sp_type(dev, sp_type):
97 type = dev.get_status_field("sp_type")
99 raise Exception("sp_type not available")
101 raise Exception("sp_type did not indicate home network")
103 def hlr_auc_gw_available():
104 if not os.path.exists("/tmp/hlr_auc_gw.sock"):
105 raise HwsimSkip("No hlr_auc_gw socket available")
106 if not os.path.exists("../../hostapd/hlr_auc_gw"):
107 raise HwsimSkip("No hlr_auc_gw available")
109 def interworking_ext_sim_connect(dev, bssid, method):
110 dev.request("INTERWORKING_CONNECT " + bssid)
111 interworking_ext_sim_auth(dev, method)
113 def interworking_ext_sim_auth(dev, method):
114 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
116 raise Exception("Network connected timed out")
117 if "(" + method + ")" not in ev:
118 raise Exception("Unexpected EAP method selection")
120 ev = dev.wait_event(["CTRL-REQ-SIM"], timeout=15)
122 raise Exception("Wait for external SIM processing request timed out")
124 if p[1] != "GSM-AUTH":
125 raise Exception("Unexpected CTRL-REQ-SIM type")
126 id = p[0].split('-')[3]
127 rand = p[2].split(' ')[0]
129 res = subprocess.check_output(["../../hostapd/hlr_auc_gw",
131 "auth_serv/hlr_auc_gw.milenage_db",
132 "GSM-AUTH-REQ 232010000000000 " + rand])
133 if "GSM-AUTH-RESP" not in res:
134 raise Exception("Unexpected hlr_auc_gw response")
135 resp = res.split(' ')[2].rstrip()
137 dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp)
138 dev.wait_connected(timeout=15)
140 def interworking_connect(dev, bssid, method):
141 dev.request("INTERWORKING_CONNECT " + bssid)
142 interworking_auth(dev, method)
144 def interworking_auth(dev, method):
145 ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=15)
147 raise Exception("Network connected timed out")
148 if "(" + method + ")" not in ev:
149 raise Exception("Unexpected EAP method selection")
151 dev.wait_connected(timeout=15)
153 def check_probe_resp(wt, bssid_unexpected, bssid_expected):
155 count = wt.get_bss_counter("probe_response", bssid_unexpected)
157 raise Exception("Unexpected Probe Response frame from AP")
160 count = wt.get_bss_counter("probe_response", bssid_expected)
162 raise Exception("No Probe Response frame from AP")
164 def test_ap_anqp_sharing(dev, apdev):
165 """ANQP sharing within ESS and explicit unshare"""
166 check_eap_capa(dev[0], "MSCHAPV2")
167 dev[0].flush_scan_cache()
169 bssid = apdev[0]['bssid']
170 params = hs20_ap_params()
171 params['hessid'] = bssid
172 hostapd.add_ap(apdev[0], params)
174 bssid2 = apdev[1]['bssid']
175 params = hs20_ap_params()
176 params['hessid'] = bssid
177 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
178 hostapd.add_ap(apdev[1], params)
181 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
182 'password': "secret",
183 'domain': "example.com" })
184 logger.info("Normal network selection with shared ANQP results")
185 dev[0].scan_for_bss(bssid, freq="2412")
186 dev[0].scan_for_bss(bssid2, freq="2412")
187 interworking_select(dev[0], None, "home", freq="2412")
188 dev[0].dump_monitor()
190 logger.debug("BSS entries:\n" + dev[0].request("BSS RANGE=ALL"))
191 res1 = dev[0].get_bss(bssid)
192 res2 = dev[0].get_bss(bssid2)
193 if 'anqp_nai_realm' not in res1:
194 raise Exception("anqp_nai_realm not found for AP1")
195 if 'anqp_nai_realm' not in res2:
196 raise Exception("anqp_nai_realm not found for AP2")
197 if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
198 raise Exception("ANQP results were not shared between BSSes")
200 logger.info("Explicit ANQP request to unshare ANQP results")
201 dev[0].request("ANQP_GET " + bssid + " 263")
202 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
204 raise Exception("ANQP operation timed out")
206 dev[0].request("ANQP_GET " + bssid2 + " 263")
207 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
209 raise Exception("ANQP operation timed out")
211 res1 = dev[0].get_bss(bssid)
212 res2 = dev[0].get_bss(bssid2)
213 if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
214 raise Exception("ANQP results were not unshared")
216 def test_ap_anqp_sharing_oom(dev, apdev):
217 """ANQP sharing within ESS and explicit unshare OOM"""
218 check_eap_capa(dev[0], "MSCHAPV2")
219 dev[0].flush_scan_cache()
221 bssid = apdev[0]['bssid']
222 params = hs20_ap_params()
223 params['hessid'] = bssid
224 hostapd.add_ap(apdev[0], params)
226 bssid2 = apdev[1]['bssid']
227 params = hs20_ap_params()
228 params['hessid'] = bssid
229 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]" ]
230 hostapd.add_ap(apdev[1], params)
233 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
234 'password': "secret",
235 'domain': "example.com" })
236 dev[0].scan_for_bss(bssid, freq="2412")
237 dev[0].scan_for_bss(bssid2, freq="2412")
238 interworking_select(dev[0], None, "home", freq="2412")
239 dev[0].dump_monitor()
241 with alloc_fail(dev[0], 1, "wpa_bss_anqp_clone"):
242 dev[0].request("ANQP_GET " + bssid + " 263")
243 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
245 raise Exception("ANQP operation timed out")
247 def test_ap_nai_home_realm_query(dev, apdev):
248 """NAI Home Realm Query"""
249 check_eap_capa(dev[0], "MSCHAPV2")
250 bssid = apdev[0]['bssid']
251 params = hs20_ap_params()
252 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
253 "0,another.example.org" ]
254 hostapd.add_ap(apdev[0], params)
256 dev[0].scan(freq="2412")
257 dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " realm=example.com")
258 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
260 raise Exception("ANQP operation timed out")
261 nai1 = dev[0].get_bss(bssid)['anqp_nai_realm']
262 dev[0].dump_monitor()
264 dev[0].request("ANQP_GET " + bssid + " 263")
265 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
267 raise Exception("ANQP operation timed out")
268 nai2 = dev[0].get_bss(bssid)['anqp_nai_realm']
270 if len(nai1) >= len(nai2):
271 raise Exception("Unexpected NAI Realm list response lengths")
272 if "example.com".encode('hex') not in nai1:
273 raise Exception("Home realm not reported")
274 if "example.org".encode('hex') in nai1:
275 raise Exception("Non-home realm reported")
276 if "example.com".encode('hex') not in nai2:
277 raise Exception("Home realm not reported in wildcard query")
278 if "example.org".encode('hex') not in nai2:
279 raise Exception("Non-home realm not reported in wildcard query ")
282 "00:11:22:33:44:55 123",
283 "00:11:22:33:44:55 qq" ]
285 if "FAIL" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + cmd):
286 raise Exception("Invalid HS20_GET_NAI_HOME_REALM_LIST accepted: " + cmd)
288 dev[0].dump_monitor()
289 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
290 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
291 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
293 raise Exception("ANQP operation timed out")
294 ev = dev[0].wait_event(["RX-ANQP"], timeout=0.1)
296 raise Exception("Unexpected ANQP response: " + ev)
298 dev[0].dump_monitor()
299 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid + " 01000b6578616d706c652e636f6d"):
300 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
301 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
303 raise Exception("No ANQP response")
304 if "NAI Realm list" not in ev:
305 raise Exception("Missing NAI Realm list: " + ev)
307 dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
308 'password': "secret",
309 'domain': "example.com" })
310 dev[0].dump_monitor()
311 if "OK" not in dev[0].request("HS20_GET_NAI_HOME_REALM_LIST " + bssid):
312 raise Exception("HS20_GET_NAI_HOME_REALM_LIST failed")
313 ev = dev[0].wait_event(["RX-ANQP"], timeout=10)
315 raise Exception("No ANQP response")
316 if "NAI Realm list" not in ev:
317 raise Exception("Missing NAI Realm list: " + ev)
320 def test_ap_interworking_scan_filtering(dev, apdev):
321 """Interworking scan filtering with HESSID and access network type"""
323 _test_ap_interworking_scan_filtering(dev, apdev)
325 dev[0].request("SET hessid 00:00:00:00:00:00")
326 dev[0].request("SET access_network_type 15")
328 def _test_ap_interworking_scan_filtering(dev, apdev):
329 bssid = apdev[0]['bssid']
330 params = hs20_ap_params()
331 ssid = "test-hs20-ap1"
332 params['ssid'] = ssid
333 params['hessid'] = bssid
334 hapd0 = hostapd.add_ap(apdev[0], params)
336 bssid2 = apdev[1]['bssid']
337 params = hs20_ap_params()
338 ssid2 = "test-hs20-ap2"
339 params['ssid'] = ssid2
340 params['hessid'] = bssid2
341 params['access_network_type'] = "1"
342 del params['venue_group']
343 del params['venue_type']
344 hostapd.add_ap(apdev[1], params)
348 Wlantest.setup(hapd0)
352 logger.info("Check probe request filtering based on HESSID")
354 dev[0].request("SET hessid " + bssid2)
355 dev[0].scan(freq="2412")
357 check_probe_resp(wt, bssid, bssid2)
359 logger.info("Check probe request filtering based on access network type")
361 wt.clear_bss_counters(bssid)
362 wt.clear_bss_counters(bssid2)
363 dev[0].request("SET hessid 00:00:00:00:00:00")
364 dev[0].request("SET access_network_type 14")
365 dev[0].scan(freq="2412")
367 check_probe_resp(wt, bssid2, bssid)
369 wt.clear_bss_counters(bssid)
370 wt.clear_bss_counters(bssid2)
371 dev[0].request("SET hessid 00:00:00:00:00:00")
372 dev[0].request("SET access_network_type 1")
373 dev[0].scan(freq="2412")
375 check_probe_resp(wt, bssid, bssid2)
377 logger.info("Check probe request filtering based on HESSID and ANT")
379 wt.clear_bss_counters(bssid)
380 wt.clear_bss_counters(bssid2)
381 dev[0].request("SET hessid " + bssid)
382 dev[0].request("SET access_network_type 14")
383 dev[0].scan(freq="2412")
385 check_probe_resp(wt, bssid2, bssid)
387 wt.clear_bss_counters(bssid)
388 wt.clear_bss_counters(bssid2)
389 dev[0].request("SET hessid " + bssid2)
390 dev[0].request("SET access_network_type 14")
391 dev[0].scan(freq="2412")
393 check_probe_resp(wt, bssid, None)
394 check_probe_resp(wt, bssid2, None)
396 wt.clear_bss_counters(bssid)
397 wt.clear_bss_counters(bssid2)
398 dev[0].request("SET hessid " + bssid)
399 dev[0].request("SET access_network_type 1")
400 dev[0].scan(freq="2412")
402 check_probe_resp(wt, bssid, None)
403 check_probe_resp(wt, bssid2, None)
405 def test_ap_hs20_select(dev, apdev):
406 """Hotspot 2.0 network selection"""
407 bssid = apdev[0]['bssid']
408 params = hs20_ap_params()
409 params['hessid'] = bssid
410 hostapd.add_ap(apdev[0], params)
413 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
414 'password': "secret",
415 'domain': "example.com" })
416 interworking_select(dev[0], bssid, "home")
418 dev[0].remove_cred(id)
419 id = dev[0].add_cred_values({ 'realm': "example.com", 'username': "test",
420 'password': "secret",
421 'domain': "no.match.example.com" })
422 interworking_select(dev[0], bssid, "roaming", freq="2412")
424 dev[0].set_cred_quoted(id, "realm", "no.match.example.com")
425 interworking_select(dev[0], bssid, no_match=True, freq="2412")
427 res = dev[0].request("SCAN_RESULTS")
428 if "[HS20]" not in res:
429 raise Exception("HS20 flag missing from scan results: " + res)
431 bssid2 = apdev[1]['bssid']
432 params = hs20_ap_params()
433 params['nai_realm'] = [ "0,example.org,21" ]
434 params['hessid'] = bssid2
435 params['domain_name'] = "example.org"
436 hostapd.add_ap(apdev[1], params)
437 dev[0].remove_cred(id)
438 id = dev[0].add_cred_values({ 'realm': "example.org", 'username': "test",
439 'password': "secret",
440 'domain': "example.org" })
441 interworking_select(dev[0], bssid2, "home", freq="2412")
443 def hs20_simulated_sim(dev, ap, method):
445 params = hs20_ap_params()
446 params['hessid'] = bssid
447 params['anqp_3gpp_cell_net'] = "555,444"
448 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
449 hostapd.add_ap(ap, params)
452 dev.add_cred_values({ 'imsi': "555444-333222111", 'eap': method,
453 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
454 interworking_select(dev, bssid, "home", freq="2412")
455 interworking_connect(dev, bssid, method)
456 check_sp_type(dev, "home")
458 def test_ap_hs20_sim(dev, apdev):
459 """Hotspot 2.0 with simulated SIM and EAP-SIM"""
460 hlr_auc_gw_available()
461 hs20_simulated_sim(dev[0], apdev[0], "SIM")
462 dev[0].request("INTERWORKING_SELECT auto freq=2412")
463 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
465 raise Exception("Timeout on already-connected event")
467 def test_ap_hs20_sim_invalid(dev, apdev):
468 """Hotspot 2.0 with simulated SIM and EAP-SIM - invalid IMSI"""
469 hlr_auc_gw_available()
470 bssid = apdev[0]['bssid']
471 params = hs20_ap_params()
472 params['hessid'] = bssid
473 params['anqp_3gpp_cell_net'] = "555,444"
474 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
475 hostapd.add_ap(apdev[0], params)
478 dev[0].add_cred_values({ 'imsi': "555444-3332221110", 'eap': "SIM",
479 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
480 # This hits "No valid IMSI available" in build_root_nai()
481 interworking_select(dev[0], bssid, freq="2412")
483 def test_ap_hs20_sim_oom(dev, apdev):
484 """Hotspot 2.0 with simulated SIM and EAP-SIM - OOM"""
485 hlr_auc_gw_available()
486 bssid = apdev[0]['bssid']
487 params = hs20_ap_params()
488 params['hessid'] = bssid
489 params['anqp_3gpp_cell_net'] = "555,444"
490 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
491 hostapd.add_ap(apdev[0], params)
494 dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "SIM",
495 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
496 dev[0].scan_for_bss(bssid, freq=2412)
497 interworking_select(dev[0], bssid, freq="2412")
499 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect_3gpp"):
500 dev[0].request("INTERWORKING_CONNECT " + bssid)
501 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
503 with alloc_fail(dev[0], 1, "=interworking_connect_3gpp"):
504 dev[0].request("INTERWORKING_CONNECT " + bssid)
505 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
507 def test_ap_hs20_aka(dev, apdev):
508 """Hotspot 2.0 with simulated USIM and EAP-AKA"""
509 hlr_auc_gw_available()
510 hs20_simulated_sim(dev[0], apdev[0], "AKA")
512 def test_ap_hs20_aka_prime(dev, apdev):
513 """Hotspot 2.0 with simulated USIM and EAP-AKA'"""
514 hlr_auc_gw_available()
515 hs20_simulated_sim(dev[0], apdev[0], "AKA'")
517 def test_ap_hs20_ext_sim(dev, apdev):
518 """Hotspot 2.0 with external SIM processing"""
519 hlr_auc_gw_available()
520 bssid = apdev[0]['bssid']
521 params = hs20_ap_params()
522 params['hessid'] = bssid
523 params['anqp_3gpp_cell_net'] = "232,01"
524 params['domain_name'] = "wlan.mnc001.mcc232.3gppnetwork.org"
525 hostapd.add_ap(apdev[0], params)
529 dev[0].request("SET external_sim 1")
530 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
531 interworking_select(dev[0], bssid, "home", freq="2412")
532 interworking_ext_sim_connect(dev[0], bssid, "SIM")
533 check_sp_type(dev[0], "home")
535 dev[0].request("SET external_sim 0")
537 def test_ap_hs20_ext_sim_roaming(dev, apdev):
538 """Hotspot 2.0 with external SIM processing in roaming network"""
539 hlr_auc_gw_available()
540 bssid = apdev[0]['bssid']
541 params = hs20_ap_params()
542 params['hessid'] = bssid
543 params['anqp_3gpp_cell_net'] = "244,91;310,026;232,01;234,56"
544 params['domain_name'] = "wlan.mnc091.mcc244.3gppnetwork.org"
545 hostapd.add_ap(apdev[0], params)
549 dev[0].request("SET external_sim 1")
550 dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM" })
551 interworking_select(dev[0], bssid, "roaming", freq="2412")
552 interworking_ext_sim_connect(dev[0], bssid, "SIM")
553 check_sp_type(dev[0], "roaming")
555 dev[0].request("SET external_sim 0")
557 def test_ap_hs20_username(dev, apdev):
558 """Hotspot 2.0 connection in username/password credential"""
559 check_eap_capa(dev[0], "MSCHAPV2")
560 bssid = apdev[0]['bssid']
561 params = hs20_ap_params()
562 params['hessid'] = bssid
563 params['disable_dgaf'] = '1'
564 hostapd.add_ap(apdev[0], params)
567 id = dev[0].add_cred_values({ 'realm': "example.com",
568 'username': "hs20-test",
569 'password': "password",
570 'ca_cert': "auth_serv/ca.pem",
571 'domain': "example.com",
572 'update_identifier': "1234" })
573 interworking_select(dev[0], bssid, "home", freq="2412")
574 interworking_connect(dev[0], bssid, "TTLS")
575 check_sp_type(dev[0], "home")
576 status = dev[0].get_status()
577 if status['pairwise_cipher'] != "CCMP":
578 raise Exception("Unexpected pairwise cipher")
579 if status['hs20'] != "2":
580 raise Exception("Unexpected HS 2.0 support indication")
582 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
583 identity="hs20-test", password="password",
584 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
587 def test_ap_hs20_connect_api(dev, apdev):
588 """Hotspot 2.0 connection with connect API"""
589 check_eap_capa(dev[0], "MSCHAPV2")
590 bssid = apdev[0]['bssid']
591 params = hs20_ap_params()
592 params['hessid'] = bssid
593 params['disable_dgaf'] = '1'
594 hostapd.add_ap(apdev[0], params)
596 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
597 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
599 wpas.flush_scan_cache()
600 id = wpas.add_cred_values({ 'realm': "example.com",
601 'username': "hs20-test",
602 'password': "password",
603 'ca_cert': "auth_serv/ca.pem",
604 'domain': "example.com",
605 'update_identifier': "1234" })
606 interworking_select(wpas, bssid, "home", freq="2412")
607 interworking_connect(wpas, bssid, "TTLS")
608 check_sp_type(wpas, "home")
609 status = wpas.get_status()
610 if status['pairwise_cipher'] != "CCMP":
611 raise Exception("Unexpected pairwise cipher")
612 if status['hs20'] != "2":
613 raise Exception("Unexpected HS 2.0 support indication")
615 def test_ap_hs20_auto_interworking(dev, apdev):
616 """Hotspot 2.0 connection with auto_interworking=1"""
617 check_eap_capa(dev[0], "MSCHAPV2")
618 bssid = apdev[0]['bssid']
619 params = hs20_ap_params()
620 params['hessid'] = bssid
621 params['disable_dgaf'] = '1'
622 hostapd.add_ap(apdev[0], params)
624 dev[0].hs20_enable(auto_interworking=True)
625 id = dev[0].add_cred_values({ 'realm': "example.com",
626 'username': "hs20-test",
627 'password': "password",
628 'ca_cert': "auth_serv/ca.pem",
629 'domain': "example.com",
630 'update_identifier': "1234" })
631 dev[0].request("REASSOCIATE")
632 dev[0].wait_connected(timeout=15)
633 check_sp_type(dev[0], "home")
634 status = dev[0].get_status()
635 if status['pairwise_cipher'] != "CCMP":
636 raise Exception("Unexpected pairwise cipher")
637 if status['hs20'] != "2":
638 raise Exception("Unexpected HS 2.0 support indication")
641 def test_ap_hs20_auto_interworking_no_match(dev, apdev):
642 """Hotspot 2.0 connection with auto_interworking=1 and no matching network"""
643 hapd = hostapd.add_ap(apdev[0], { "ssid": "mismatch" })
645 dev[0].hs20_enable(auto_interworking=True)
646 id = dev[0].connect("mismatch", psk="12345678", scan_freq="2412",
647 only_add_network=True)
648 dev[0].request("ENABLE_NETWORK " + str(id) + " no-connect")
650 id = dev[0].add_cred_values({ 'realm': "example.com",
651 'username': "hs20-test",
652 'password': "password",
653 'ca_cert': "auth_serv/ca.pem",
654 'domain': "example.com",
655 'update_identifier': "1234" })
656 dev[0].request("INTERWORKING_SELECT auto freq=2412")
658 dev[0].dump_monitor()
660 logger.info("start ping")
661 if "PONG" not in dev[0].ctrl.request("PING", timeout=2):
662 raise Exception("PING failed")
663 logger.info("ping done")
667 ev = dev[0].wait_event([ "ANQP fetch completed",
668 "CTRL-EVENT-SCAN-RESULTS" ], timeout=0.05)
671 if "ANQP fetch completed" in ev:
675 if fetch > 2 * scan + 3:
676 raise Exception("Too many ANQP fetch iterations")
677 dev[0].dump_monitor()
678 dev[0].request("DISCONNECT")
681 def test_ap_hs20_auto_interworking_no_cred_match(dev, apdev):
682 """Hotspot 2.0 connection with auto_interworking=1 but no cred match"""
683 bssid = apdev[0]['bssid']
684 params = { "ssid": "test" }
685 hostapd.add_ap(apdev[0], params)
687 dev[0].hs20_enable(auto_interworking=True)
688 dev[0].add_cred_values({ 'realm': "example.com",
689 'username': "hs20-test",
690 'password': "password",
691 'ca_cert': "auth_serv/ca.pem",
692 'domain': "example.com" })
694 id = dev[0].connect("test", psk="12345678", only_add_network=True)
695 dev[0].request("ENABLE_NETWORK %s" % id)
696 logger.info("Verify that scanning continues when there is partial network block match")
697 for i in range(0, 2):
698 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
700 raise Exception("Scan timed out")
701 logger.info("Scan completed")
703 def eap_test(dev, ap, eap_params, method, user):
705 params = hs20_ap_params()
706 params['nai_realm'] = [ "0,example.com," + eap_params ]
707 hostapd.add_ap(ap, params)
710 dev.add_cred_values({ 'realm': "example.com",
711 'ca_cert': "auth_serv/ca.pem",
713 'password': "password" })
714 interworking_select(dev, bssid, freq="2412")
715 interworking_connect(dev, bssid, method)
718 def test_ap_hs20_eap_unknown(dev, apdev):
719 """Hotspot 2.0 connection with unknown EAP method"""
720 bssid = apdev[0]['bssid']
721 params = hs20_ap_params()
722 params['nai_realm'] = "0,example.com,99"
723 hostapd.add_ap(apdev[0], params)
726 dev[0].add_cred_values(default_cred())
727 interworking_select(dev[0], None, no_match=True, freq="2412")
729 def test_ap_hs20_eap_peap_mschapv2(dev, apdev):
730 """Hotspot 2.0 connection with PEAP/MSCHAPV2"""
731 check_eap_capa(dev[0], "MSCHAPV2")
732 eap_test(dev[0], apdev[0], "25[3:26]", "PEAP", "user")
734 def test_ap_hs20_eap_peap_default(dev, apdev):
735 """Hotspot 2.0 connection with PEAP/MSCHAPV2 (as default)"""
736 check_eap_capa(dev[0], "MSCHAPV2")
737 eap_test(dev[0], apdev[0], "25", "PEAP", "user")
739 def test_ap_hs20_eap_peap_gtc(dev, apdev):
740 """Hotspot 2.0 connection with PEAP/GTC"""
741 eap_test(dev[0], apdev[0], "25[3:6]", "PEAP", "user")
744 def test_ap_hs20_eap_peap_unknown(dev, apdev):
745 """Hotspot 2.0 connection with PEAP/unknown"""
746 bssid = apdev[0]['bssid']
747 params = hs20_ap_params()
748 params['nai_realm'] = "0,example.com,25[3:99]"
749 hostapd.add_ap(apdev[0], params)
752 dev[0].add_cred_values(default_cred())
753 interworking_select(dev[0], None, no_match=True, freq="2412")
755 def test_ap_hs20_eap_ttls_chap(dev, apdev):
756 """Hotspot 2.0 connection with TTLS/CHAP"""
757 skip_with_fips(dev[0])
758 eap_test(dev[0], apdev[0], "21[2:2]", "TTLS", "chap user")
760 def test_ap_hs20_eap_ttls_mschap(dev, apdev):
761 """Hotspot 2.0 connection with TTLS/MSCHAP"""
762 skip_with_fips(dev[0])
763 eap_test(dev[0], apdev[0], "21[2:3]", "TTLS", "mschap user")
765 def test_ap_hs20_eap_ttls_eap_mschapv2(dev, apdev):
766 """Hotspot 2.0 connection with TTLS/EAP-MSCHAPv2"""
767 check_eap_capa(dev[0], "MSCHAPV2")
768 eap_test(dev[0], apdev[0], "21[3:26][6:7][99:99]", "TTLS", "user")
771 def test_ap_hs20_eap_ttls_eap_unknown(dev, apdev):
772 """Hotspot 2.0 connection with TTLS/EAP-unknown"""
773 bssid = apdev[0]['bssid']
774 params = hs20_ap_params()
775 params['nai_realm'] = "0,example.com,21[3:99]"
776 hostapd.add_ap(apdev[0], params)
779 dev[0].add_cred_values(default_cred())
780 interworking_select(dev[0], None, no_match=True, freq="2412")
783 def test_ap_hs20_eap_ttls_eap_unsupported(dev, apdev):
784 """Hotspot 2.0 connection with TTLS/EAP-OTP(unsupported)"""
785 bssid = apdev[0]['bssid']
786 params = hs20_ap_params()
787 params['nai_realm'] = "0,example.com,21[3:5]"
788 hostapd.add_ap(apdev[0], params)
791 dev[0].add_cred_values(default_cred())
792 interworking_select(dev[0], None, no_match=True, freq="2412")
795 def test_ap_hs20_eap_ttls_unknown(dev, apdev):
796 """Hotspot 2.0 connection with TTLS/unknown"""
797 bssid = apdev[0]['bssid']
798 params = hs20_ap_params()
799 params['nai_realm'] = "0,example.com,21[2:5]"
800 hostapd.add_ap(apdev[0], params)
803 dev[0].add_cred_values(default_cred())
804 interworking_select(dev[0], None, no_match=True, freq="2412")
806 def test_ap_hs20_eap_fast_mschapv2(dev, apdev):
807 """Hotspot 2.0 connection with FAST/EAP-MSCHAPV2"""
808 check_eap_capa(dev[0], "FAST")
809 eap_test(dev[0], apdev[0], "43[3:26]", "FAST", "user")
811 def test_ap_hs20_eap_fast_gtc(dev, apdev):
812 """Hotspot 2.0 connection with FAST/EAP-GTC"""
813 check_eap_capa(dev[0], "FAST")
814 eap_test(dev[0], apdev[0], "43[3:6]", "FAST", "user")
816 def test_ap_hs20_eap_tls(dev, apdev):
817 """Hotspot 2.0 connection with EAP-TLS"""
818 bssid = apdev[0]['bssid']
819 params = hs20_ap_params()
820 params['nai_realm'] = [ "0,example.com,13[5:6]" ]
821 hostapd.add_ap(apdev[0], params)
824 dev[0].add_cred_values({ 'realm': "example.com",
825 'username': "certificate-user",
826 'ca_cert': "auth_serv/ca.pem",
827 'client_cert': "auth_serv/user.pem",
828 'private_key': "auth_serv/user.key"})
829 interworking_select(dev[0], bssid, freq="2412")
830 interworking_connect(dev[0], bssid, "TLS")
833 def test_ap_hs20_eap_cert_unknown(dev, apdev):
834 """Hotspot 2.0 connection with certificate, but unknown EAP method"""
835 bssid = apdev[0]['bssid']
836 params = hs20_ap_params()
837 params['nai_realm'] = [ "0,example.com,99[5:6]" ]
838 hostapd.add_ap(apdev[0], params)
841 dev[0].add_cred_values({ 'realm': "example.com",
842 'username': "certificate-user",
843 'ca_cert': "auth_serv/ca.pem",
844 'client_cert': "auth_serv/user.pem",
845 'private_key': "auth_serv/user.key"})
846 interworking_select(dev[0], None, no_match=True, freq="2412")
849 def test_ap_hs20_eap_cert_unsupported(dev, apdev):
850 """Hotspot 2.0 connection with certificate, but unsupported TTLS"""
851 bssid = apdev[0]['bssid']
852 params = hs20_ap_params()
853 params['nai_realm'] = [ "0,example.com,21[5:6]" ]
854 hostapd.add_ap(apdev[0], params)
857 dev[0].add_cred_values({ 'realm': "example.com",
858 'username': "certificate-user",
859 'ca_cert': "auth_serv/ca.pem",
860 'client_cert': "auth_serv/user.pem",
861 'private_key': "auth_serv/user.key"})
862 interworking_select(dev[0], None, no_match=True, freq="2412")
865 def test_ap_hs20_eap_invalid_cred(dev, apdev):
866 """Hotspot 2.0 connection with invalid cred configuration"""
867 bssid = apdev[0]['bssid']
868 params = hs20_ap_params()
869 hostapd.add_ap(apdev[0], params)
872 dev[0].add_cred_values({ 'realm': "example.com",
873 'username': "certificate-user",
874 'client_cert': "auth_serv/user.pem" })
875 interworking_select(dev[0], None, no_match=True, freq="2412")
877 def test_ap_hs20_nai_realms(dev, apdev):
878 """Hotspot 2.0 connection and multiple NAI realms and TTLS/PAP"""
879 bssid = apdev[0]['bssid']
880 params = hs20_ap_params()
881 params['hessid'] = bssid
882 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]" ]
883 hostapd.add_ap(apdev[0], params)
886 id = dev[0].add_cred_values({ 'realm': "example.com",
887 'ca_cert': "auth_serv/ca.pem",
888 'username': "pap user",
889 'password': "password",
890 'domain': "example.com" })
891 interworking_select(dev[0], bssid, "home", freq="2412")
892 interworking_connect(dev[0], bssid, "TTLS")
893 check_sp_type(dev[0], "home")
895 def test_ap_hs20_roaming_consortium(dev, apdev):
896 """Hotspot 2.0 connection based on roaming consortium match"""
897 bssid = apdev[0]['bssid']
898 params = hs20_ap_params()
899 params['hessid'] = bssid
900 hostapd.add_ap(apdev[0], params)
903 for consortium in [ "112233", "1020304050", "010203040506", "fedcba" ]:
904 id = dev[0].add_cred_values({ 'username': "user",
905 'password': "password",
906 'domain': "example.com",
907 'ca_cert': "auth_serv/ca.pem",
908 'roaming_consortium': consortium,
910 interworking_select(dev[0], bssid, "home", freq="2412")
911 interworking_connect(dev[0], bssid, "PEAP")
912 check_sp_type(dev[0], "home")
913 dev[0].request("INTERWORKING_SELECT auto freq=2412")
914 ev = dev[0].wait_event(["INTERWORKING-ALREADY-CONNECTED"], timeout=15)
916 raise Exception("Timeout on already-connected event")
917 dev[0].remove_cred(id)
919 def test_ap_hs20_roaming_consortium_invalid(dev, apdev):
920 """Hotspot 2.0 connection and invalid roaming consortium ANQP-element"""
921 bssid = apdev[0]['bssid']
922 params = hs20_ap_params()
923 params['hessid'] = bssid
924 # Override Roaming Consortium ANQP-element with an incorrectly encoded
926 params['anqp_elem'] = "261:04fedcba"
927 hostapd.add_ap(apdev[0], params)
930 id = dev[0].add_cred_values({ 'username': "user",
931 'password': "password",
932 'domain': "example.com",
933 'ca_cert': "auth_serv/ca.pem",
934 'roaming_consortium': "fedcba",
936 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
938 def test_ap_hs20_roaming_consortium_element(dev, apdev):
939 """Hotspot 2.0 connection and invalid roaming consortium element"""
940 bssid = apdev[0]['bssid']
941 params = hs20_ap_params()
942 params['hessid'] = bssid
943 del params['roaming_consortium']
944 params['vendor_elements'] = '6f00'
945 hapd = hostapd.add_ap(apdev[0], params)
948 dev[0].scan_for_bss(bssid, freq="2412")
949 id = dev[0].add_cred_values({ 'username': "user",
950 'password': "password",
951 'domain': "example.com",
952 'ca_cert': "auth_serv/ca.pem",
953 'roaming_consortium': "112233",
955 interworking_select(dev[0], bssid, freq="2412", no_match=True)
957 hapd.set('vendor_elements', '6f020001')
958 if "OK" not in hapd.request("UPDATE_BEACON"):
959 raise Exception("UPDATE_BEACON failed")
960 dev[0].request("BSS_FLUSH 0")
961 dev[0].scan_for_bss(bssid, freq="2412", force_scan=True)
962 interworking_select(dev[0], bssid, freq="2412", no_match=True)
964 def test_ap_hs20_roaming_consortium_constraints(dev, apdev):
965 """Hotspot 2.0 connection and roaming consortium constraints"""
966 bssid = apdev[0]['bssid']
967 params = hs20_ap_params()
968 params['hessid'] = bssid
969 params['bss_load_test'] = "12:200:20000"
970 hostapd.add_ap(apdev[0], params)
974 vals = { 'username': "user",
975 'password': "password",
976 'domain': "example.com",
977 'ca_cert': "auth_serv/ca.pem",
978 'roaming_consortium': "fedcba",
981 vals2['required_roaming_consortium'] = "223344"
982 id = dev[0].add_cred_values(vals2)
983 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
984 dev[0].remove_cred(id)
987 vals2['min_dl_bandwidth_home'] = "65500"
988 id = dev[0].add_cred_values(vals2)
989 dev[0].request("INTERWORKING_SELECT freq=2412")
990 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
992 raise Exception("No AP found")
993 if "below_min_backhaul=1" not in ev:
994 raise Exception("below_min_backhaul not reported")
995 dev[0].remove_cred(id)
998 vals2['max_bss_load'] = "100"
999 id = dev[0].add_cred_values(vals2)
1000 dev[0].request("INTERWORKING_SELECT freq=2412")
1001 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1003 raise Exception("No AP found")
1004 if "over_max_bss_load=1" not in ev:
1005 raise Exception("over_max_bss_load not reported")
1006 dev[0].remove_cred(id)
1009 vals2['req_conn_capab'] = "6:1234"
1010 vals2['domain'] = 'example.org'
1011 id = dev[0].add_cred_values(vals2)
1013 dev[0].request("INTERWORKING_SELECT freq=2412")
1014 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1016 raise Exception("No AP found")
1017 if "conn_capab_missing=1" not in ev:
1018 raise Exception("conn_capab_missing not reported")
1019 dev[0].remove_cred(id)
1021 values = default_cred()
1022 values['roaming_consortium'] = "fedcba"
1023 id3 = dev[0].add_cred_values(values)
1026 vals2['roaming_consortium'] = "fedcba"
1027 vals2['priority'] = "2"
1028 id = dev[0].add_cred_values(vals2)
1030 values = default_cred()
1031 values['roaming_consortium'] = "fedcba"
1032 id2 = dev[0].add_cred_values(values)
1034 dev[0].request("INTERWORKING_SELECT freq=2412")
1035 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1037 raise Exception("No AP found")
1038 dev[0].remove_cred(id)
1039 dev[0].remove_cred(id2)
1040 dev[0].remove_cred(id3)
1042 def test_ap_hs20_3gpp_constraints(dev, apdev):
1043 """Hotspot 2.0 connection and 3GPP credential constraints"""
1044 bssid = apdev[0]['bssid']
1045 params = hs20_ap_params()
1046 params['hessid'] = bssid
1047 params['anqp_3gpp_cell_net'] = "555,444"
1048 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
1049 params['bss_load_test'] = "12:200:20000"
1050 hapd = hostapd.add_ap(apdev[0], params)
1052 dev[0].hs20_enable()
1054 vals = { 'imsi': "555444-333222111",
1056 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
1058 vals2['required_roaming_consortium'] = "223344"
1059 id = dev[0].add_cred_values(vals2)
1060 interworking_select(dev[0], bssid, "home", freq="2412", no_match=True)
1061 dev[0].remove_cred(id)
1064 vals2['min_dl_bandwidth_home'] = "65500"
1065 id = dev[0].add_cred_values(vals2)
1066 dev[0].request("INTERWORKING_SELECT freq=2412")
1067 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1069 raise Exception("No AP found")
1070 if "below_min_backhaul=1" not in ev:
1071 raise Exception("below_min_backhaul not reported")
1072 dev[0].remove_cred(id)
1075 vals2['max_bss_load'] = "100"
1076 id = dev[0].add_cred_values(vals2)
1077 dev[0].request("INTERWORKING_SELECT freq=2412")
1078 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1080 raise Exception("No AP found")
1081 if "over_max_bss_load=1" not in ev:
1082 raise Exception("over_max_bss_load not reported")
1083 dev[0].remove_cred(id)
1085 values = default_cred()
1086 values['roaming_consortium'] = "fedcba"
1087 id3 = dev[0].add_cred_values(values)
1090 vals2['roaming_consortium'] = "fedcba"
1091 vals2['priority'] = "2"
1092 id = dev[0].add_cred_values(vals2)
1094 values = default_cred()
1095 values['roaming_consortium'] = "fedcba"
1096 id2 = dev[0].add_cred_values(values)
1098 dev[0].request("INTERWORKING_SELECT freq=2412")
1099 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1101 raise Exception("No AP found")
1102 dev[0].remove_cred(id)
1103 dev[0].remove_cred(id2)
1104 dev[0].remove_cred(id3)
1107 params = hs20_ap_params()
1108 params['hessid'] = bssid
1109 params['anqp_3gpp_cell_net'] = "555,444"
1110 params['bss_load_test'] = "12:200:20000"
1111 hapd = hostapd.add_ap(apdev[0], params)
1113 vals2['req_conn_capab'] = "6:1234"
1114 id = dev[0].add_cred_values(vals2)
1115 dev[0].request("INTERWORKING_SELECT freq=2412")
1116 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1118 raise Exception("No AP found")
1119 if "conn_capab_missing=1" not in ev:
1120 raise Exception("conn_capab_missing not reported")
1121 dev[0].remove_cred(id)
1123 def test_ap_hs20_connect_no_full_match(dev, apdev):
1124 """Hotspot 2.0 connection and no full match"""
1125 bssid = apdev[0]['bssid']
1126 params = hs20_ap_params()
1127 params['hessid'] = bssid
1128 params['anqp_3gpp_cell_net'] = "555,444"
1129 hostapd.add_ap(apdev[0], params)
1131 dev[0].hs20_enable()
1133 vals = { 'username': "user",
1134 'password': "password",
1135 'domain': "example.com",
1136 'ca_cert': "auth_serv/ca.pem",
1137 'roaming_consortium': "fedcba",
1139 'min_dl_bandwidth_home': "65500" }
1140 id = dev[0].add_cred_values(vals)
1141 dev[0].request("INTERWORKING_SELECT freq=2412")
1142 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1144 raise Exception("No AP found")
1145 if "below_min_backhaul=1" not in ev:
1146 raise Exception("below_min_backhaul not reported")
1147 interworking_connect(dev[0], bssid, "TTLS")
1148 dev[0].remove_cred(id)
1149 dev[0].wait_disconnected()
1151 vals = { 'imsi': "555444-333222111", 'eap': "SIM",
1152 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1153 'min_dl_bandwidth_roaming': "65500" }
1154 id = dev[0].add_cred_values(vals)
1155 dev[0].request("INTERWORKING_SELECT freq=2412")
1156 ev = dev[0].wait_event(["INTERWORKING-AP"], timeout=15)
1158 raise Exception("No AP found")
1159 if "below_min_backhaul=1" not in ev:
1160 raise Exception("below_min_backhaul not reported")
1161 interworking_connect(dev[0], bssid, "SIM")
1162 dev[0].remove_cred(id)
1163 dev[0].wait_disconnected()
1165 def test_ap_hs20_username_roaming(dev, apdev):
1166 """Hotspot 2.0 connection in username/password credential (roaming)"""
1167 check_eap_capa(dev[0], "MSCHAPV2")
1168 bssid = apdev[0]['bssid']
1169 params = hs20_ap_params()
1170 params['nai_realm'] = [ "0,example.com,13[5:6],21[2:4][5:7]",
1171 "0,roaming.example.com,21[2:4][5:7]",
1172 "0,another.example.com" ]
1173 params['domain_name'] = "another.example.com"
1174 params['hessid'] = bssid
1175 hostapd.add_ap(apdev[0], params)
1177 dev[0].hs20_enable()
1178 id = dev[0].add_cred_values({ 'realm': "roaming.example.com",
1179 'username': "hs20-test",
1180 'password': "password",
1181 'ca_cert': "auth_serv/ca.pem",
1182 'domain': "example.com" })
1183 interworking_select(dev[0], bssid, "roaming", freq="2412")
1184 interworking_connect(dev[0], bssid, "TTLS")
1185 check_sp_type(dev[0], "roaming")
1187 def test_ap_hs20_username_unknown(dev, apdev):
1188 """Hotspot 2.0 connection in username/password credential (no domain in cred)"""
1189 check_eap_capa(dev[0], "MSCHAPV2")
1190 bssid = apdev[0]['bssid']
1191 params = hs20_ap_params()
1192 params['hessid'] = bssid
1193 hostapd.add_ap(apdev[0], params)
1195 dev[0].hs20_enable()
1196 id = dev[0].add_cred_values({ 'realm': "example.com",
1197 'ca_cert': "auth_serv/ca.pem",
1198 'username': "hs20-test",
1199 'password': "password" })
1200 interworking_select(dev[0], bssid, "unknown", freq="2412")
1201 interworking_connect(dev[0], bssid, "TTLS")
1202 check_sp_type(dev[0], "unknown")
1204 def test_ap_hs20_username_unknown2(dev, apdev):
1205 """Hotspot 2.0 connection in username/password credential (no domain advertized)"""
1206 check_eap_capa(dev[0], "MSCHAPV2")
1207 bssid = apdev[0]['bssid']
1208 params = hs20_ap_params()
1209 params['hessid'] = bssid
1210 del params['domain_name']
1211 hostapd.add_ap(apdev[0], params)
1213 dev[0].hs20_enable()
1214 id = dev[0].add_cred_values({ 'realm': "example.com",
1215 'ca_cert': "auth_serv/ca.pem",
1216 'username': "hs20-test",
1217 'password': "password",
1218 'domain': "example.com" })
1219 interworking_select(dev[0], bssid, "unknown", freq="2412")
1220 interworking_connect(dev[0], bssid, "TTLS")
1221 check_sp_type(dev[0], "unknown")
1223 def test_ap_hs20_gas_while_associated(dev, apdev):
1224 """Hotspot 2.0 connection with GAS query while associated"""
1225 check_eap_capa(dev[0], "MSCHAPV2")
1226 bssid = apdev[0]['bssid']
1227 params = hs20_ap_params()
1228 params['hessid'] = bssid
1229 hostapd.add_ap(apdev[0], params)
1231 dev[0].hs20_enable()
1232 id = dev[0].add_cred_values({ 'realm': "example.com",
1233 'ca_cert': "auth_serv/ca.pem",
1234 'username': "hs20-test",
1235 'password': "password",
1236 'domain': "example.com" })
1237 interworking_select(dev[0], bssid, "home", freq="2412")
1238 interworking_connect(dev[0], bssid, "TTLS")
1240 logger.info("Verifying GAS query while associated")
1241 dev[0].request("FETCH_ANQP")
1242 for i in range(0, 6):
1243 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1245 raise Exception("Operation timed out")
1247 def test_ap_hs20_gas_with_another_ap_while_associated(dev, apdev):
1248 """GAS query with another AP while associated"""
1249 check_eap_capa(dev[0], "MSCHAPV2")
1250 bssid = apdev[0]['bssid']
1251 params = hs20_ap_params()
1252 params['hessid'] = bssid
1253 hostapd.add_ap(apdev[0], params)
1255 bssid2 = apdev[1]['bssid']
1256 params = hs20_ap_params()
1257 params['hessid'] = bssid2
1258 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1259 hostapd.add_ap(apdev[1], params)
1261 dev[0].hs20_enable()
1262 id = dev[0].add_cred_values({ 'realm': "example.com",
1263 'ca_cert': "auth_serv/ca.pem",
1264 'username': "hs20-test",
1265 'password': "password",
1266 'domain': "example.com" })
1267 interworking_select(dev[0], bssid, "home", freq="2412")
1268 interworking_connect(dev[0], bssid, "TTLS")
1269 dev[0].dump_monitor()
1271 logger.info("Verifying GAS query with same AP while associated")
1272 dev[0].request("ANQP_GET " + bssid + " 263")
1273 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1275 raise Exception("ANQP operation timed out")
1276 dev[0].dump_monitor()
1278 logger.info("Verifying GAS query with another AP while associated")
1279 dev[0].scan_for_bss(bssid2, 2412)
1280 dev[0].request("ANQP_GET " + bssid2 + " 263")
1281 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1283 raise Exception("ANQP operation timed out")
1285 def test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
1286 """Hotspot 2.0 connection with GAS query while associated and using PMF"""
1287 check_eap_capa(dev[0], "MSCHAPV2")
1289 _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev)
1291 dev[0].request("SET pmf 0")
1293 def _test_ap_hs20_gas_while_associated_with_pmf(dev, apdev):
1294 bssid = apdev[0]['bssid']
1295 params = hs20_ap_params()
1296 params['hessid'] = bssid
1297 hostapd.add_ap(apdev[0], params)
1299 bssid2 = apdev[1]['bssid']
1300 params = hs20_ap_params()
1301 params['hessid'] = bssid2
1302 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1303 hostapd.add_ap(apdev[1], params)
1305 dev[0].hs20_enable()
1306 dev[0].request("SET pmf 2")
1307 id = dev[0].add_cred_values({ 'realm': "example.com",
1308 'ca_cert': "auth_serv/ca.pem",
1309 'username': "hs20-test",
1310 'password': "password",
1311 'domain': "example.com" })
1312 interworking_select(dev[0], bssid, "home", freq="2412")
1313 interworking_connect(dev[0], bssid, "TTLS")
1315 logger.info("Verifying GAS query while associated")
1316 dev[0].request("FETCH_ANQP")
1317 for i in range(0, 2 * 6):
1318 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1320 raise Exception("Operation timed out")
1322 def test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev):
1323 """GAS query with another AP while associated and using PMF"""
1324 check_eap_capa(dev[0], "MSCHAPV2")
1326 _test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev)
1328 dev[0].request("SET pmf 0")
1330 def _test_ap_hs20_gas_with_another_ap_while_using_pmf(dev, apdev):
1331 bssid = apdev[0]['bssid']
1332 params = hs20_ap_params()
1333 params['hessid'] = bssid
1334 hostapd.add_ap(apdev[0], params)
1336 bssid2 = apdev[1]['bssid']
1337 params = hs20_ap_params()
1338 params['hessid'] = bssid2
1339 params['nai_realm'] = [ "0,no-match.example.org,13[5:6],21[2:4][5:7]" ]
1340 hostapd.add_ap(apdev[1], params)
1342 dev[0].hs20_enable()
1343 dev[0].request("SET pmf 2")
1344 id = dev[0].add_cred_values({ 'realm': "example.com",
1345 'ca_cert': "auth_serv/ca.pem",
1346 'username': "hs20-test",
1347 'password': "password",
1348 'domain': "example.com" })
1349 interworking_select(dev[0], bssid, "home", freq="2412")
1350 interworking_connect(dev[0], bssid, "TTLS")
1351 dev[0].dump_monitor()
1353 logger.info("Verifying GAS query with same AP while associated")
1354 dev[0].request("ANQP_GET " + bssid + " 263")
1355 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1357 raise Exception("ANQP operation timed out")
1358 dev[0].dump_monitor()
1360 logger.info("Verifying GAS query with another AP while associated")
1361 dev[0].scan_for_bss(bssid2, 2412)
1362 dev[0].request("ANQP_GET " + bssid2 + " 263")
1363 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1365 raise Exception("ANQP operation timed out")
1367 def test_ap_hs20_gas_frag_while_associated(dev, apdev):
1368 """Hotspot 2.0 connection with fragmented GAS query while associated"""
1369 check_eap_capa(dev[0], "MSCHAPV2")
1370 bssid = apdev[0]['bssid']
1371 params = hs20_ap_params()
1372 params['hessid'] = bssid
1373 hapd = hostapd.add_ap(apdev[0], params)
1374 hapd.set("gas_frag_limit", "50")
1376 dev[0].hs20_enable()
1377 id = dev[0].add_cred_values({ 'realm': "example.com",
1378 'ca_cert': "auth_serv/ca.pem",
1379 'username': "hs20-test",
1380 'password': "password",
1381 'domain': "example.com" })
1382 interworking_select(dev[0], bssid, "home", freq="2412")
1383 interworking_connect(dev[0], bssid, "TTLS")
1385 logger.info("Verifying GAS query while associated")
1386 dev[0].request("FETCH_ANQP")
1387 for i in range(0, 6):
1388 ev = dev[0].wait_event(["RX-ANQP"], timeout=5)
1390 raise Exception("Operation timed out")
1392 def test_ap_hs20_multiple_connects(dev, apdev):
1393 """Hotspot 2.0 connection through multiple network selections"""
1394 check_eap_capa(dev[0], "MSCHAPV2")
1395 bssid = apdev[0]['bssid']
1396 params = hs20_ap_params()
1397 params['hessid'] = bssid
1398 hostapd.add_ap(apdev[0], params)
1400 dev[0].hs20_enable()
1401 values = { 'realm': "example.com",
1402 'ca_cert': "auth_serv/ca.pem",
1403 'username': "hs20-test",
1404 'password': "password",
1405 'domain': "example.com" }
1406 id = dev[0].add_cred_values(values)
1408 dev[0].scan_for_bss(bssid, freq="2412")
1410 for i in range(0, 3):
1411 logger.info("Starting Interworking network selection")
1412 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1414 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1415 "INTERWORKING-ALREADY-CONNECTED",
1416 "CTRL-EVENT-CONNECTED"], timeout=15)
1418 raise Exception("Connection timed out")
1419 if "INTERWORKING-NO-MATCH" in ev:
1420 raise Exception("Matching AP not found")
1421 if "CTRL-EVENT-CONNECTED" in ev:
1423 if i == 2 and "INTERWORKING-ALREADY-CONNECTED" in ev:
1426 dev[0].request("DISCONNECT")
1427 dev[0].dump_monitor()
1429 networks = dev[0].list_networks()
1430 if len(networks) > 1:
1431 raise Exception("Duplicated network block detected")
1433 def test_ap_hs20_disallow_aps(dev, apdev):
1434 """Hotspot 2.0 connection and disallow_aps"""
1435 bssid = apdev[0]['bssid']
1436 params = hs20_ap_params()
1437 params['hessid'] = bssid
1438 hostapd.add_ap(apdev[0], params)
1440 dev[0].hs20_enable()
1441 values = { 'realm': "example.com",
1442 'ca_cert': "auth_serv/ca.pem",
1443 'username': "hs20-test",
1444 'password': "password",
1445 'domain': "example.com" }
1446 id = dev[0].add_cred_values(values)
1448 dev[0].scan_for_bss(bssid, freq="2412")
1450 logger.info("Verify disallow_aps bssid")
1451 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1452 dev[0].request("INTERWORKING_SELECT auto")
1453 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1455 raise Exception("Network selection timed out")
1456 dev[0].dump_monitor()
1458 logger.info("Verify disallow_aps ssid")
1459 dev[0].request("SET disallow_aps ssid 746573742d68733230")
1460 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1461 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=15)
1463 raise Exception("Network selection timed out")
1464 dev[0].dump_monitor()
1466 logger.info("Verify disallow_aps clear")
1467 dev[0].request("SET disallow_aps ")
1468 interworking_select(dev[0], bssid, "home", freq="2412")
1470 dev[0].request("SET disallow_aps bssid " + bssid.translate(None, ':'))
1471 ret = dev[0].request("INTERWORKING_CONNECT " + bssid)
1472 if "FAIL" not in ret:
1473 raise Exception("INTERWORKING_CONNECT to disallowed BSS not rejected")
1475 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT foo"):
1476 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1477 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT 00:11:22:33:44:55"):
1478 raise Exception("Invalid INTERWORKING_CONNECT not rejected")
1480 def policy_test(dev, ap, values, only_one=True):
1483 logger.info("Verify network selection to AP " + ap['ifname'])
1485 dev.scan_for_bss(bssid, freq="2412")
1487 logger.info("Verify network selection")
1490 id = dev.add_cred_values(values)
1491 dev.request("INTERWORKING_SELECT auto freq=2412")
1494 ev = dev.wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH",
1495 "INTERWORKING-BLACKLISTED",
1496 "INTERWORKING-SELECTED"], timeout=15)
1498 raise Exception("Network selection timed out")
1500 if "INTERWORKING-NO-MATCH" in ev:
1501 raise Exception("Matching AP not found")
1502 if bssid and only_one and "INTERWORKING-AP" in ev and bssid not in ev:
1503 raise Exception("Unexpected AP claimed acceptable")
1504 if "INTERWORKING-SELECTED" in ev:
1505 if bssid and bssid not in ev:
1506 raise Exception("Selected incorrect BSS")
1509 ev = dev.wait_connected(timeout=15)
1510 if bssid and bssid not in ev:
1511 raise Exception("Connected to incorrect BSS")
1513 conn_bssid = dev.get_status_field("bssid")
1514 if bssid and conn_bssid != bssid:
1515 raise Exception("bssid information points to incorrect BSS")
1521 def default_cred(domain=None, user="hs20-test"):
1522 cred = { 'realm': "example.com",
1523 'ca_cert': "auth_serv/ca.pem",
1525 'password': "password" }
1527 cred['domain'] = domain
1530 def test_ap_hs20_prefer_home(dev, apdev):
1531 """Hotspot 2.0 required roaming consortium"""
1532 check_eap_capa(dev[0], "MSCHAPV2")
1533 params = hs20_ap_params()
1534 params['domain_name'] = "example.org"
1535 hostapd.add_ap(apdev[0], params)
1537 params = hs20_ap_params()
1538 params['ssid'] = "test-hs20-other"
1539 params['domain_name'] = "example.com"
1540 hostapd.add_ap(apdev[1], params)
1542 values = default_cred()
1543 values['domain'] = "example.com"
1544 policy_test(dev[0], apdev[1], values, only_one=False)
1545 values['domain'] = "example.org"
1546 policy_test(dev[0], apdev[0], values, only_one=False)
1548 def test_ap_hs20_req_roaming_consortium(dev, apdev):
1549 """Hotspot 2.0 required roaming consortium"""
1550 check_eap_capa(dev[0], "MSCHAPV2")
1551 params = hs20_ap_params()
1552 hostapd.add_ap(apdev[0], params)
1554 params = hs20_ap_params()
1555 params['ssid'] = "test-hs20-other"
1556 params['roaming_consortium'] = [ "223344" ]
1557 hostapd.add_ap(apdev[1], params)
1559 values = default_cred()
1560 values['required_roaming_consortium'] = "223344"
1561 policy_test(dev[0], apdev[1], values)
1562 values['required_roaming_consortium'] = "112233"
1563 policy_test(dev[0], apdev[0], values)
1565 id = dev[0].add_cred()
1566 dev[0].set_cred(id, "required_roaming_consortium", "112233")
1567 dev[0].set_cred(id, "required_roaming_consortium", "112233445566778899aabbccddeeff")
1569 for val in [ "", "1", "11", "1122", "1122334", "112233445566778899aabbccddeeff00" ]:
1570 if "FAIL" not in dev[0].request('SET_CRED {} required_roaming_consortium {}'.format(id, val)):
1571 raise Exception("Invalid roaming consortium value accepted: " + val)
1573 def test_ap_hs20_req_roaming_consortium_no_match(dev, apdev):
1574 """Hotspot 2.0 required roaming consortium and no match"""
1575 check_eap_capa(dev[0], "MSCHAPV2")
1576 params = hs20_ap_params()
1577 del params['roaming_consortium']
1578 hostapd.add_ap(apdev[0], params)
1580 params = hs20_ap_params()
1581 params['ssid'] = "test-hs20-other"
1582 params['roaming_consortium'] = [ "223345" ]
1583 hostapd.add_ap(apdev[1], params)
1585 values = default_cred()
1586 values['required_roaming_consortium'] = "223344"
1587 dev[0].hs20_enable()
1588 id = dev[0].add_cred_values(values)
1589 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1590 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=10)
1592 raise Exception("INTERWORKING-NO-MATCH not reported")
1594 def test_ap_hs20_excluded_ssid(dev, apdev):
1595 """Hotspot 2.0 exclusion based on SSID"""
1596 check_eap_capa(dev[0], "MSCHAPV2")
1597 params = hs20_ap_params()
1598 params['roaming_consortium'] = [ "223344" ]
1599 params['anqp_3gpp_cell_net'] = "555,444"
1600 hostapd.add_ap(apdev[0], params)
1602 params = hs20_ap_params()
1603 params['ssid'] = "test-hs20-other"
1604 params['roaming_consortium'] = [ "223344" ]
1605 params['anqp_3gpp_cell_net'] = "555,444"
1606 hostapd.add_ap(apdev[1], params)
1608 values = default_cred()
1609 values['excluded_ssid'] = "test-hs20"
1610 events = policy_test(dev[0], apdev[1], values)
1611 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1613 raise Exception("Excluded network not reported")
1614 values['excluded_ssid'] = "test-hs20-other"
1615 events = policy_test(dev[0], apdev[0], values)
1616 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[1]['bssid'] in e]
1618 raise Exception("Excluded network not reported")
1620 values = default_cred()
1621 values['roaming_consortium'] = "223344"
1622 values['eap'] = "TTLS"
1623 values['phase2'] = "auth=MSCHAPV2"
1624 values['excluded_ssid'] = "test-hs20"
1625 events = policy_test(dev[0], apdev[1], values)
1626 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1628 raise Exception("Excluded network not reported")
1630 values = { 'imsi': "555444-333222111", 'eap': "SIM",
1631 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
1632 'excluded_ssid': "test-hs20" }
1633 events = policy_test(dev[0], apdev[1], values)
1634 ev = [e for e in events if "INTERWORKING-BLACKLISTED " + apdev[0]['bssid'] in e]
1636 raise Exception("Excluded network not reported")
1638 def test_ap_hs20_roam_to_higher_prio(dev, apdev):
1639 """Hotspot 2.0 and roaming from current to higher priority network"""
1640 check_eap_capa(dev[0], "MSCHAPV2")
1641 bssid = apdev[0]['bssid']
1642 params = hs20_ap_params(ssid="test-hs20-visited")
1643 params['domain_name'] = "visited.example.org"
1644 hostapd.add_ap(apdev[0], params)
1646 dev[0].hs20_enable()
1647 id = dev[0].add_cred_values({ 'realm': "example.com",
1648 'ca_cert': "auth_serv/ca.pem",
1649 'username': "hs20-test",
1650 'password': "password",
1651 'domain': "example.com" })
1652 logger.info("Connect to the only network option")
1653 interworking_select(dev[0], bssid, "roaming", freq="2412")
1654 dev[0].dump_monitor()
1655 interworking_connect(dev[0], bssid, "TTLS")
1657 logger.info("Start another AP (home operator) and reconnect")
1658 bssid2 = apdev[1]['bssid']
1659 params = hs20_ap_params(ssid="test-hs20-home")
1660 params['domain_name'] = "example.com"
1661 hostapd.add_ap(apdev[1], params)
1663 dev[0].scan_for_bss(bssid2, freq="2412", force_scan=True)
1664 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1665 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH",
1666 "INTERWORKING-ALREADY-CONNECTED",
1667 "CTRL-EVENT-CONNECTED"], timeout=15)
1669 raise Exception("Connection timed out")
1670 if "INTERWORKING-NO-MATCH" in ev:
1671 raise Exception("Matching AP not found")
1672 if "INTERWORKING-ALREADY-CONNECTED" in ev:
1673 raise Exception("Unexpected AP selected")
1674 if bssid2 not in ev:
1675 raise Exception("Unexpected BSSID after reconnection")
1677 def test_ap_hs20_domain_suffix_match_full(dev, apdev):
1678 """Hotspot 2.0 and domain_suffix_match"""
1679 check_domain_match_full(dev[0])
1680 check_eap_capa(dev[0], "MSCHAPV2")
1681 bssid = apdev[0]['bssid']
1682 params = hs20_ap_params()
1683 hostapd.add_ap(apdev[0], params)
1685 dev[0].hs20_enable()
1686 id = dev[0].add_cred_values({ 'realm': "example.com",
1687 'username': "hs20-test",
1688 'password': "password",
1689 'ca_cert': "auth_serv/ca.pem",
1690 'domain': "example.com",
1691 'domain_suffix_match': "server.w1.fi" })
1692 interworking_select(dev[0], bssid, "home", freq="2412")
1693 dev[0].dump_monitor()
1694 interworking_connect(dev[0], bssid, "TTLS")
1695 dev[0].request("REMOVE_NETWORK all")
1696 dev[0].dump_monitor()
1698 dev[0].set_cred_quoted(id, "domain_suffix_match", "no-match.example.com")
1699 interworking_select(dev[0], bssid, "home", freq="2412")
1700 dev[0].dump_monitor()
1701 dev[0].request("INTERWORKING_CONNECT " + bssid)
1702 ev = dev[0].wait_event(["CTRL-EVENT-EAP-TLS-CERT-ERROR"])
1704 raise Exception("TLS certificate error not reported")
1705 if "Domain suffix mismatch" not in ev:
1706 raise Exception("Domain suffix mismatch not reported")
1708 def test_ap_hs20_domain_suffix_match(dev, apdev):
1709 """Hotspot 2.0 and domain_suffix_match"""
1710 check_eap_capa(dev[0], "MSCHAPV2")
1711 check_domain_match_full(dev[0])
1712 bssid = apdev[0]['bssid']
1713 params = hs20_ap_params()
1714 hostapd.add_ap(apdev[0], params)
1716 dev[0].hs20_enable()
1717 id = dev[0].add_cred_values({ 'realm': "example.com",
1718 'username': "hs20-test",
1719 'password': "password",
1720 'ca_cert': "auth_serv/ca.pem",
1721 'domain': "example.com",
1722 'domain_suffix_match': "w1.fi" })
1723 interworking_select(dev[0], bssid, "home", freq="2412")
1724 dev[0].dump_monitor()
1725 interworking_connect(dev[0], bssid, "TTLS")
1727 def test_ap_hs20_roaming_partner_preference(dev, apdev):
1728 """Hotspot 2.0 and roaming partner preference"""
1729 check_eap_capa(dev[0], "MSCHAPV2")
1730 params = hs20_ap_params()
1731 params['domain_name'] = "roaming.example.org"
1732 hostapd.add_ap(apdev[0], params)
1734 params = hs20_ap_params()
1735 params['ssid'] = "test-hs20-other"
1736 params['domain_name'] = "roaming.example.net"
1737 hostapd.add_ap(apdev[1], params)
1739 logger.info("Verify default vs. specified preference")
1740 values = default_cred()
1741 values['roaming_partner'] = "roaming.example.net,1,127,*"
1742 policy_test(dev[0], apdev[1], values, only_one=False)
1743 values['roaming_partner'] = "roaming.example.net,1,129,*"
1744 policy_test(dev[0], apdev[0], values, only_one=False)
1746 logger.info("Verify partial FQDN match")
1747 values['roaming_partner'] = "example.net,0,0,*"
1748 policy_test(dev[0], apdev[1], values, only_one=False)
1749 values['roaming_partner'] = "example.net,0,255,*"
1750 policy_test(dev[0], apdev[0], values, only_one=False)
1752 def test_ap_hs20_max_bss_load(dev, apdev):
1753 """Hotspot 2.0 and maximum BSS load"""
1754 check_eap_capa(dev[0], "MSCHAPV2")
1755 params = hs20_ap_params()
1756 params['bss_load_test'] = "12:200:20000"
1757 hostapd.add_ap(apdev[0], params)
1759 params = hs20_ap_params()
1760 params['ssid'] = "test-hs20-other"
1761 params['bss_load_test'] = "5:20:10000"
1762 hostapd.add_ap(apdev[1], params)
1764 logger.info("Verify maximum BSS load constraint")
1765 values = default_cred()
1766 values['domain'] = "example.com"
1767 values['max_bss_load'] = "100"
1768 events = policy_test(dev[0], apdev[1], values, only_one=False)
1770 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1771 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1772 raise Exception("Maximum BSS Load case not noticed")
1773 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1774 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1775 raise Exception("Maximum BSS Load case reported incorrectly")
1777 logger.info("Verify maximum BSS load does not prevent connection")
1778 values['max_bss_load'] = "1"
1779 events = policy_test(dev[0], None, values)
1781 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1782 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1783 raise Exception("Maximum BSS Load case not noticed")
1784 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1785 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1786 raise Exception("Maximum BSS Load case not noticed")
1788 def test_ap_hs20_max_bss_load2(dev, apdev):
1789 """Hotspot 2.0 and maximum BSS load with one AP not advertising"""
1790 check_eap_capa(dev[0], "MSCHAPV2")
1791 params = hs20_ap_params()
1792 params['bss_load_test'] = "12:200:20000"
1793 hostapd.add_ap(apdev[0], params)
1795 params = hs20_ap_params()
1796 params['ssid'] = "test-hs20-other"
1797 hostapd.add_ap(apdev[1], params)
1799 logger.info("Verify maximum BSS load constraint with AP advertisement")
1800 values = default_cred()
1801 values['domain'] = "example.com"
1802 values['max_bss_load'] = "100"
1803 events = policy_test(dev[0], apdev[1], values, only_one=False)
1805 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1806 if len(ev) != 1 or "over_max_bss_load=1" not in ev[0]:
1807 raise Exception("Maximum BSS Load case not noticed")
1808 ev = [e for e in events if "INTERWORKING-AP " + apdev[1]['bssid'] in e]
1809 if len(ev) != 1 or "over_max_bss_load=1" in ev[0]:
1810 raise Exception("Maximum BSS Load case reported incorrectly")
1812 def test_ap_hs20_max_bss_load_roaming(dev, apdev):
1813 """Hotspot 2.0 and maximum BSS load (roaming)"""
1814 check_eap_capa(dev[0], "MSCHAPV2")
1815 params = hs20_ap_params()
1816 params['bss_load_test'] = "12:200:20000"
1817 hostapd.add_ap(apdev[0], params)
1819 values = default_cred()
1820 values['domain'] = "roaming.example.com"
1821 values['max_bss_load'] = "100"
1822 events = policy_test(dev[0], apdev[0], values, only_one=True)
1823 ev = [e for e in events if "INTERWORKING-AP " + apdev[0]['bssid'] in e]
1825 raise Exception("No INTERWORKING-AP event")
1826 if "over_max_bss_load=1" in ev[0]:
1827 raise Exception("Maximum BSS Load reported for roaming")
1829 def test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1830 """Hotspot 2.0 multi-cred sp_priority"""
1831 check_eap_capa(dev[0], "MSCHAPV2")
1833 _test_ap_hs20_multi_cred_sp_prio(dev, apdev)
1835 dev[0].request("SET external_sim 0")
1837 def _test_ap_hs20_multi_cred_sp_prio(dev, apdev):
1838 hlr_auc_gw_available()
1839 bssid = apdev[0]['bssid']
1840 params = hs20_ap_params()
1841 params['hessid'] = bssid
1842 del params['domain_name']
1843 params['anqp_3gpp_cell_net'] = "232,01"
1844 hostapd.add_ap(apdev[0], params)
1846 dev[0].hs20_enable()
1847 dev[0].scan_for_bss(bssid, freq="2412")
1848 dev[0].request("SET external_sim 1")
1849 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1850 'provisioning_sp': "example.com",
1851 'sp_priority' :"1" })
1852 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1853 'ca_cert': "auth_serv/ca.pem",
1854 'username': "hs20-test",
1855 'password': "password",
1856 'domain': "example.com",
1857 'provisioning_sp': "example.com",
1858 'sp_priority': "2" })
1859 dev[0].dump_monitor()
1860 dev[0].scan_for_bss(bssid, freq="2412")
1861 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1862 interworking_ext_sim_auth(dev[0], "SIM")
1863 check_sp_type(dev[0], "unknown")
1864 dev[0].request("REMOVE_NETWORK all")
1866 dev[0].set_cred(id1, "sp_priority", "2")
1867 dev[0].set_cred(id2, "sp_priority", "1")
1868 dev[0].dump_monitor()
1869 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1870 interworking_auth(dev[0], "TTLS")
1871 check_sp_type(dev[0], "unknown")
1873 def test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1874 """Hotspot 2.0 multi-cred sp_priority with two BSSes"""
1875 check_eap_capa(dev[0], "MSCHAPV2")
1877 _test_ap_hs20_multi_cred_sp_prio2(dev, apdev)
1879 dev[0].request("SET external_sim 0")
1881 def _test_ap_hs20_multi_cred_sp_prio2(dev, apdev):
1882 hlr_auc_gw_available()
1883 bssid = apdev[0]['bssid']
1884 params = hs20_ap_params()
1885 params['hessid'] = bssid
1886 del params['nai_realm']
1887 del params['domain_name']
1888 params['anqp_3gpp_cell_net'] = "232,01"
1889 hostapd.add_ap(apdev[0], params)
1891 bssid2 = apdev[1]['bssid']
1892 params = hs20_ap_params()
1893 params['ssid'] = "test-hs20-other"
1894 params['hessid'] = bssid2
1895 del params['domain_name']
1896 del params['anqp_3gpp_cell_net']
1897 hostapd.add_ap(apdev[1], params)
1899 dev[0].hs20_enable()
1900 dev[0].request("SET external_sim 1")
1901 id1 = dev[0].add_cred_values({ 'imsi': "23201-0000000000", 'eap': "SIM",
1902 'provisioning_sp': "example.com",
1903 'sp_priority': "1" })
1904 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1905 'ca_cert': "auth_serv/ca.pem",
1906 'username': "hs20-test",
1907 'password': "password",
1908 'domain': "example.com",
1909 'provisioning_sp': "example.com",
1910 'sp_priority': "2" })
1911 dev[0].dump_monitor()
1912 dev[0].scan_for_bss(bssid, freq="2412")
1913 dev[0].scan_for_bss(bssid2, freq="2412")
1914 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1915 interworking_ext_sim_auth(dev[0], "SIM")
1916 check_sp_type(dev[0], "unknown")
1917 conn_bssid = dev[0].get_status_field("bssid")
1918 if conn_bssid != bssid:
1919 raise Exception("Connected to incorrect BSS")
1920 dev[0].request("REMOVE_NETWORK all")
1922 dev[0].set_cred(id1, "sp_priority", "2")
1923 dev[0].set_cred(id2, "sp_priority", "1")
1924 dev[0].dump_monitor()
1925 dev[0].request("INTERWORKING_SELECT auto freq=2412")
1926 interworking_auth(dev[0], "TTLS")
1927 check_sp_type(dev[0], "unknown")
1928 conn_bssid = dev[0].get_status_field("bssid")
1929 if conn_bssid != bssid2:
1930 raise Exception("Connected to incorrect BSS")
1932 def test_ap_hs20_multi_cred_sp_prio_same(dev, apdev):
1933 """Hotspot 2.0 multi-cred and same sp_priority"""
1934 check_eap_capa(dev[0], "MSCHAPV2")
1935 hlr_auc_gw_available()
1936 bssid = apdev[0]['bssid']
1937 params = hs20_ap_params()
1938 params['hessid'] = bssid
1939 del params['domain_name']
1940 params['anqp_3gpp_cell_net'] = "232,01"
1941 hostapd.add_ap(apdev[0], params)
1943 dev[0].hs20_enable()
1944 dev[0].scan_for_bss(bssid, freq="2412")
1945 id1 = dev[0].add_cred_values({ 'realm': "example.com",
1946 'ca_cert': "auth_serv/ca.pem",
1947 'username': "hs20-test",
1948 'password': "password",
1949 'domain': "domain1.example.com",
1950 'provisioning_sp': "example.com",
1951 'sp_priority': "1" })
1952 id2 = dev[0].add_cred_values({ 'realm': "example.com",
1953 'ca_cert': "auth_serv/ca.pem",
1954 'username': "hs20-test",
1955 'password': "password",
1956 'domain': "domain2.example.com",
1957 'provisioning_sp': "example.com",
1958 'sp_priority': "1" })
1959 dev[0].dump_monitor()
1960 dev[0].scan_for_bss(bssid, freq="2412")
1961 check_auto_select(dev[0], bssid)
1963 def check_conn_capab_selection(dev, type, missing):
1964 dev.request("INTERWORKING_SELECT freq=2412")
1965 ev = dev.wait_event(["INTERWORKING-AP"])
1967 raise Exception("Network selection timed out")
1968 if "type=" + type not in ev:
1969 raise Exception("Unexpected network type")
1970 if missing and "conn_capab_missing=1" not in ev:
1971 raise Exception("conn_capab_missing not reported")
1972 if not missing and "conn_capab_missing=1" in ev:
1973 raise Exception("conn_capab_missing reported unexpectedly")
1975 def conn_capab_cred(domain=None, req_conn_capab=None):
1976 cred = default_cred(domain=domain)
1978 cred['req_conn_capab'] = req_conn_capab
1981 def test_ap_hs20_req_conn_capab(dev, apdev):
1982 """Hotspot 2.0 network selection with req_conn_capab"""
1983 check_eap_capa(dev[0], "MSCHAPV2")
1984 bssid = apdev[0]['bssid']
1985 params = hs20_ap_params()
1986 hostapd.add_ap(apdev[0], params)
1988 dev[0].hs20_enable()
1989 dev[0].scan_for_bss(bssid, freq="2412")
1990 logger.info("Not used in home network")
1991 values = conn_capab_cred(domain="example.com", req_conn_capab="6:1234")
1992 id = dev[0].add_cred_values(values)
1993 check_conn_capab_selection(dev[0], "home", False)
1995 logger.info("Used in roaming network")
1996 dev[0].remove_cred(id)
1997 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
1998 id = dev[0].add_cred_values(values)
1999 check_conn_capab_selection(dev[0], "roaming", True)
2001 logger.info("Verify that req_conn_capab does not prevent connection if no other network is available")
2002 check_auto_select(dev[0], bssid)
2004 logger.info("Additional req_conn_capab checks")
2006 dev[0].remove_cred(id)
2007 values = conn_capab_cred(domain="example.org", req_conn_capab="1:0")
2008 id = dev[0].add_cred_values(values)
2009 check_conn_capab_selection(dev[0], "roaming", True)
2011 dev[0].remove_cred(id)
2012 values = conn_capab_cred(domain="example.org", req_conn_capab="17:5060")
2013 id = dev[0].add_cred_values(values)
2014 check_conn_capab_selection(dev[0], "roaming", True)
2016 bssid2 = apdev[1]['bssid']
2017 params = hs20_ap_params(ssid="test-hs20b")
2018 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
2019 hostapd.add_ap(apdev[1], params)
2021 dev[0].remove_cred(id)
2022 values = conn_capab_cred(domain="example.org", req_conn_capab="50")
2023 id = dev[0].add_cred_values(values)
2024 dev[0].set_cred(id, "req_conn_capab", "6:22")
2025 dev[0].scan_for_bss(bssid2, freq="2412")
2026 dev[0].request("INTERWORKING_SELECT freq=2412")
2027 for i in range(0, 2):
2028 ev = dev[0].wait_event(["INTERWORKING-AP"])
2030 raise Exception("Network selection timed out")
2031 if bssid in ev and "conn_capab_missing=1" not in ev:
2032 raise Exception("Missing protocol connection capability not reported")
2033 if bssid2 in ev and "conn_capab_missing=1" in ev:
2034 raise Exception("Protocol connection capability not reported correctly")
2036 def test_ap_hs20_req_conn_capab2(dev, apdev):
2037 """Hotspot 2.0 network selection with req_conn_capab (not present)"""
2038 check_eap_capa(dev[0], "MSCHAPV2")
2039 bssid = apdev[0]['bssid']
2040 params = hs20_ap_params()
2041 del params['hs20_conn_capab']
2042 hostapd.add_ap(apdev[0], params)
2044 dev[0].hs20_enable()
2045 dev[0].scan_for_bss(bssid, freq="2412")
2046 values = conn_capab_cred(domain="example.org", req_conn_capab="6:1234")
2047 id = dev[0].add_cred_values(values)
2048 check_conn_capab_selection(dev[0], "roaming", False)
2050 def test_ap_hs20_req_conn_capab_and_roaming_partner_preference(dev, apdev):
2051 """Hotspot 2.0 and req_conn_capab with roaming partner preference"""
2052 check_eap_capa(dev[0], "MSCHAPV2")
2053 bssid = apdev[0]['bssid']
2054 params = hs20_ap_params()
2055 params['domain_name'] = "roaming.example.org"
2056 params['hs20_conn_capab'] = [ "1:0:2", "6:22:1", "17:5060:0", "50:0:1" ]
2057 hostapd.add_ap(apdev[0], params)
2059 bssid2 = apdev[1]['bssid']
2060 params = hs20_ap_params(ssid="test-hs20-b")
2061 params['domain_name'] = "roaming.example.net"
2062 hostapd.add_ap(apdev[1], params)
2064 values = default_cred()
2065 values['roaming_partner'] = "roaming.example.net,1,127,*"
2066 id = dev[0].add_cred_values(values)
2067 check_auto_select(dev[0], bssid2)
2069 dev[0].set_cred(id, "req_conn_capab", "50")
2070 check_auto_select(dev[0], bssid)
2072 dev[0].remove_cred(id)
2073 id = dev[0].add_cred_values(values)
2074 dev[0].set_cred(id, "req_conn_capab", "51")
2075 check_auto_select(dev[0], bssid2)
2077 def check_bandwidth_selection(dev, type, below):
2078 dev.request("INTERWORKING_SELECT freq=2412")
2079 ev = dev.wait_event(["INTERWORKING-AP"])
2081 raise Exception("Network selection timed out")
2082 logger.debug("BSS entries:\n" + dev.request("BSS RANGE=ALL"))
2083 if "type=" + type not in ev:
2084 raise Exception("Unexpected network type")
2085 if below and "below_min_backhaul=1" not in ev:
2086 raise Exception("below_min_backhaul not reported")
2087 if not below and "below_min_backhaul=1" in ev:
2088 raise Exception("below_min_backhaul reported unexpectedly")
2090 def bw_cred(domain=None, dl_home=None, ul_home=None, dl_roaming=None, ul_roaming=None):
2091 cred = default_cred(domain=domain)
2093 cred['min_dl_bandwidth_home'] = str(dl_home)
2095 cred['min_ul_bandwidth_home'] = str(ul_home)
2097 cred['min_dl_bandwidth_roaming'] = str(dl_roaming)
2099 cred['min_ul_bandwidth_roaming'] = str(ul_roaming)
2102 def test_ap_hs20_min_bandwidth_home(dev, apdev):
2103 """Hotspot 2.0 network selection with min bandwidth (home)"""
2104 check_eap_capa(dev[0], "MSCHAPV2")
2105 bssid = apdev[0]['bssid']
2106 params = hs20_ap_params()
2107 hostapd.add_ap(apdev[0], params)
2109 dev[0].hs20_enable()
2110 dev[0].scan_for_bss(bssid, freq="2412")
2111 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2112 id = dev[0].add_cred_values(values)
2113 check_bandwidth_selection(dev[0], "home", False)
2114 dev[0].remove_cred(id)
2116 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
2117 id = dev[0].add_cred_values(values)
2118 check_bandwidth_selection(dev[0], "home", True)
2119 dev[0].remove_cred(id)
2121 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
2122 id = dev[0].add_cred_values(values)
2123 check_bandwidth_selection(dev[0], "home", True)
2124 dev[0].remove_cred(id)
2126 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
2127 id = dev[0].add_cred_values(values)
2128 check_bandwidth_selection(dev[0], "home", True)
2129 check_auto_select(dev[0], bssid)
2131 bssid2 = apdev[1]['bssid']
2132 params = hs20_ap_params(ssid="test-hs20-b")
2133 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2134 hostapd.add_ap(apdev[1], params)
2136 check_auto_select(dev[0], bssid2)
2138 def test_ap_hs20_min_bandwidth_home2(dev, apdev):
2139 """Hotspot 2.0 network selection with min bandwidth - special cases"""
2140 check_eap_capa(dev[0], "MSCHAPV2")
2141 bssid = apdev[0]['bssid']
2142 params = hs20_ap_params()
2143 hapd = hostapd.add_ap(apdev[0], params)
2145 dev[0].hs20_enable()
2146 dev[0].scan_for_bss(bssid, freq="2412")
2147 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2148 id = dev[0].add_cred_values(values)
2149 check_bandwidth_selection(dev[0], "home", False)
2151 logger.info("WAN link at capacity")
2152 hapd.set('hs20_wan_metrics', "09:8000:1000:80:240:3000")
2153 check_bandwidth_selection(dev[0], "home", True)
2155 logger.info("Downlink/Uplink Load was not measured")
2156 hapd.set('hs20_wan_metrics', "01:8000:1000:80:240:0")
2157 check_bandwidth_selection(dev[0], "home", False)
2159 logger.info("Uplink and Downlink max values")
2160 hapd.set('hs20_wan_metrics', "01:4294967295:4294967295:80:240:3000")
2161 check_bandwidth_selection(dev[0], "home", False)
2163 dev[0].remove_cred(id)
2165 def test_ap_hs20_min_bandwidth_home_hidden_ssid_in_scan_res(dev, apdev):
2166 """Hotspot 2.0 network selection with min bandwidth (home) while hidden SSID is included in scan results"""
2167 check_eap_capa(dev[0], "MSCHAPV2")
2168 bssid = apdev[0]['bssid']
2170 hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret',
2171 "ignore_broadcast_ssid": "1" })
2172 dev[0].scan_for_bss(bssid, freq=2412)
2174 hapd_global = hostapd.HostapdGlobal(apdev[0])
2176 hapd_global.remove(apdev[0]['ifname'])
2178 params = hs20_ap_params()
2179 hostapd.add_ap(apdev[0], params)
2181 dev[0].hs20_enable()
2182 dev[0].scan_for_bss(bssid, freq="2412")
2183 values = bw_cred(domain="example.com", dl_home=5490, ul_home=58)
2184 id = dev[0].add_cred_values(values)
2185 check_bandwidth_selection(dev[0], "home", False)
2186 dev[0].remove_cred(id)
2188 values = bw_cred(domain="example.com", dl_home=5491, ul_home=58)
2189 id = dev[0].add_cred_values(values)
2190 check_bandwidth_selection(dev[0], "home", True)
2191 dev[0].remove_cred(id)
2193 values = bw_cred(domain="example.com", dl_home=5490, ul_home=59)
2194 id = dev[0].add_cred_values(values)
2195 check_bandwidth_selection(dev[0], "home", True)
2196 dev[0].remove_cred(id)
2198 values = bw_cred(domain="example.com", dl_home=5491, ul_home=59)
2199 id = dev[0].add_cred_values(values)
2200 check_bandwidth_selection(dev[0], "home", True)
2201 check_auto_select(dev[0], bssid)
2203 bssid2 = apdev[1]['bssid']
2204 params = hs20_ap_params(ssid="test-hs20-b")
2205 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2206 hostapd.add_ap(apdev[1], params)
2208 check_auto_select(dev[0], bssid2)
2210 dev[0].flush_scan_cache()
2212 def test_ap_hs20_min_bandwidth_roaming(dev, apdev):
2213 """Hotspot 2.0 network selection with min bandwidth (roaming)"""
2214 check_eap_capa(dev[0], "MSCHAPV2")
2215 bssid = apdev[0]['bssid']
2216 params = hs20_ap_params()
2217 hostapd.add_ap(apdev[0], params)
2219 dev[0].hs20_enable()
2220 dev[0].scan_for_bss(bssid, freq="2412")
2221 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=58)
2222 id = dev[0].add_cred_values(values)
2223 check_bandwidth_selection(dev[0], "roaming", False)
2224 dev[0].remove_cred(id)
2226 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=58)
2227 id = dev[0].add_cred_values(values)
2228 check_bandwidth_selection(dev[0], "roaming", True)
2229 dev[0].remove_cred(id)
2231 values = bw_cred(domain="example.org", dl_roaming=5490, ul_roaming=59)
2232 id = dev[0].add_cred_values(values)
2233 check_bandwidth_selection(dev[0], "roaming", True)
2234 dev[0].remove_cred(id)
2236 values = bw_cred(domain="example.org", dl_roaming=5491, ul_roaming=59)
2237 id = dev[0].add_cred_values(values)
2238 check_bandwidth_selection(dev[0], "roaming", True)
2239 check_auto_select(dev[0], bssid)
2241 bssid2 = apdev[1]['bssid']
2242 params = hs20_ap_params(ssid="test-hs20-b")
2243 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2244 hostapd.add_ap(apdev[1], params)
2246 check_auto_select(dev[0], bssid2)
2248 def test_ap_hs20_min_bandwidth_and_roaming_partner_preference(dev, apdev):
2249 """Hotspot 2.0 and minimum bandwidth with roaming partner preference"""
2250 check_eap_capa(dev[0], "MSCHAPV2")
2251 bssid = apdev[0]['bssid']
2252 params = hs20_ap_params()
2253 params['domain_name'] = "roaming.example.org"
2254 params['hs20_wan_metrics'] = "01:8000:1000:1:1:3000"
2255 hostapd.add_ap(apdev[0], params)
2257 bssid2 = apdev[1]['bssid']
2258 params = hs20_ap_params(ssid="test-hs20-b")
2259 params['domain_name'] = "roaming.example.net"
2260 hostapd.add_ap(apdev[1], params)
2262 values = default_cred()
2263 values['roaming_partner'] = "roaming.example.net,1,127,*"
2264 id = dev[0].add_cred_values(values)
2265 check_auto_select(dev[0], bssid2)
2267 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "6000")
2268 check_auto_select(dev[0], bssid)
2270 dev[0].set_cred(id, "min_dl_bandwidth_roaming", "10000")
2271 check_auto_select(dev[0], bssid2)
2273 def test_ap_hs20_min_bandwidth_no_wan_metrics(dev, apdev):
2274 """Hotspot 2.0 network selection with min bandwidth but no WAN Metrics"""
2275 bssid = apdev[0]['bssid']
2276 params = hs20_ap_params()
2277 del params['hs20_wan_metrics']
2278 hostapd.add_ap(apdev[0], params)
2280 dev[0].hs20_enable()
2281 dev[0].scan_for_bss(bssid, freq="2412")
2282 values = bw_cred(domain="example.com", dl_home=10000, ul_home=10000,
2283 dl_roaming=10000, ul_roaming=10000)
2284 dev[0].add_cred_values(values)
2285 check_bandwidth_selection(dev[0], "home", False)
2287 def test_ap_hs20_deauth_req_ess(dev, apdev):
2288 """Hotspot 2.0 connection and deauthentication request for ESS"""
2289 check_eap_capa(dev[0], "MSCHAPV2")
2291 _test_ap_hs20_deauth_req_ess(dev, apdev)
2293 dev[0].request("SET pmf 0")
2295 def _test_ap_hs20_deauth_req_ess(dev, apdev):
2296 dev[0].request("SET pmf 2")
2297 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2298 dev[0].dump_monitor()
2299 addr = dev[0].p2p_interface_addr()
2300 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2301 hapd.request("HS20_DEAUTH_REQ " + addr + " 1 120 http://example.com/")
2302 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
2304 raise Exception("Timeout on deauth imminent notice")
2305 if "1 120 http://example.com/" not in ev:
2306 raise Exception("Unexpected deauth imminent notice: " + ev)
2307 hapd.request("DEAUTHENTICATE " + addr)
2308 dev[0].wait_disconnected(timeout=10)
2309 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
2310 raise Exception("Network not marked temporarily disabled")
2311 ev = dev[0].wait_event(["SME: Trying to authenticate",
2312 "Trying to associate",
2313 "CTRL-EVENT-CONNECTED"], timeout=5)
2315 raise Exception("Unexpected connection attempt")
2317 def test_ap_hs20_deauth_req_bss(dev, apdev):
2318 """Hotspot 2.0 connection and deauthentication request for BSS"""
2319 check_eap_capa(dev[0], "MSCHAPV2")
2321 _test_ap_hs20_deauth_req_bss(dev, apdev)
2323 dev[0].request("SET pmf 0")
2325 def _test_ap_hs20_deauth_req_bss(dev, apdev):
2326 dev[0].request("SET pmf 2")
2327 eap_test(dev[0], apdev[0], "21[3:26]", "TTLS", "user")
2328 dev[0].dump_monitor()
2329 addr = dev[0].p2p_interface_addr()
2330 hapd = hostapd.Hostapd(apdev[0]['ifname'])
2331 hapd.request("HS20_DEAUTH_REQ " + addr + " 0 120 http://example.com/")
2332 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"])
2334 raise Exception("Timeout on deauth imminent notice")
2335 if "0 120 http://example.com/" not in ev:
2336 raise Exception("Unexpected deauth imminent notice: " + ev)
2337 hapd.request("DEAUTHENTICATE " + addr + " reason=4")
2338 ev = dev[0].wait_disconnected(timeout=10)
2339 if "reason=4" not in ev:
2340 raise Exception("Unexpected disconnection reason")
2341 if "[TEMP-DISABLED]" not in dev[0].list_networks()[0]['flags']:
2342 raise Exception("Network not marked temporarily disabled")
2343 ev = dev[0].wait_event(["SME: Trying to authenticate",
2344 "Trying to associate",
2345 "CTRL-EVENT-CONNECTED"], timeout=5)
2347 raise Exception("Unexpected connection attempt")
2349 def test_ap_hs20_deauth_req_from_radius(dev, apdev):
2350 """Hotspot 2.0 connection and deauthentication request from RADIUS"""
2351 check_eap_capa(dev[0], "MSCHAPV2")
2353 _test_ap_hs20_deauth_req_from_radius(dev, apdev)
2355 dev[0].request("SET pmf 0")
2357 def _test_ap_hs20_deauth_req_from_radius(dev, apdev):
2358 bssid = apdev[0]['bssid']
2359 params = hs20_ap_params()
2360 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2361 params['hs20_deauth_req_timeout'] = "2"
2362 hostapd.add_ap(apdev[0], params)
2364 dev[0].request("SET pmf 2")
2365 dev[0].hs20_enable()
2366 dev[0].add_cred_values({ 'realm': "example.com",
2367 'username': "hs20-deauth-test",
2368 'password': "password" })
2369 interworking_select(dev[0], bssid, freq="2412")
2370 interworking_connect(dev[0], bssid, "TTLS")
2371 ev = dev[0].wait_event(["HS20-DEAUTH-IMMINENT-NOTICE"], timeout=5)
2373 raise Exception("Timeout on deauth imminent notice")
2374 if " 1 100" not in ev:
2375 raise Exception("Unexpected deauth imminent contents")
2376 dev[0].wait_disconnected(timeout=3)
2378 def test_ap_hs20_remediation_required(dev, apdev):
2379 """Hotspot 2.0 connection and remediation required from RADIUS"""
2380 check_eap_capa(dev[0], "MSCHAPV2")
2382 _test_ap_hs20_remediation_required(dev, apdev)
2384 dev[0].request("SET pmf 0")
2386 def _test_ap_hs20_remediation_required(dev, apdev):
2387 bssid = apdev[0]['bssid']
2388 params = hs20_ap_params()
2389 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2390 hostapd.add_ap(apdev[0], params)
2392 dev[0].request("SET pmf 1")
2393 dev[0].hs20_enable()
2394 dev[0].add_cred_values({ 'realm': "example.com",
2395 'username': "hs20-subrem-test",
2396 'password': "password" })
2397 interworking_select(dev[0], bssid, freq="2412")
2398 interworking_connect(dev[0], bssid, "TTLS")
2399 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2401 raise Exception("Timeout on subscription remediation notice")
2402 if " 1 https://example.com/" not in ev:
2403 raise Exception("Unexpected subscription remediation event contents")
2405 def test_ap_hs20_remediation_required_ctrl(dev, apdev):
2406 """Hotspot 2.0 connection and subrem from ctrl_iface"""
2407 check_eap_capa(dev[0], "MSCHAPV2")
2409 _test_ap_hs20_remediation_required_ctrl(dev, apdev)
2411 dev[0].request("SET pmf 0")
2413 def _test_ap_hs20_remediation_required_ctrl(dev, apdev):
2414 bssid = apdev[0]['bssid']
2415 addr = dev[0].own_addr()
2416 params = hs20_ap_params()
2417 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2418 hapd = hostapd.add_ap(apdev[0], params)
2420 dev[0].request("SET pmf 1")
2421 dev[0].hs20_enable()
2422 dev[0].add_cred_values(default_cred())
2423 interworking_select(dev[0], bssid, freq="2412")
2424 interworking_connect(dev[0], bssid, "TTLS")
2426 hapd.request("HS20_WNM_NOTIF " + addr + " https://example.com/")
2427 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2429 raise Exception("Timeout on subscription remediation notice")
2430 if " 1 https://example.com/" not in ev:
2431 raise Exception("Unexpected subscription remediation event contents")
2433 hapd.request("HS20_WNM_NOTIF " + addr)
2434 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
2436 raise Exception("Timeout on subscription remediation notice")
2437 if not ev.endswith("HS20-SUBSCRIPTION-REMEDIATION "):
2438 raise Exception("Unexpected subscription remediation event contents: " + ev)
2440 if "FAIL" not in hapd.request("HS20_WNM_NOTIF "):
2441 raise Exception("Unexpected HS20_WNM_NOTIF success")
2442 if "FAIL" not in hapd.request("HS20_WNM_NOTIF foo"):
2443 raise Exception("Unexpected HS20_WNM_NOTIF success")
2444 if "FAIL" not in hapd.request("HS20_WNM_NOTIF " + addr + " https://12345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678923456789842345678456783456712345678927.very.long.example.com/"):
2445 raise Exception("Unexpected HS20_WNM_NOTIF success")
2447 def test_ap_hs20_session_info(dev, apdev):
2448 """Hotspot 2.0 connection and session information from RADIUS"""
2449 check_eap_capa(dev[0], "MSCHAPV2")
2451 _test_ap_hs20_session_info(dev, apdev)
2453 dev[0].request("SET pmf 0")
2455 def _test_ap_hs20_session_info(dev, apdev):
2456 bssid = apdev[0]['bssid']
2457 params = hs20_ap_params()
2458 params['nai_realm'] = [ "0,example.com,21[2:4]" ]
2459 hostapd.add_ap(apdev[0], params)
2461 dev[0].request("SET pmf 1")
2462 dev[0].hs20_enable()
2463 dev[0].add_cred_values({ 'realm': "example.com",
2464 'username': "hs20-session-info-test",
2465 'password': "password" })
2466 interworking_select(dev[0], bssid, freq="2412")
2467 interworking_connect(dev[0], bssid, "TTLS")
2468 ev = dev[0].wait_event(["ESS-DISASSOC-IMMINENT"], timeout=10)
2470 raise Exception("Timeout on ESS disassociation imminent notice")
2471 if " 1 59904 https://example.com/" not in ev:
2472 raise Exception("Unexpected ESS disassociation imminent event contents")
2473 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"])
2475 raise Exception("Scan not started")
2476 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=30)
2478 raise Exception("Scan not completed")
2480 def test_ap_hs20_osen(dev, apdev):
2481 """Hotspot 2.0 OSEN connection"""
2482 params = { 'ssid': "osen",
2484 'auth_server_addr': "127.0.0.1",
2485 'auth_server_port': "1812",
2486 'auth_server_shared_secret': "radius" }
2487 hostapd.add_ap(apdev[0], params)
2489 dev[1].connect("osen", key_mgmt="NONE", scan_freq="2412",
2491 dev[2].connect("osen", key_mgmt="NONE", wep_key0='"hello"',
2492 scan_freq="2412", wait_connect=False)
2493 dev[0].flush_scan_cache()
2494 dev[0].connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
2495 group="GTK_NOT_USED",
2496 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
2497 ca_cert="auth_serv/ca.pem",
2499 res = dev[0].get_bss(apdev[0]['bssid'])['flags']
2500 if "[OSEN-OSEN-CCMP]" not in res:
2501 raise Exception("OSEN not reported in BSS")
2503 raise Exception("WEP reported in BSS")
2504 res = dev[0].request("SCAN_RESULTS")
2505 if "[OSEN-OSEN-CCMP]" not in res:
2506 raise Exception("OSEN not reported in SCAN_RESULTS")
2508 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
2509 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
2510 wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
2511 group="GTK_NOT_USED",
2512 eap="WFA-UNAUTH-TLS", identity="osen@example.com",
2513 ca_cert="auth_serv/ca.pem",
2515 wpas.request("DISCONNECT")
2517 def test_ap_hs20_network_preference(dev, apdev):
2518 """Hotspot 2.0 network selection with preferred home network"""
2519 check_eap_capa(dev[0], "MSCHAPV2")
2520 bssid = apdev[0]['bssid']
2521 params = hs20_ap_params()
2522 hostapd.add_ap(apdev[0], params)
2524 dev[0].hs20_enable()
2525 values = { 'realm': "example.com",
2526 'username': "hs20-test",
2527 'password': "password",
2528 'domain': "example.com" }
2529 dev[0].add_cred_values(values)
2531 id = dev[0].add_network()
2532 dev[0].set_network_quoted(id, "ssid", "home")
2533 dev[0].set_network_quoted(id, "psk", "12345678")
2534 dev[0].set_network(id, "priority", "1")
2535 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2537 dev[0].scan_for_bss(bssid, freq="2412")
2538 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2539 ev = dev[0].wait_connected(timeout=15)
2541 raise Exception("Unexpected network selected")
2543 bssid2 = apdev[1]['bssid']
2544 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
2545 hostapd.add_ap(apdev[1], params)
2547 dev[0].scan_for_bss(bssid2, freq="2412")
2548 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2549 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2550 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2552 raise Exception("Connection timed out")
2553 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2554 raise Exception("No roam to higher priority network")
2555 if bssid2 not in ev:
2556 raise Exception("Unexpected network selected")
2558 def test_ap_hs20_network_preference2(dev, apdev):
2559 """Hotspot 2.0 network selection with preferred credential"""
2560 check_eap_capa(dev[0], "MSCHAPV2")
2561 bssid2 = apdev[1]['bssid']
2562 params = hostapd.wpa2_params(ssid="home", passphrase="12345678")
2563 hostapd.add_ap(apdev[1], params)
2565 dev[0].hs20_enable()
2566 values = { 'realm': "example.com",
2567 'username': "hs20-test",
2568 'password': "password",
2569 'domain': "example.com",
2571 dev[0].add_cred_values(values)
2573 id = dev[0].add_network()
2574 dev[0].set_network_quoted(id, "ssid", "home")
2575 dev[0].set_network_quoted(id, "psk", "12345678")
2576 dev[0].request("ENABLE_NETWORK %s no-connect" % id)
2578 dev[0].scan_for_bss(bssid2, freq="2412")
2579 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2580 ev = dev[0].wait_connected(timeout=15)
2581 if bssid2 not in ev:
2582 raise Exception("Unexpected network selected")
2584 bssid = apdev[0]['bssid']
2585 params = hs20_ap_params()
2586 hostapd.add_ap(apdev[0], params)
2588 dev[0].scan_for_bss(bssid, freq="2412")
2589 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2590 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2591 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2593 raise Exception("Connection timed out")
2594 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2595 raise Exception("No roam to higher priority network")
2597 raise Exception("Unexpected network selected")
2599 def test_ap_hs20_network_preference3(dev, apdev):
2600 """Hotspot 2.0 network selection with two credential (one preferred)"""
2601 check_eap_capa(dev[0], "MSCHAPV2")
2602 bssid = apdev[0]['bssid']
2603 params = hs20_ap_params()
2604 hostapd.add_ap(apdev[0], params)
2606 bssid2 = apdev[1]['bssid']
2607 params = hs20_ap_params(ssid="test-hs20b")
2608 params['nai_realm'] = "0,example.org,13[5:6],21[2:4][5:7]"
2609 hostapd.add_ap(apdev[1], params)
2611 dev[0].hs20_enable()
2612 values = { 'realm': "example.com",
2613 'username': "hs20-test",
2614 'password': "password",
2616 dev[0].add_cred_values(values)
2617 values = { 'realm': "example.org",
2618 'username': "hs20-test",
2619 'password': "password" }
2620 id = dev[0].add_cred_values(values)
2622 dev[0].scan_for_bss(bssid, freq="2412")
2623 dev[0].scan_for_bss(bssid2, freq="2412")
2624 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2625 ev = dev[0].wait_connected(timeout=15)
2627 raise Exception("Unexpected network selected")
2629 dev[0].set_cred(id, "priority", "2")
2630 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2631 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2632 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2634 raise Exception("Connection timed out")
2635 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2636 raise Exception("No roam to higher priority network")
2637 if bssid2 not in ev:
2638 raise Exception("Unexpected network selected")
2640 def test_ap_hs20_network_preference4(dev, apdev):
2641 """Hotspot 2.0 network selection with username vs. SIM credential"""
2642 check_eap_capa(dev[0], "MSCHAPV2")
2643 bssid = apdev[0]['bssid']
2644 params = hs20_ap_params()
2645 hostapd.add_ap(apdev[0], params)
2647 bssid2 = apdev[1]['bssid']
2648 params = hs20_ap_params(ssid="test-hs20b")
2649 params['hessid'] = bssid2
2650 params['anqp_3gpp_cell_net'] = "555,444"
2651 params['domain_name'] = "wlan.mnc444.mcc555.3gppnetwork.org"
2652 hostapd.add_ap(apdev[1], params)
2654 dev[0].hs20_enable()
2655 values = { 'realm': "example.com",
2656 'username': "hs20-test",
2657 'password': "password",
2659 dev[0].add_cred_values(values)
2660 values = { 'imsi': "555444-333222111",
2662 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123" }
2663 id = dev[0].add_cred_values(values)
2665 dev[0].scan_for_bss(bssid, freq="2412")
2666 dev[0].scan_for_bss(bssid2, freq="2412")
2667 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2668 ev = dev[0].wait_connected(timeout=15)
2670 raise Exception("Unexpected network selected")
2672 dev[0].set_cred(id, "priority", "2")
2673 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2674 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED",
2675 "INTERWORKING-ALREADY-CONNECTED" ], timeout=15)
2677 raise Exception("Connection timed out")
2678 if "INTERWORKING-ALREADY-CONNECTED" in ev:
2679 raise Exception("No roam to higher priority network")
2680 if bssid2 not in ev:
2681 raise Exception("Unexpected network selected")
2683 def test_ap_hs20_interworking_select_blocking_scan(dev, apdev):
2684 """Ongoing INTERWORKING_SELECT blocking SCAN"""
2685 check_eap_capa(dev[0], "MSCHAPV2")
2686 bssid = apdev[0]['bssid']
2687 params = hs20_ap_params()
2688 hostapd.add_ap(apdev[0], params)
2690 dev[0].hs20_enable()
2691 values = { 'realm': "example.com",
2692 'username': "hs20-test",
2693 'password': "password",
2694 'domain': "example.com" }
2695 dev[0].add_cred_values(values)
2697 dev[0].scan_for_bss(bssid, freq="2412")
2698 dev[0].request("INTERWORKING_SELECT auto freq=2412")
2699 if "FAIL-BUSY" not in dev[0].request("SCAN"):
2700 raise Exception("Unexpected SCAN command result")
2701 dev[0].wait_connected(timeout=15)
2703 def test_ap_hs20_fetch_osu(dev, apdev):
2704 """Hotspot 2.0 OSU provider and icon fetch"""
2705 bssid = apdev[0]['bssid']
2706 params = hs20_ap_params()
2707 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2708 params['osu_ssid'] = '"HS 2.0 OSU open"'
2709 params['osu_method_list'] = "1"
2710 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2711 params['osu_icon'] = "w1fi_logo"
2712 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2713 params['osu_server_uri'] = "https://example.com/osu/"
2714 hostapd.add_ap(apdev[0], params)
2716 bssid2 = apdev[1]['bssid']
2717 params = hs20_ap_params(ssid="test-hs20b")
2718 params['hessid'] = bssid2
2719 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
2720 params['osu_ssid'] = '"HS 2.0 OSU OSEN"'
2721 params['osu_method_list'] = "0"
2722 params['osu_nai'] = "osen@example.com"
2723 params['osu_friendly_name'] = [ "eng:Test2 OSU", "fin:Testi2-OSU" ]
2724 params['osu_icon'] = "w1fi_logo"
2725 params['osu_service_desc'] = [ "eng:Example services2", "fin:Esimerkkipalveluja2" ]
2726 params['osu_server_uri'] = "https://example.org/osu/"
2727 hostapd.add_ap(apdev[1], params)
2729 with open("w1fi_logo.png", "r") as f:
2730 orig_logo = f.read()
2731 dev[0].hs20_enable()
2732 dir = "/tmp/osu-fetch"
2733 if os.path.isdir(dir):
2734 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2736 os.remove(dir + "/" + f)
2743 dev[1].scan_for_bss(bssid, freq="2412")
2744 dev[2].scan_for_bss(bssid, freq="2412")
2745 dev[0].request("SET osu_dir " + dir)
2746 dev[0].request("FETCH_OSU")
2747 if "FAIL" not in dev[1].request("HS20_ICON_REQUEST foo w1fi_logo"):
2748 raise Exception("Invalid HS20_ICON_REQUEST accepted")
2749 if "OK" not in dev[1].request("HS20_ICON_REQUEST " + bssid + " w1fi_logo"):
2750 raise Exception("HS20_ICON_REQUEST failed")
2751 if "OK" not in dev[2].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2752 raise Exception("REQ_HS20_ICON failed")
2755 ev = dev[0].wait_event(["OSU provider fetch completed",
2756 "RX-HS20-ANQP-ICON"], timeout=15)
2758 raise Exception("Timeout on OSU fetch")
2759 if "OSU provider fetch completed" in ev:
2761 if "RX-HS20-ANQP-ICON" in ev:
2762 with open(ev.split(' ')[1], "r") as f:
2764 if logo == orig_logo:
2767 with open(dir + "/osu-providers.txt", "r") as f:
2769 logger.debug("osu-providers.txt: " + prov)
2770 if "OSU-PROVIDER " + bssid not in prov:
2771 raise Exception("Missing OSU_PROVIDER(1)")
2772 if "OSU-PROVIDER " + bssid2 not in prov:
2773 raise Exception("Missing OSU_PROVIDER(2)")
2775 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2777 os.remove(dir + "/" + f)
2781 raise Exception("Unexpected number of icons fetched")
2783 ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=5)
2785 raise Exception("Timeout on GAS-QUERY-DONE")
2786 ev = dev[1].wait_event(["GAS-QUERY-DONE"], timeout=5)
2788 raise Exception("Timeout on GAS-QUERY-DONE")
2789 if "freq=2412 status_code=0 result=SUCCESS" not in ev:
2790 raise Exception("Unexpected GAS-QUERY-DONE: " + ev)
2791 ev = dev[1].wait_event(["RX-HS20-ANQP"], timeout=15)
2793 raise Exception("Timeout on icon fetch")
2794 if "Icon Binary File" not in ev:
2795 raise Exception("Unexpected ANQP element")
2797 ev = dev[2].wait_event(["RX-HS20-ICON"], timeout=5)
2799 raise Exception("Timeout on RX-HS20-ICON")
2800 event_icon_len = ev.split(' ')[3]
2801 if " w1fi_logo " not in ev:
2802 raise Exception("RX-HS20-ICON did not have the expected file name")
2804 raise Exception("RX-HS20-ICON did not have the expected BSSID")
2805 if "FAIL" in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 0 10"):
2806 raise Exception("GET_HS20_ICON 0..10 failed")
2807 if "FAIL" in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 5 10"):
2808 raise Exception("GET_HS20_ICON 5..15 failed")
2809 if "FAIL" not in dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo 100000 10"):
2810 raise Exception("Unexpected success of GET_HS20_ICON with too large offset")
2815 raise Exception("Unexpectedly long icon")
2816 res = dev[2].request("GET_HS20_ICON " + bssid + " w1fi_logo %d 1000" % pos)
2817 if res.startswith("FAIL"):
2819 icon += base64.b64decode(res)
2821 hex = binascii.hexlify(icon)
2822 if not hex.startswith("0009696d6167652f706e677d1d"):
2823 raise Exception("Unexpected beacon binary header: " + hex)
2824 with open('w1fi_logo.png', 'r') as f:
2826 if icon[13:] != data:
2827 raise Exception("Unexpected icon data")
2828 if len(icon) != int(event_icon_len):
2829 raise Exception("Unexpected RX-HS20-ICON event length: " + event_icon_len)
2832 if "OK" not in dev[i].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2833 raise Exception("REQ_HS20_ICON failed [2]")
2835 ev = dev[i].wait_event(["RX-HS20-ICON"], timeout=5)
2837 raise Exception("Timeout on RX-HS20-ICON [2]")
2839 if "FAIL" not in dev[2].request("DEL_HS20_ICON foo w1fi_logo"):
2840 raise Exception("Invalid DEL_HS20_ICON accepted")
2841 if "OK" not in dev[2].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
2842 raise Exception("DEL_HS20_ICON failed")
2843 if "OK" not in dev[1].request("DEL_HS20_ICON " + bssid):
2844 raise Exception("DEL_HS20_ICON failed")
2845 if "OK" not in dev[0].request("DEL_HS20_ICON "):
2846 raise Exception("DEL_HS20_ICON failed")
2848 if "FAIL" not in dev[i].request("DEL_HS20_ICON "):
2849 raise Exception("DEL_HS20_ICON accepted when no icons left")
2851 def test_ap_hs20_fetch_osu_no_info(dev, apdev):
2852 """Hotspot 2.0 OSU provider and no AP with info"""
2853 bssid = apdev[0]['bssid']
2854 params = hs20_ap_params()
2855 hostapd.add_ap(apdev[0], params)
2857 dev[0].hs20_enable()
2858 dir = "/tmp/osu-fetch"
2859 if os.path.isdir(dir):
2860 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2862 os.remove(dir + "/" + f)
2868 dev[0].scan_for_bss(bssid, freq="2412")
2870 dev[0].request("SET osu_dir " + dir)
2871 dev[0].request("FETCH_OSU")
2872 ev = dev[0].wait_event(["OSU provider fetch completed"], timeout=30)
2874 raise Exception("Timeout on OSU fetch")
2876 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
2878 os.remove(dir + "/" + f)
2881 def get_icon(dev, bssid, iconname):
2886 raise Exception("Unexpectedly long icon")
2887 res = dev.request("GET_HS20_ICON " + bssid + " " + iconname + " %d 3000" % pos)
2888 if res.startswith("FAIL"):
2890 icon += base64.b64decode(res)
2893 raise Exception("Too short GET_HS20_ICON response")
2894 return icon[0:13], icon[13:]
2896 def test_ap_hs20_req_hs20_icon(dev, apdev):
2897 """Hotspot 2.0 OSU provider and multi-icon fetch with REQ_HS20_ICON"""
2898 bssid = apdev[0]['bssid']
2899 params = hs20_ap_params()
2900 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
2901 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
2902 params['osu_ssid'] = '"HS 2.0 OSU open"'
2903 params['osu_method_list'] = "1"
2904 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2905 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
2906 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2907 params['osu_server_uri'] = "https://example.com/osu/"
2908 hostapd.add_ap(apdev[0], params)
2910 dev[0].scan_for_bss(bssid, freq="2412")
2912 # First, fetch two icons from the AP to wpa_supplicant
2914 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2915 raise Exception("REQ_HS20_ICON failed")
2916 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
2918 raise Exception("Timeout on RX-HS20-ICON (1)")
2920 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " test_logo"):
2921 raise Exception("REQ_HS20_ICON failed")
2922 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
2924 raise Exception("Timeout on RX-HS20-ICON (2)")
2926 # Then, fetch the icons from wpa_supplicant for validation
2928 hdr, data1 = get_icon(dev[0], bssid, "w1fi_logo")
2929 hdr, data2 = get_icon(dev[0], bssid, "test_logo")
2931 with open('w1fi_logo.png', 'r') as f:
2934 raise Exception("Unexpected icon data (1)")
2936 with open('auth_serv/sha512-server.pem', 'r') as f:
2939 raise Exception("Unexpected icon data (2)")
2941 # Finally, delete the icons from wpa_supplicant
2943 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
2944 raise Exception("DEL_HS20_ICON failed")
2945 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " test_logo"):
2946 raise Exception("DEL_HS20_ICON failed")
2948 def test_ap_hs20_req_hs20_icon_parallel(dev, apdev):
2949 """Hotspot 2.0 OSU provider and multi-icon parallel fetch with REQ_HS20_ICON"""
2950 bssid = apdev[0]['bssid']
2951 params = hs20_ap_params()
2952 params['hs20_icon'] = [ "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png",
2953 "128:80:zxx:image/png:test_logo:auth_serv/sha512-server.pem" ]
2954 params['osu_ssid'] = '"HS 2.0 OSU open"'
2955 params['osu_method_list'] = "1"
2956 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
2957 params['osu_icon'] = [ "w1fi_logo", "w1fi_logo2" ]
2958 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
2959 params['osu_server_uri'] = "https://example.com/osu/"
2960 hostapd.add_ap(apdev[0], params)
2962 dev[0].scan_for_bss(bssid, freq="2412")
2964 # First, fetch two icons from the AP to wpa_supplicant
2966 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " w1fi_logo"):
2967 raise Exception("REQ_HS20_ICON failed")
2969 if "OK" not in dev[0].request("REQ_HS20_ICON " + bssid + " test_logo"):
2970 raise Exception("REQ_HS20_ICON failed")
2971 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
2973 raise Exception("Timeout on RX-HS20-ICON (1)")
2974 ev = dev[0].wait_event(["RX-HS20-ICON"], timeout=5)
2976 raise Exception("Timeout on RX-HS20-ICON (2)")
2978 # Then, fetch the icons from wpa_supplicant for validation
2980 hdr, data1 = get_icon(dev[0], bssid, "w1fi_logo")
2981 hdr, data2 = get_icon(dev[0], bssid, "test_logo")
2983 with open('w1fi_logo.png', 'r') as f:
2986 raise Exception("Unexpected icon data (1)")
2988 with open('auth_serv/sha512-server.pem', 'r') as f:
2991 raise Exception("Unexpected icon data (2)")
2993 # Finally, delete the icons from wpa_supplicant
2995 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " w1fi_logo"):
2996 raise Exception("DEL_HS20_ICON failed")
2997 if "OK" not in dev[0].request("DEL_HS20_ICON " + bssid + " test_logo"):
2998 raise Exception("DEL_HS20_ICON failed")
3000 def test_ap_hs20_fetch_osu_stop(dev, apdev):
3001 """Hotspot 2.0 OSU provider fetch stopped"""
3002 bssid = apdev[0]['bssid']
3003 params = hs20_ap_params()
3004 params['hs20_icon'] = "128:80:zxx:image/png:w1fi_logo:w1fi_logo.png"
3005 params['osu_ssid'] = '"HS 2.0 OSU open"'
3006 params['osu_method_list'] = "1"
3007 params['osu_friendly_name'] = [ "eng:Test OSU", "fin:Testi-OSU" ]
3008 params['osu_icon'] = "w1fi_logo"
3009 params['osu_service_desc'] = [ "eng:Example services", "fin:Esimerkkipalveluja" ]
3010 params['osu_server_uri'] = "https://example.com/osu/"
3011 hapd = hostapd.add_ap(apdev[0], params)
3013 dev[0].hs20_enable()
3014 dir = "/tmp/osu-fetch"
3015 if os.path.isdir(dir):
3016 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3018 os.remove(dir + "/" + f)
3025 dev[0].request("SET osu_dir " + dir)
3026 dev[0].request("SCAN freq=2412-2462")
3027 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-STARTED"], timeout=10)
3029 raise Exception("Scan did not start")
3030 if "FAIL" not in dev[0].request("FETCH_OSU"):
3031 raise Exception("FETCH_OSU accepted while scanning")
3032 ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], 10)
3034 raise Exception("Scan timed out")
3035 hapd.set("ext_mgmt_frame_handling", "1")
3036 dev[0].request("FETCH_ANQP")
3037 if "FAIL" not in dev[0].request("FETCH_OSU"):
3038 raise Exception("FETCH_OSU accepted while in FETCH_ANQP")
3039 dev[0].request("STOP_FETCH_ANQP")
3040 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=5)
3041 dev[0].dump_monitor()
3043 dev[0].request("INTERWORKING_SELECT freq=2412")
3045 msg = hapd.mgmt_rx()
3046 if msg['subtype'] == 13:
3048 if "FAIL" not in dev[0].request("FETCH_OSU"):
3049 raise Exception("FETCH_OSU accepted while in INTERWORKING_SELECT")
3050 ev = dev[0].wait_event(["INTERWORKING-AP", "INTERWORKING-NO-MATCH"],
3053 raise Exception("Network selection timed out")
3055 dev[0].dump_monitor()
3056 if "OK" not in dev[0].request("FETCH_OSU"):
3057 raise Exception("FETCH_OSU failed")
3058 dev[0].request("CANCEL_FETCH_OSU")
3062 if dev[0].get_driver_status_field("scan_state") == "SCAN_COMPLETED":
3065 dev[0].dump_monitor()
3066 if "OK" not in dev[0].request("FETCH_OSU"):
3067 raise Exception("FETCH_OSU failed")
3068 if "FAIL" not in dev[0].request("FETCH_OSU"):
3069 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
3070 ev = dev[0].wait_event(["GAS-QUERY-START"], 10)
3072 raise Exception("GAS timed out")
3073 if "FAIL" not in dev[0].request("FETCH_OSU"):
3074 raise Exception("FETCH_OSU accepted while in FETCH_OSU")
3075 dev[0].request("CANCEL_FETCH_OSU")
3076 ev = dev[0].wait_event(["GAS-QUERY-DONE"], 10)
3078 raise Exception("GAS event timed out after CANCEL_FETCH_OSU")
3080 files = [ f for f in os.listdir(dir) if f.startswith("osu-") ]
3082 os.remove(dir + "/" + f)
3085 def test_ap_hs20_ft(dev, apdev):
3086 """Hotspot 2.0 connection with FT"""
3087 check_eap_capa(dev[0], "MSCHAPV2")
3088 bssid = apdev[0]['bssid']
3089 params = hs20_ap_params()
3090 params['wpa_key_mgmt'] = "FT-EAP"
3091 params['nas_identifier'] = "nas1.w1.fi"
3092 params['r1_key_holder'] = "000102030405"
3093 params["mobility_domain"] = "a1b2"
3094 params["reassociation_deadline"] = "1000"
3095 hostapd.add_ap(apdev[0], params)
3097 dev[0].hs20_enable()
3098 id = dev[0].add_cred_values({ 'realm': "example.com",
3099 'username': "hs20-test",
3100 'password': "password",
3101 'ca_cert': "auth_serv/ca.pem",
3102 'domain': "example.com",
3103 'update_identifier': "1234" })
3104 interworking_select(dev[0], bssid, "home", freq="2412")
3105 interworking_connect(dev[0], bssid, "TTLS")
3107 def test_ap_hs20_remediation_sql(dev, apdev, params):
3108 """Hotspot 2.0 connection and remediation required using SQLite for user DB"""
3109 check_eap_capa(dev[0], "MSCHAPV2")
3113 raise HwsimSkip("No sqlite3 module available")
3114 dbfile = os.path.join(params['logdir'], "eap-user.db")
3119 con = sqlite3.connect(dbfile)
3122 cur.execute("CREATE TABLE users(identity TEXT PRIMARY KEY, methods TEXT, password TEXT, remediation TEXT, phase2 INTEGER)")
3123 cur.execute("CREATE TABLE wildcards(identity TEXT PRIMARY KEY, methods TEXT)")
3124 cur.execute("INSERT INTO users(identity,methods,password,phase2,remediation) VALUES ('user-mschapv2','TTLS-MSCHAPV2','password',1,'user')")
3125 cur.execute("INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS')")
3126 cur.execute("CREATE TABLE authlog(timestamp TEXT, session TEXT, nas_ip TEXT, username TEXT, note TEXT)")
3129 params = { "ssid": "as", "beacon_int": "2000",
3130 "radius_server_clients": "auth_serv/radius_clients.conf",
3131 "radius_server_auth_port": '18128',
3133 "eap_user_file": "sqlite:" + dbfile,
3134 "ca_cert": "auth_serv/ca.pem",
3135 "server_cert": "auth_serv/server.pem",
3136 "private_key": "auth_serv/server.key",
3137 "subscr_remediation_url": "https://example.org/",
3138 "subscr_remediation_method": "1" }
3139 hostapd.add_ap(apdev[1], params)
3141 bssid = apdev[0]['bssid']
3142 params = hs20_ap_params()
3143 params['auth_server_port'] = "18128"
3144 hostapd.add_ap(apdev[0], params)
3146 dev[0].request("SET pmf 1")
3147 dev[0].hs20_enable()
3148 id = dev[0].add_cred_values({ 'realm': "example.com",
3149 'username': "user-mschapv2",
3150 'password': "password",
3151 'ca_cert': "auth_serv/ca.pem" })
3152 interworking_select(dev[0], bssid, freq="2412")
3153 interworking_connect(dev[0], bssid, "TTLS")
3154 ev = dev[0].wait_event(["HS20-SUBSCRIPTION-REMEDIATION"], timeout=5)
3156 raise Exception("Timeout on subscription remediation notice")
3157 if " 1 https://example.org/" not in ev:
3158 raise Exception("Unexpected subscription remediation event contents")
3162 cur.execute("SELECT * from authlog")
3163 rows = cur.fetchall()
3165 raise Exception("No authlog entries")
3169 dev[0].request("SET pmf 0")
3171 def test_ap_hs20_external_selection(dev, apdev):
3172 """Hotspot 2.0 connection using external network selection and creation"""
3173 check_eap_capa(dev[0], "MSCHAPV2")
3174 bssid = apdev[0]['bssid']
3175 params = hs20_ap_params()
3176 params['hessid'] = bssid
3177 params['disable_dgaf'] = '1'
3178 hostapd.add_ap(apdev[0], params)
3180 dev[0].hs20_enable()
3181 dev[0].connect("test-hs20", proto="RSN", key_mgmt="WPA-EAP", eap="TTLS",
3182 identity="hs20-test", password="password",
3183 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3184 scan_freq="2412", update_identifier="54321")
3185 if dev[0].get_status_field("hs20") != "2":
3186 raise Exception("Unexpected hs20 indication")
3188 def test_ap_hs20_random_mac_addr(dev, apdev):
3189 """Hotspot 2.0 connection with random MAC address"""
3190 check_eap_capa(dev[0], "MSCHAPV2")
3191 bssid = apdev[0]['bssid']
3192 params = hs20_ap_params()
3193 params['hessid'] = bssid
3194 params['disable_dgaf'] = '1'
3195 hapd = hostapd.add_ap(apdev[0], params)
3197 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
3198 wpas.interface_add("wlan5")
3199 addr = wpas.p2p_interface_addr()
3200 wpas.request("SET mac_addr 1")
3201 wpas.request("SET preassoc_mac_addr 1")
3202 wpas.request("SET rand_addr_lifetime 60")
3204 wpas.flush_scan_cache()
3205 id = wpas.add_cred_values({ 'realm': "example.com",
3206 'username': "hs20-test",
3207 'password': "password",
3208 'ca_cert': "auth_serv/ca.pem",
3209 'domain': "example.com",
3210 'update_identifier': "1234" })
3211 interworking_select(wpas, bssid, "home", freq="2412")
3212 interworking_connect(wpas, bssid, "TTLS")
3213 addr1 = wpas.get_driver_status_field("addr")
3215 raise Exception("Did not use random MAC address")
3217 sta = hapd.get_sta(addr)
3218 if sta['addr'] != "FAIL":
3219 raise Exception("Unexpected STA association with permanent address")
3220 sta = hapd.get_sta(addr1)
3221 if sta['addr'] != addr1:
3222 raise Exception("STA association with random address not found")
3224 def test_ap_hs20_multi_network_and_cred_removal(dev, apdev):
3225 """Multiple networks and cred removal"""
3226 check_eap_capa(dev[0], "MSCHAPV2")
3227 bssid = apdev[0]['bssid']
3228 params = hs20_ap_params()
3229 params['nai_realm'] = [ "0,example.com,25[3:26]"]
3230 hapd = hostapd.add_ap(apdev[0], params)
3232 dev[0].add_network()
3233 dev[0].hs20_enable()
3234 id = dev[0].add_cred_values({ 'realm': "example.com",
3236 'password': "password" })
3237 interworking_select(dev[0], bssid, freq="2412")
3238 interworking_connect(dev[0], bssid, "PEAP")
3239 dev[0].add_network()
3241 dev[0].request("DISCONNECT")
3242 dev[0].wait_disconnected(timeout=10)
3245 hapd.set("ssid", "another ssid")
3248 interworking_select(dev[0], bssid, freq="2412")
3249 interworking_connect(dev[0], bssid, "PEAP")
3250 dev[0].add_network()
3251 if len(dev[0].list_networks()) != 5:
3252 raise Exception("Unexpected number of networks prior to remove_crec")
3254 dev[0].dump_monitor()
3255 dev[0].remove_cred(id)
3256 if len(dev[0].list_networks()) != 3:
3257 raise Exception("Unexpected number of networks after to remove_crec")
3258 dev[0].wait_disconnected(timeout=10)
3260 def test_ap_hs20_interworking_add_network(dev, apdev):
3261 """Hotspot 2.0 connection using INTERWORKING_ADD_NETWORK"""
3262 check_eap_capa(dev[0], "MSCHAPV2")
3263 bssid = apdev[0]['bssid']
3264 params = hs20_ap_params()
3265 params['nai_realm'] = [ "0,example.com,21[3:26][6:7][99:99]" ]
3266 hostapd.add_ap(apdev[0], params)
3268 dev[0].hs20_enable()
3269 dev[0].add_cred_values(default_cred(user="user"))
3270 interworking_select(dev[0], bssid, freq=2412)
3271 id = dev[0].interworking_add_network(bssid)
3272 dev[0].select_network(id, freq=2412)
3273 dev[0].wait_connected()
3275 def _test_ap_hs20_proxyarp(dev, apdev):
3276 bssid = apdev[0]['bssid']
3277 params = hs20_ap_params()
3278 params['hessid'] = bssid
3279 params['disable_dgaf'] = '0'
3280 params['proxy_arp'] = '1'
3281 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3282 if "OK" in hapd.request("ENABLE"):
3283 raise Exception("Incomplete hostapd configuration was accepted")
3284 hapd.set("ap_isolate", "1")
3285 if "OK" in hapd.request("ENABLE"):
3286 raise Exception("Incomplete hostapd configuration was accepted")
3287 hapd.set('bridge', 'ap-br0')
3292 # For now, do not report failures due to missing kernel support
3293 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3294 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
3296 raise Exception("AP startup timed out")
3297 if "AP-ENABLED" not in ev:
3298 raise Exception("AP startup failed")
3300 dev[0].hs20_enable()
3301 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3302 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3304 id = dev[0].add_cred_values({ 'realm': "example.com",
3305 'username': "hs20-test",
3306 'password': "password",
3307 'ca_cert': "auth_serv/ca.pem",
3308 'domain': "example.com",
3309 'update_identifier': "1234" })
3310 interworking_select(dev[0], bssid, "home", freq="2412")
3311 interworking_connect(dev[0], bssid, "TTLS")
3313 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
3314 identity="hs20-test", password="password",
3315 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3319 addr0 = dev[0].p2p_interface_addr()
3320 addr1 = dev[1].p2p_interface_addr()
3322 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3323 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
3325 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
3326 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
3328 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3329 raise Exception("DATA_TEST_FRAME failed")
3331 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:dddd::2",
3332 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:dddd::2",
3334 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3335 raise Exception("DATA_TEST_FRAME failed")
3337 pkt = build_ns(src_ll=addr1, ip_src="aaaa:bbbb:eeee::2",
3338 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:eeee::2",
3340 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3341 raise Exception("DATA_TEST_FRAME failed")
3343 matches = get_permanent_neighbors("ap-br0")
3344 logger.info("After connect: " + str(matches))
3345 if len(matches) != 3:
3346 raise Exception("Unexpected number of neighbor entries after connect")
3347 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3348 raise Exception("dev0 addr missing")
3349 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3350 raise Exception("dev1 addr(1) missing")
3351 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3352 raise Exception("dev1 addr(2) missing")
3353 dev[0].request("DISCONNECT")
3354 dev[1].request("DISCONNECT")
3356 matches = get_permanent_neighbors("ap-br0")
3357 logger.info("After disconnect: " + str(matches))
3358 if len(matches) > 0:
3359 raise Exception("Unexpected neighbor entries after disconnect")
3361 def test_ap_hs20_hidden_ssid_in_scan_res(dev, apdev):
3362 """Hotspot 2.0 connection with hidden SSId in scan results"""
3363 check_eap_capa(dev[0], "MSCHAPV2")
3364 bssid = apdev[0]['bssid']
3366 hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret',
3367 "ignore_broadcast_ssid": "1" })
3368 dev[0].scan_for_bss(bssid, freq=2412)
3370 hapd_global = hostapd.HostapdGlobal(apdev[0])
3372 hapd_global.remove(apdev[0]['ifname'])
3374 params = hs20_ap_params()
3375 params['hessid'] = bssid
3376 hapd = hostapd.add_ap(apdev[0], params)
3378 dev[0].hs20_enable()
3379 id = dev[0].add_cred_values({ 'realm': "example.com",
3380 'username': "hs20-test",
3381 'password': "password",
3382 'ca_cert': "auth_serv/ca.pem",
3383 'domain': "example.com" })
3384 interworking_select(dev[0], bssid, "home", freq="2412")
3385 interworking_connect(dev[0], bssid, "TTLS")
3387 # clear BSS table to avoid issues in following test cases
3388 dev[0].request("DISCONNECT")
3389 dev[0].wait_disconnected()
3391 dev[0].flush_scan_cache()
3392 dev[0].flush_scan_cache()
3394 def test_ap_hs20_proxyarp(dev, apdev):
3395 """Hotspot 2.0 and ProxyARP"""
3396 check_eap_capa(dev[0], "MSCHAPV2")
3398 _test_ap_hs20_proxyarp(dev, apdev)
3400 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3401 stderr=open('/dev/null', 'w'))
3402 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3403 stderr=open('/dev/null', 'w'))
3405 def _test_ap_hs20_proxyarp_dgaf(dev, apdev, disabled):
3406 bssid = apdev[0]['bssid']
3407 params = hs20_ap_params()
3408 params['hessid'] = bssid
3409 params['disable_dgaf'] = '1' if disabled else '0'
3410 params['proxy_arp'] = '1'
3411 params['na_mcast_to_ucast'] = '1'
3412 params['ap_isolate'] = '1'
3413 params['bridge'] = 'ap-br0'
3414 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3418 # For now, do not report failures due to missing kernel support
3419 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3420 ev = hapd.wait_event(["AP-ENABLED"], timeout=10)
3422 raise Exception("AP startup timed out")
3424 dev[0].hs20_enable()
3425 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3426 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3428 id = dev[0].add_cred_values({ 'realm': "example.com",
3429 'username': "hs20-test",
3430 'password': "password",
3431 'ca_cert': "auth_serv/ca.pem",
3432 'domain': "example.com",
3433 'update_identifier': "1234" })
3434 interworking_select(dev[0], bssid, "home", freq="2412")
3435 interworking_connect(dev[0], bssid, "TTLS")
3437 dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
3438 identity="hs20-test", password="password",
3439 ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
3443 addr0 = dev[0].p2p_interface_addr()
3445 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3447 pkt = build_ns(src_ll=addr0, ip_src="aaaa:bbbb:cccc::2",
3448 ip_dst="ff02::1:ff00:2", target="aaaa:bbbb:cccc::2",
3450 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt)):
3451 raise Exception("DATA_TEST_FRAME failed")
3453 pkt = build_ra(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::33",
3455 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3456 raise Exception("DATA_TEST_FRAME failed")
3458 pkt = build_na(src_ll=apdev[0]['bssid'], ip_src="aaaa:bbbb:cccc::44",
3459 ip_dst="ff01::1", target="aaaa:bbbb:cccc::55")
3460 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3461 raise Exception("DATA_TEST_FRAME failed")
3463 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3464 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3465 yiaddr="192.168.1.123", chaddr=addr0)
3466 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3467 raise Exception("DATA_TEST_FRAME failed")
3468 # another copy for additional code coverage
3469 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
3470 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3471 yiaddr="192.168.1.123", chaddr=addr0)
3472 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3473 raise Exception("DATA_TEST_FRAME failed")
3475 matches = get_permanent_neighbors("ap-br0")
3476 logger.info("After connect: " + str(matches))
3477 if len(matches) != 2:
3478 raise Exception("Unexpected number of neighbor entries after connect")
3479 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3480 raise Exception("dev0 addr missing")
3481 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3482 raise Exception("dev0 IPv4 addr missing")
3483 dev[0].request("DISCONNECT")
3484 dev[1].request("DISCONNECT")
3486 matches = get_permanent_neighbors("ap-br0")
3487 logger.info("After disconnect: " + str(matches))
3488 if len(matches) > 0:
3489 raise Exception("Unexpected neighbor entries after disconnect")
3491 def test_ap_hs20_proxyarp_disable_dgaf(dev, apdev):
3492 """Hotspot 2.0 and ProxyARP with DGAF disabled"""
3493 check_eap_capa(dev[0], "MSCHAPV2")
3495 _test_ap_hs20_proxyarp_dgaf(dev, apdev, True)
3497 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3498 stderr=open('/dev/null', 'w'))
3499 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3500 stderr=open('/dev/null', 'w'))
3502 def test_ap_hs20_proxyarp_enable_dgaf(dev, apdev):
3503 """Hotspot 2.0 and ProxyARP with DGAF enabled"""
3504 check_eap_capa(dev[0], "MSCHAPV2")
3506 _test_ap_hs20_proxyarp_dgaf(dev, apdev, False)
3508 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
3509 stderr=open('/dev/null', 'w'))
3510 subprocess.call(['brctl', 'delbr', 'ap-br0'],
3511 stderr=open('/dev/null', 'w'))
3513 def ip_checksum(buf):
3517 for i in range(0, len(buf), 2):
3518 val, = struct.unpack('H', buf[i:i+2])
3521 sum = (sum & 0xffff) + (sum >> 16)
3522 return struct.pack('H', ~sum & 0xffff)
3524 def ipv6_solicited_node_mcaddr(target):
3525 prefix = socket.inet_pton(socket.AF_INET6, "ff02::1:ff00:0")
3526 mask = socket.inet_pton(socket.AF_INET6, "::ff:ffff")
3527 _target = socket.inet_pton(socket.AF_INET6, target)
3528 p = struct.unpack('4I', prefix)
3529 m = struct.unpack('4I', mask)
3530 t = struct.unpack('4I', _target)
3531 res = (p[0] | (t[0] & m[0]),
3532 p[1] | (t[1] & m[1]),
3533 p[2] | (t[2] & m[2]),
3534 p[3] | (t[3] & m[3]))
3535 return socket.inet_ntop(socket.AF_INET6, struct.pack('4I', *res))
3537 def build_icmpv6(ipv6_addrs, type, code, payload):
3538 start = struct.pack("BB", type, code)
3540 icmp = start + '\x00\x00' + end
3541 pseudo = ipv6_addrs + struct.pack(">LBBBB", len(icmp), 0, 0, 0, 58)
3542 csum = ip_checksum(pseudo + icmp)
3543 return start + csum + end
3545 def build_ra(src_ll, ip_src, ip_dst, cur_hop_limit=0, router_lifetime=0,
3546 reachable_time=0, retrans_timer=0, opt=None):
3547 link_mc = binascii.unhexlify("3333ff000002")
3548 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3550 ehdr = link_mc + _src_ll + proto
3551 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3552 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3554 adv = struct.pack('>BBHLL', cur_hop_limit, 0, router_lifetime,
3555 reachable_time, retrans_timer)
3560 icmp = build_icmpv6(_ip_src + _ip_dst, 134, 0, payload)
3562 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3563 ipv6 += _ip_src + _ip_dst
3565 return ehdr + ipv6 + icmp
3567 def build_ns(src_ll, ip_src, ip_dst, target, opt=None):
3568 link_mc = binascii.unhexlify("3333ff000002")
3569 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3571 ehdr = link_mc + _src_ll + proto
3572 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3574 ip_dst = ipv6_solicited_node_mcaddr(target)
3575 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3577 reserved = '\x00\x00\x00\x00'
3578 _target = socket.inet_pton(socket.AF_INET6, target)
3580 payload = reserved + _target + opt
3582 payload = reserved + _target
3583 icmp = build_icmpv6(_ip_src + _ip_dst, 135, 0, payload)
3585 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3586 ipv6 += _ip_src + _ip_dst
3588 return ehdr + ipv6 + icmp
3590 def send_ns(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
3595 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
3598 src_ll = dev.p2p_interface_addr()
3599 cmd = "DATA_TEST_FRAME "
3602 opt = "\x01\x01" + binascii.unhexlify(src_ll.replace(':',''))
3604 pkt = build_ns(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
3606 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
3607 raise Exception("DATA_TEST_FRAME failed")
3609 def build_na(src_ll, ip_src, ip_dst, target, opt=None, flags=0):
3610 link_mc = binascii.unhexlify("3333ff000002")
3611 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3613 ehdr = link_mc + _src_ll + proto
3614 _ip_src = socket.inet_pton(socket.AF_INET6, ip_src)
3615 _ip_dst = socket.inet_pton(socket.AF_INET6, ip_dst)
3617 _target = socket.inet_pton(socket.AF_INET6, target)
3619 payload = struct.pack('>Bxxx', flags) + _target + opt
3621 payload = struct.pack('>Bxxx', flags) + _target
3622 icmp = build_icmpv6(_ip_src + _ip_dst, 136, 0, payload)
3624 ipv6 = struct.pack('>BBBBHBB', 0x60, 0, 0, 0, len(icmp), 58, 255)
3625 ipv6 += _ip_src + _ip_dst
3627 return ehdr + ipv6 + icmp
3629 def send_na(dev, src_ll=None, target=None, ip_src=None, ip_dst=None, opt=None,
3634 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
3637 src_ll = dev.p2p_interface_addr()
3638 cmd = "DATA_TEST_FRAME "
3640 pkt = build_na(src_ll=src_ll, ip_src=ip_src, ip_dst=ip_dst, target=target,
3642 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
3643 raise Exception("DATA_TEST_FRAME failed")
3645 def build_dhcp_ack(dst_ll, src_ll, ip_src, ip_dst, yiaddr, chaddr,
3646 subnet_mask="255.255.255.0", truncated_opt=False,
3647 wrong_magic=False, force_tot_len=None, no_dhcp=False):
3648 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
3649 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3651 ehdr = _dst_ll + _src_ll + proto
3652 _ip_src = socket.inet_pton(socket.AF_INET, ip_src)
3653 _ip_dst = socket.inet_pton(socket.AF_INET, ip_dst)
3654 _subnet_mask = socket.inet_pton(socket.AF_INET, subnet_mask)
3656 _ciaddr = '\x00\x00\x00\x00'
3657 _yiaddr = socket.inet_pton(socket.AF_INET, yiaddr)
3658 _siaddr = '\x00\x00\x00\x00'
3659 _giaddr = '\x00\x00\x00\x00'
3660 _chaddr = binascii.unhexlify(chaddr.replace(':','') + "00000000000000000000")
3661 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
3662 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
3665 payload += '\x63\x82\x53\x00'
3667 payload += '\x63\x82\x53\x63'
3669 payload += '\x22\xff\x00'
3670 # Option: DHCP Message Type = ACK
3671 payload += '\x35\x01\x05'
3674 # Option: Subnet Mask
3675 payload += '\x01\x04' + _subnet_mask
3676 # Option: Time Offset
3677 payload += struct.pack('>BBL', 2, 4, 0)
3681 payload += '\x00\x00\x00\x00'
3684 payload = struct.pack('>BBBBL3BB', 2, 1, 6, 0, 12345, 0, 0, 0, 0)
3685 payload += _ciaddr + _yiaddr + _siaddr + _giaddr + _chaddr + 192*'\x00'
3687 udp = struct.pack('>HHHH', 67, 68, 8 + len(payload), 0) + payload
3690 tot_len = force_tot_len
3692 tot_len = 20 + len(udp)
3693 start = struct.pack('>BBHHBBBB', 0x45, 0, tot_len, 0, 0, 0, 128, 17)
3694 ipv4 = start + '\x00\x00' + _ip_src + _ip_dst
3695 csum = ip_checksum(ipv4)
3696 ipv4 = start + csum + _ip_src + _ip_dst
3698 return ehdr + ipv4 + udp
3700 def build_arp(dst_ll, src_ll, opcode, sender_mac, sender_ip,
3701 target_mac, target_ip):
3702 _dst_ll = binascii.unhexlify(dst_ll.replace(':',''))
3703 _src_ll = binascii.unhexlify(src_ll.replace(':',''))
3705 ehdr = _dst_ll + _src_ll + proto
3707 _sender_mac = binascii.unhexlify(sender_mac.replace(':',''))
3708 _sender_ip = socket.inet_pton(socket.AF_INET, sender_ip)
3709 _target_mac = binascii.unhexlify(target_mac.replace(':',''))
3710 _target_ip = socket.inet_pton(socket.AF_INET, target_ip)
3712 arp = struct.pack('>HHBBH', 1, 0x0800, 6, 4, opcode)
3713 arp += _sender_mac + _sender_ip
3714 arp += _target_mac + _target_ip
3718 def send_arp(dev, dst_ll="ff:ff:ff:ff:ff:ff", src_ll=None, opcode=1,
3719 sender_mac=None, sender_ip="0.0.0.0",
3720 target_mac="00:00:00:00:00:00", target_ip="0.0.0.0",
3725 if sender_mac is None:
3726 sender_mac = hapd_bssid
3727 cmd = "DATA_TEST_FRAME ifname=ap-br0 "
3730 src_ll = dev.p2p_interface_addr()
3731 if sender_mac is None:
3732 sender_mac = dev.p2p_interface_addr()
3733 cmd = "DATA_TEST_FRAME "
3735 pkt = build_arp(dst_ll=dst_ll, src_ll=src_ll, opcode=opcode,
3736 sender_mac=sender_mac, sender_ip=sender_ip,
3737 target_mac=target_mac, target_ip=target_ip)
3738 if "OK" not in dev.request(cmd + binascii.hexlify(pkt)):
3739 raise Exception("DATA_TEST_FRAME failed")
3741 def get_permanent_neighbors(ifname):
3742 cmd = subprocess.Popen(['ip', 'nei'], stdout=subprocess.PIPE)
3743 res = cmd.stdout.read()
3745 return [ line for line in res.splitlines() if "PERMANENT" in line and ifname in line ]
3747 def get_bridge_macs(ifname):
3748 cmd = subprocess.Popen(['brctl', 'showmacs', ifname],
3749 stdout=subprocess.PIPE)
3750 res = cmd.stdout.read()
3754 def tshark_get_arp(cap, filter):
3755 res = run_tshark(cap, filter,
3756 [ "eth.dst", "eth.src",
3757 "arp.src.hw_mac", "arp.src.proto_ipv4",
3758 "arp.dst.hw_mac", "arp.dst.proto_ipv4" ],
3761 for l in res.splitlines():
3762 frames.append(l.split('\t'))
3765 def tshark_get_ns(cap):
3766 res = run_tshark(cap, "icmpv6.type == 135",
3767 [ "eth.dst", "eth.src",
3768 "ipv6.src", "ipv6.dst",
3769 "icmpv6.nd.ns.target_address",
3770 "icmpv6.opt.linkaddr" ],
3773 for l in res.splitlines():
3774 frames.append(l.split('\t'))
3777 def tshark_get_na(cap):
3778 res = run_tshark(cap, "icmpv6.type == 136",
3779 [ "eth.dst", "eth.src",
3780 "ipv6.src", "ipv6.dst",
3781 "icmpv6.nd.na.target_address",
3782 "icmpv6.opt.linkaddr" ],
3785 for l in res.splitlines():
3786 frames.append(l.split('\t'))
3789 def _test_proxyarp_open(dev, apdev, params, ebtables=False):
3790 prefix = "proxyarp_open"
3792 prefix += "_ebtables"
3793 cap_br = os.path.join(params['logdir'], prefix + ".ap-br0.pcap")
3794 cap_dev0 = os.path.join(params['logdir'],
3795 prefix + ".%s.pcap" % dev[0].ifname)
3796 cap_dev1 = os.path.join(params['logdir'],
3797 prefix + ".%s.pcap" % dev[1].ifname)
3798 cap_dev2 = os.path.join(params['logdir'],
3799 prefix + ".%s.pcap" % dev[2].ifname)
3801 bssid = apdev[0]['bssid']
3802 params = { 'ssid': 'open' }
3803 params['proxy_arp'] = '1'
3804 hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
3805 hapd.set("ap_isolate", "1")
3806 hapd.set('bridge', 'ap-br0')
3811 # For now, do not report failures due to missing kernel support
3812 raise HwsimSkip("Could not start hostapd - assume proxyarp not supported in kernel version")
3813 ev = hapd.wait_event(["AP-ENABLED", "AP-DISABLED"], timeout=10)
3815 raise Exception("AP startup timed out")
3816 if "AP-ENABLED" not in ev:
3817 raise Exception("AP startup failed")
3819 params2 = { 'ssid': 'another' }
3820 hapd2 = hostapd.add_ap(apdev[1], params2, no_enable=True)
3821 hapd2.set('bridge', 'ap-br0')
3824 subprocess.call(['brctl', 'setfd', 'ap-br0', '0'])
3825 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
3828 for chain in [ 'FORWARD', 'OUTPUT' ]:
3829 subprocess.call(['ebtables', '-A', chain, '-p', 'ARP',
3830 '-d', 'Broadcast', '-o', apdev[0]['ifname'],
3832 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
3833 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3834 '--ip6-icmp-type', 'neighbor-solicitation',
3835 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3836 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
3837 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3838 '--ip6-icmp-type', 'neighbor-advertisement',
3839 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3840 subprocess.call(['ebtables', '-A', chain,
3841 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3842 '--ip6-icmp-type', 'router-solicitation',
3843 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3844 # Multicast Listener Report Message
3845 subprocess.call(['ebtables', '-A', chain, '-d', 'Multicast',
3846 '-p', 'IPv6', '--ip6-protocol', 'ipv6-icmp',
3847 '--ip6-icmp-type', '143',
3848 '-o', apdev[0]['ifname'], '-j', 'DROP'])
3852 cmd[0] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', 'ap-br0',
3853 '-w', cap_br, '-s', '2000'],
3854 stderr=open('/dev/null', 'w'))
3855 cmd[1] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[0].ifname,
3856 '-w', cap_dev0, '-s', '2000'],
3857 stderr=open('/dev/null', 'w'))
3858 cmd[2] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[1].ifname,
3859 '-w', cap_dev1, '-s', '2000'],
3860 stderr=open('/dev/null', 'w'))
3861 cmd[3] = subprocess.Popen(['tcpdump', '-p', '-U', '-i', dev[2].ifname,
3862 '-w', cap_dev2, '-s', '2000'],
3863 stderr=open('/dev/null', 'w'))
3865 dev[0].connect("open", key_mgmt="NONE", scan_freq="2412")
3866 dev[1].connect("open", key_mgmt="NONE", scan_freq="2412")
3867 dev[2].connect("another", key_mgmt="NONE", scan_freq="2412")
3870 brcmd = subprocess.Popen(['brctl', 'show'], stdout=subprocess.PIPE)
3871 res = brcmd.stdout.read()
3872 brcmd.stdout.close()
3873 logger.info("Bridge setup: " + res)
3875 brcmd = subprocess.Popen(['brctl', 'showstp', 'ap-br0'],
3876 stdout=subprocess.PIPE)
3877 res = brcmd.stdout.read()
3878 brcmd.stdout.close()
3879 logger.info("Bridge showstp: " + res)
3881 addr0 = dev[0].p2p_interface_addr()
3882 addr1 = dev[1].p2p_interface_addr()
3883 addr2 = dev[2].p2p_interface_addr()
3885 src_ll_opt0 = "\x01\x01" + binascii.unhexlify(addr0.replace(':',''))
3886 src_ll_opt1 = "\x01\x01" + binascii.unhexlify(addr1.replace(':',''))
3889 send_ns(dev[0], ip_src="::", target="aaaa:bbbb:cccc::2")
3891 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2")
3892 # test frame without source link-layer address option
3893 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3895 # test frame with bogus option
3896 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3897 opt="\x70\x01\x01\x02\x03\x04\x05\x05")
3898 # test frame with truncated source link-layer address option
3899 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3900 opt="\x01\x01\x01\x02\x03\x04")
3901 # test frame with foreign source link-layer address option
3902 send_ns(dev[0], ip_src="aaaa:bbbb:cccc::2", target="aaaa:bbbb:cccc::2",
3903 opt="\x01\x01\x01\x02\x03\x04\x05\x06")
3905 send_ns(dev[1], ip_src="aaaa:bbbb:dddd::2", target="aaaa:bbbb:dddd::2")
3907 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
3908 # another copy for additional code coverage
3909 send_ns(dev[1], ip_src="aaaa:bbbb:eeee::2", target="aaaa:bbbb:eeee::2")
3911 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3912 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3913 yiaddr="192.168.1.124", chaddr=addr0)
3914 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3915 raise Exception("DATA_TEST_FRAME failed")
3916 # Change address and verify unicast
3917 pkt = build_dhcp_ack(dst_ll=addr0, src_ll=bssid,
3918 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3919 yiaddr="192.168.1.123", chaddr=addr0)
3920 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3921 raise Exception("DATA_TEST_FRAME failed")
3923 # Not-associated client MAC address
3924 pkt = build_dhcp_ack(dst_ll="ff:ff:ff:ff:ff:ff", src_ll=bssid,
3925 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3926 yiaddr="192.168.1.125", chaddr="22:33:44:55:66:77")
3927 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3928 raise Exception("DATA_TEST_FRAME failed")
3931 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3932 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3933 yiaddr="0.0.0.0", chaddr=addr1)
3934 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3935 raise Exception("DATA_TEST_FRAME failed")
3938 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3939 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3940 yiaddr="192.168.1.126", chaddr=addr1,
3941 subnet_mask="0.0.0.0")
3942 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3943 raise Exception("DATA_TEST_FRAME failed")
3946 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3947 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3948 yiaddr="192.168.1.127", chaddr=addr1,
3950 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3951 raise Exception("DATA_TEST_FRAME failed")
3954 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3955 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3956 yiaddr="192.168.1.128", chaddr=addr1,
3958 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3959 raise Exception("DATA_TEST_FRAME failed")
3961 # Wrong IPv4 total length
3962 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3963 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3964 yiaddr="192.168.1.129", chaddr=addr1,
3966 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3967 raise Exception("DATA_TEST_FRAME failed")
3970 pkt = build_dhcp_ack(dst_ll=addr1, src_ll=bssid,
3971 ip_src="192.168.1.1", ip_dst="255.255.255.255",
3972 yiaddr="192.168.1.129", chaddr=addr1,
3974 if "OK" not in hapd.request("DATA_TEST_FRAME ifname=ap-br0 " + binascii.hexlify(pkt)):
3975 raise Exception("DATA_TEST_FRAME failed")
3977 macs = get_bridge_macs("ap-br0")
3978 logger.info("After connect (showmacs): " + str(macs))
3980 matches = get_permanent_neighbors("ap-br0")
3981 logger.info("After connect: " + str(matches))
3982 if len(matches) != 4:
3983 raise Exception("Unexpected number of neighbor entries after connect")
3984 if 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3985 raise Exception("dev0 addr missing")
3986 if 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3987 raise Exception("dev1 addr(1) missing")
3988 if 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT' not in matches:
3989 raise Exception("dev1 addr(2) missing")
3990 if '192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT' not in matches:
3991 raise Exception("dev0 IPv4 addr missing")
3993 targets = [ "192.168.1.123", "192.168.1.124", "192.168.1.125",
3995 for target in targets:
3996 send_arp(dev[1], sender_ip="192.168.1.100", target_ip=target)
3998 for target in targets:
3999 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.101",
4002 for target in targets:
4003 send_arp(dev[2], sender_ip="192.168.1.103", target_ip=target)
4005 # ARP Probe from wireless STA
4006 send_arp(dev[1], target_ip="192.168.1.127")
4007 # ARP Announcement from wireless STA
4008 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127")
4009 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.127",
4012 macs = get_bridge_macs("ap-br0")
4013 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
4015 matches = get_permanent_neighbors("ap-br0")
4016 logger.info("After ARP Probe + Announcement: " + str(matches))
4018 # ARP Request for the newly introduced IP address from wireless STA
4019 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
4021 # ARP Request for the newly introduced IP address from bridge
4022 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
4023 target_ip="192.168.1.127")
4024 send_arp(dev[2], sender_ip="192.168.1.103", target_ip="192.168.1.127")
4026 # ARP Probe from bridge
4027 send_arp(hapd, hapd_bssid=bssid, target_ip="192.168.1.130")
4028 send_arp(dev[2], target_ip="192.168.1.131")
4029 # ARP Announcement from bridge (not to be learned by AP for proxyarp)
4030 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
4031 target_ip="192.168.1.130")
4032 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.130",
4033 target_ip="192.168.1.130", opcode=2)
4034 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131")
4035 send_arp(dev[2], sender_ip="192.168.1.131", target_ip="192.168.1.131",
4038 macs = get_bridge_macs("ap-br0")
4039 logger.info("After ARP Probe + Announcement (showmacs): " + str(macs))
4041 matches = get_permanent_neighbors("ap-br0")
4042 logger.info("After ARP Probe + Announcement: " + str(matches))
4044 # ARP Request for the newly introduced IP address from wireless STA
4045 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.130")
4046 # ARP Response from bridge (AP does not proxy for non-wireless devices)
4047 send_arp(hapd, hapd_bssid=bssid, dst_ll=addr0, sender_ip="192.168.1.130",
4048 target_ip="192.168.1.123", opcode=2)
4050 # ARP Request for the newly introduced IP address from wireless STA
4051 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.131")
4052 # ARP Response from bridge (AP does not proxy for non-wireless devices)
4053 send_arp(dev[2], dst_ll=addr0, sender_ip="192.168.1.131",
4054 target_ip="192.168.1.123", opcode=2)
4056 # ARP Request for the newly introduced IP address from bridge
4057 send_arp(hapd, hapd_bssid=bssid, sender_ip="192.168.1.102",
4058 target_ip="192.168.1.130")
4059 send_arp(dev[2], sender_ip="192.168.1.104", target_ip="192.168.1.131")
4061 # ARP Probe from wireless STA (duplicate address; learned through DHCP)
4062 send_arp(dev[1], target_ip="192.168.1.123")
4063 # ARP Probe from wireless STA (duplicate address; learned through ARP)
4064 send_arp(dev[0], target_ip="192.168.1.127")
4066 # Gratuitous ARP Reply for another STA's IP address
4067 send_arp(dev[0], opcode=2, sender_mac=addr0, sender_ip="192.168.1.127",
4068 target_mac=addr1, target_ip="192.168.1.127")
4069 send_arp(dev[1], opcode=2, sender_mac=addr1, sender_ip="192.168.1.123",
4070 target_mac=addr0, target_ip="192.168.1.123")
4071 # ARP Request to verify previous mapping
4072 send_arp(dev[1], sender_ip="192.168.1.127", target_ip="192.168.1.123")
4073 send_arp(dev[0], sender_ip="192.168.1.123", target_ip="192.168.1.127")
4077 send_ns(dev[0], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:cccc::2")
4079 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:dddd::2")
4081 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:dddd::2",
4082 ip_src="aaaa:bbbb:ffff::2")
4084 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="aaaa:bbbb:ff00::2")
4086 send_ns(dev[2], target="aaaa:bbbb:dddd::2", ip_src="aaaa:bbbb:ff00::2")
4088 send_ns(dev[2], target="aaaa:bbbb:eeee::2", ip_src="aaaa:bbbb:ff00::2")
4091 # Try to probe for an already assigned address
4092 send_ns(dev[1], target="aaaa:bbbb:cccc::2", ip_src="::")
4094 send_ns(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc::2", ip_src="::")
4096 send_ns(dev[2], target="aaaa:bbbb:cccc::2", ip_src="::")
4100 send_na(dev[1], target="aaaa:bbbb:cccc:aeae::3",
4101 ip_src="aaaa:bbbb:cccc:aeae::3", ip_dst="ff02::1")
4102 send_na(hapd, hapd_bssid=bssid, target="aaaa:bbbb:cccc:aeae::4",
4103 ip_src="aaaa:bbbb:cccc:aeae::4", ip_dst="ff02::1")
4104 send_na(dev[2], target="aaaa:bbbb:cccc:aeae::5",
4105 ip_src="aaaa:bbbb:cccc:aeae::5", ip_dst="ff02::1")
4108 hwsim_utils.test_connectivity_iface(dev[0], hapd, "ap-br0")
4109 except Exception, e:
4110 logger.info("test_connectibity_iface failed: " + str(e))
4111 raise HwsimSkip("Assume kernel did not have the required patches for proxyarp")
4112 hwsim_utils.test_connectivity_iface(dev[1], hapd, "ap-br0")
4113 hwsim_utils.test_connectivity(dev[0], dev[1])
4115 dev[0].request("DISCONNECT")
4116 dev[1].request("DISCONNECT")
4118 for i in range(len(cmd)):
4120 macs = get_bridge_macs("ap-br0")
4121 logger.info("After disconnect (showmacs): " + str(macs))
4122 matches = get_permanent_neighbors("ap-br0")
4123 logger.info("After disconnect: " + str(matches))
4124 if len(matches) > 0:
4125 raise Exception("Unexpected neighbor entries after disconnect")
4127 cmd = subprocess.Popen(['ebtables', '-L', '--Lc'],
4128 stdout=subprocess.PIPE)
4129 res = cmd.stdout.read()
4131 logger.info("ebtables results:\n" + res)
4133 # Verify that expected ARP messages were seen and no unexpected
4134 # ARP messages were seen.
4136 arp_req = tshark_get_arp(cap_dev0, "arp.opcode == 1")
4137 arp_reply = tshark_get_arp(cap_dev0, "arp.opcode == 2")
4138 logger.info("dev0 seen ARP requests:\n" + str(arp_req))
4139 logger.info("dev0 seen ARP replies:\n" + str(arp_reply))
4141 if [ 'ff:ff:ff:ff:ff:ff', addr1,
4142 addr1, '192.168.1.100',
4143 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4144 raise Exception("dev0 saw ARP request from dev1")
4145 if [ 'ff:ff:ff:ff:ff:ff', addr2,
4146 addr2, '192.168.1.103',
4147 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4148 raise Exception("dev0 saw ARP request from dev2")
4149 # TODO: Uncomment once fixed in kernel
4150 #if [ 'ff:ff:ff:ff:ff:ff', bssid,
4151 # bssid, '192.168.1.101',
4152 # '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4153 # raise Exception("dev0 saw ARP request from br")
4158 raise Exception("Unexpected foreign ARP request on dev0")
4160 arp_req = tshark_get_arp(cap_dev1, "arp.opcode == 1")
4161 arp_reply = tshark_get_arp(cap_dev1, "arp.opcode == 2")
4162 logger.info("dev1 seen ARP requests:\n" + str(arp_req))
4163 logger.info("dev1 seen ARP replies:\n" + str(arp_reply))
4165 if [ 'ff:ff:ff:ff:ff:ff', addr2,
4166 addr2, '192.168.1.103',
4167 '00:00:00:00:00:00', '192.168.1.123' ] in arp_req:
4168 raise Exception("dev1 saw ARP request from dev2")
4169 if [addr1, addr0, addr0, '192.168.1.123', addr1, '192.168.1.100'] not in arp_reply:
4170 raise Exception("dev1 did not get ARP response for 192.168.1.123")
4175 raise Exception("Unexpected foreign ARP request on dev1")
4177 arp_req = tshark_get_arp(cap_dev2, "arp.opcode == 1")
4178 arp_reply = tshark_get_arp(cap_dev2, "arp.opcode == 2")
4179 logger.info("dev2 seen ARP requests:\n" + str(arp_req))
4180 logger.info("dev2 seen ARP replies:\n" + str(arp_reply))
4183 addr0, '192.168.1.123',
4184 addr2, '192.168.1.103' ] not in arp_reply:
4185 raise Exception("dev2 did not get ARP response for 192.168.1.123")
4187 arp_req = tshark_get_arp(cap_br, "arp.opcode == 1")
4188 arp_reply = tshark_get_arp(cap_br, "arp.opcode == 2")
4189 logger.info("br seen ARP requests:\n" + str(arp_req))
4190 logger.info("br seen ARP replies:\n" + str(arp_reply))
4192 # TODO: Uncomment once fixed in kernel
4194 # addr0, '192.168.1.123',
4195 # bssid, '192.168.1.101' ] not in arp_reply:
4196 # raise Exception("br did not get ARP response for 192.168.1.123")
4198 ns = tshark_get_ns(cap_dev0)
4199 logger.info("dev0 seen NS: " + str(ns))
4200 na = tshark_get_na(cap_dev0)
4201 logger.info("dev0 seen NA: " + str(na))
4203 if [ addr0, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:cccc::2',
4204 'aaaa:bbbb:dddd::2', addr1 ] not in na:
4205 raise Exception("dev0 did not get NA for aaaa:bbbb:dddd::2")
4210 raise Exception("Unexpected foreign NS on dev0: " + str(req))
4212 ns = tshark_get_ns(cap_dev1)
4213 logger.info("dev1 seen NS: " + str(ns))
4214 na = tshark_get_na(cap_dev1)
4215 logger.info("dev1 seen NA: " + str(na))
4217 if [ addr1, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:dddd::2',
4218 'aaaa:bbbb:cccc::2', addr0 ] not in na:
4219 raise Exception("dev1 did not get NA for aaaa:bbbb:cccc::2")
4224 raise Exception("Unexpected foreign NS on dev1: " + str(req))
4226 ns = tshark_get_ns(cap_dev2)
4227 logger.info("dev2 seen NS: " + str(ns))
4228 na = tshark_get_na(cap_dev2)
4229 logger.info("dev2 seen NA: " + str(na))
4231 # FIX: enable once kernel implementation for proxyarp IPv6 is fixed
4232 #if [ addr2, addr0, 'aaaa:bbbb:cccc::2', 'aaaa:bbbb:ff00::2',
4233 # 'aaaa:bbbb:cccc::2', addr0 ] not in na:
4234 # raise Exception("dev2 did not get NA for aaaa:bbbb:cccc::2")
4235 #if [ addr2, addr1, 'aaaa:bbbb:dddd::2', 'aaaa:bbbb:ff00::2',
4236 # 'aaaa:bbbb:dddd::2', addr1 ] not in na:
4237 # raise Exception("dev2 did not get NA for aaaa:bbbb:dddd::2")
4238 #if [ addr2, addr1, 'aaaa:bbbb:eeee::2', 'aaaa:bbbb:ff00::2',
4239 # 'aaaa:bbbb:eeee::2', addr1 ] not in na:
4240 # raise Exception("dev2 did not get NA for aaaa:bbbb:eeee::2")
4242 def test_proxyarp_open(dev, apdev, params):
4243 """ProxyARP with open network"""
4245 _test_proxyarp_open(dev, apdev, params)
4247 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
4248 stderr=open('/dev/null', 'w'))
4249 subprocess.call(['brctl', 'delbr', 'ap-br0'],
4250 stderr=open('/dev/null', 'w'))
4252 def test_proxyarp_open_ebtables(dev, apdev, params):
4253 """ProxyARP with open network"""
4255 _test_proxyarp_open(dev, apdev, params, ebtables=True)
4258 subprocess.call(['ebtables', '-F', 'FORWARD'])
4259 subprocess.call(['ebtables', '-F', 'OUTPUT'])
4262 subprocess.call(['ip', 'link', 'set', 'dev', 'ap-br0', 'down'],
4263 stderr=open('/dev/null', 'w'))
4264 subprocess.call(['brctl', 'delbr', 'ap-br0'],
4265 stderr=open('/dev/null', 'w'))
4267 def test_ap_hs20_connect_deinit(dev, apdev):
4268 """Hotspot 2.0 connection interrupted with deinit"""
4269 check_eap_capa(dev[0], "MSCHAPV2")
4270 bssid = apdev[0]['bssid']
4271 params = hs20_ap_params()
4272 params['hessid'] = bssid
4273 hapd = hostapd.add_ap(apdev[0], params)
4275 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
4276 wpas.interface_add("wlan5", drv_params="")
4278 wpas.flush_scan_cache()
4279 wpas.add_cred_values({ 'realm': "example.com",
4280 'username': "hs20-test",
4281 'password': "password",
4282 'ca_cert': "auth_serv/ca.pem",
4283 'domain': "example.com" })
4285 wpas.scan_for_bss(bssid, freq=2412)
4288 wpas.request("INTERWORKING_SELECT freq=2412")
4290 id = wpas.request("RADIO_WORK add block-work")
4291 ev = wpas.wait_event(["GAS-QUERY-START", "EXT-RADIO-WORK-START"], timeout=5)
4293 raise Exception("Timeout while waiting radio work to start")
4294 ev = wpas.wait_event(["GAS-QUERY-START", "EXT-RADIO-WORK-START"], timeout=5)
4296 raise Exception("Timeout while waiting radio work to start (2)")
4298 # Remove the interface while the gas-query radio work is still pending and
4299 # GAS query has not yet been started.
4300 wpas.interface_remove("wlan5")
4302 def test_ap_hs20_anqp_format_errors(dev, apdev):
4303 """Interworking network selection and ANQP format errors"""
4304 bssid = apdev[0]['bssid']
4305 params = hs20_ap_params()
4306 params['hessid'] = bssid
4307 hapd = hostapd.add_ap(apdev[0], params)
4309 dev[0].hs20_enable()
4310 values = { 'realm': "example.com",
4311 'ca_cert': "auth_serv/ca.pem",
4312 'username': "hs20-test",
4313 'password': "password",
4314 'domain': "example.com" }
4315 id = dev[0].add_cred_values(values)
4317 dev[0].scan_for_bss(bssid, freq="2412")
4319 tests = [ "00", "ffff", "010011223344", "020008000005112233445500",
4320 "01000400000000", "01000000000000",
4321 "01000300000200", "0100040000ff0000", "01000300000100",
4323 "01000600000056112233",
4324 "01000900000002050001000111",
4325 "01000600000001000000", "01000600000001ff0000",
4326 "01000600000001020001",
4327 "010008000000010400010001", "0100080000000104000100ff",
4328 "010011000000010d00050200020100030005000600",
4331 hapd.set("anqp_elem", "263:" + t)
4332 dev[0].request("INTERWORKING_SELECT freq=2412")
4333 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=5)
4335 raise Exception("Network selection timed out")
4336 dev[0].dump_monitor()
4338 dev[0].remove_cred(id)
4339 id = dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "AKA",
4340 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
4342 tests = [ "00", "0100", "0001", "00ff", "000200ff", "0003000101",
4345 hapd.set("anqp_elem", "264:" + t)
4346 dev[0].request("INTERWORKING_SELECT freq=2412")
4347 ev = dev[0].wait_event(["INTERWORKING-NO-MATCH"], timeout=5)
4349 raise Exception("Network selection timed out")
4350 dev[0].dump_monitor()
4352 def test_ap_hs20_cred_with_nai_realm(dev, apdev):
4353 """Hotspot 2.0 network selection and cred_with_nai_realm cred->realm"""
4354 bssid = apdev[0]['bssid']
4355 params = hs20_ap_params()
4356 params['hessid'] = bssid
4357 hostapd.add_ap(apdev[0], params)
4359 dev[0].hs20_enable()
4361 id = dev[0].add_cred_values({ 'realm': "example.com",
4363 'password': "secret",
4364 'domain': "example.com",
4366 interworking_select(dev[0], bssid, "home", freq=2412)
4367 dev[0].remove_cred(id)
4369 id = dev[0].add_cred_values({ 'realm': "foo.com",
4371 'password': "secret",
4372 'domain': "example.com",
4373 'roaming_consortium': "112234",
4375 interworking_select(dev[0], bssid, "home", freq=2412, no_match=True)
4376 dev[0].remove_cred(id)
4378 def test_ap_hs20_cred_and_no_roaming_consortium(dev, apdev):
4379 """Hotspot 2.0 network selection and no roaming consortium"""
4380 bssid = apdev[0]['bssid']
4381 params = hs20_ap_params()
4382 params['hessid'] = bssid
4383 del params['roaming_consortium']
4384 hostapd.add_ap(apdev[0], params)
4386 dev[0].hs20_enable()
4388 id = dev[0].add_cred_values({ 'realm': "example.com",
4390 'password': "secret",
4391 'domain': "example.com",
4392 'roaming_consortium': "112234",
4394 interworking_select(dev[0], bssid, "home", freq=2412, no_match=True)
4396 def test_ap_hs20_interworking_oom(dev, apdev):
4397 """Hotspot 2.0 network selection and OOM"""
4398 bssid = apdev[0]['bssid']
4399 params = hs20_ap_params()
4400 params['hessid'] = bssid
4401 params['nai_realm'] = [ "0,no.match.here;example.com;no.match.here.either,21[2:1][5:7]",
4402 "0,example.com,13[5:6],21[2:4][5:7]",
4403 "0,another.example.com" ]
4404 hostapd.add_ap(apdev[0], params)
4406 dev[0].hs20_enable()
4408 id = dev[0].add_cred_values({ 'realm': "example.com",
4410 'password': "secret",
4411 'domain': "example.com",
4414 dev[0].scan_for_bss(bssid, freq="2412")
4416 funcs = [ "wpabuf_alloc;interworking_anqp_send_req",
4417 "anqp_build_req;interworking_anqp_send_req",
4418 "gas_query_req;interworking_anqp_send_req",
4419 "dup_binstr;nai_realm_parse_realm",
4420 "=nai_realm_parse_realm",
4422 "=nai_realm_match" ]
4424 with alloc_fail(dev[0], 1, func):
4425 dev[0].request("INTERWORKING_SELECT auto freq=2412")
4426 ev = dev[0].wait_event(["Starting ANQP"], timeout=5)
4428 raise Exception("ANQP did not start")
4429 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4431 def test_ap_hs20_no_cred_connect(dev, apdev):
4432 """Hotspot 2.0 and connect attempt without credential"""
4433 bssid = apdev[0]['bssid']
4434 params = hs20_ap_params()
4435 params['hessid'] = bssid
4436 hapd = hostapd.add_ap(apdev[0], params)
4438 dev[0].hs20_enable()
4439 dev[0].scan_for_bss(bssid, freq="2412")
4440 if "FAIL" not in dev[0].request("INTERWORKING_CONNECT " + bssid):
4441 raise Exception("Unexpected INTERWORKING_CONNECT success")
4443 def test_ap_hs20_anqp_invalid_gas_response(dev, apdev):
4444 """Hotspot 2.0 network selection and invalid GAS response"""
4445 bssid = apdev[0]['bssid']
4446 params = hs20_ap_params()
4447 params['hessid'] = bssid
4448 hapd = hostapd.add_ap(apdev[0], params)
4450 dev[0].scan_for_bss(bssid, freq="2412")
4451 hapd.set("ext_mgmt_frame_handling", "1")
4453 dev[0].hs20_enable()
4455 id = dev[0].add_cred_values({ 'realm': "example.com",
4457 'password': "secret",
4458 'domain': "example.com",
4459 'roaming_consortium': "112234",
4461 dev[0].request("INTERWORKING_SELECT freq=2412")
4463 query = gas_rx(hapd)
4464 gas = parse_gas(query['payload'])
4466 logger.info("ANQP: Unexpected Advertisement Protocol in response")
4467 resp = action_response(query)
4468 adv_proto = struct.pack('8B', 108, 6, 127, 0xdd, 0x00, 0x11, 0x22, 0x33)
4469 data = struct.pack('<H', 0)
4470 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4471 GAS_INITIAL_RESPONSE,
4472 gas['dialog_token'], 0, 0) + adv_proto + data
4473 send_gas_resp(hapd, resp)
4475 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4477 raise Exception("No ANQP-QUERY-DONE seen")
4478 if "result=INVALID_FRAME" not in ev:
4479 raise Exception("Unexpected result: " + ev)
4481 dev[0].request("INTERWORKING_SELECT freq=2412")
4483 query = gas_rx(hapd)
4484 gas = parse_gas(query['payload'])
4486 logger.info("ANQP: Invalid element length for Info ID 1234")
4487 resp = action_response(query)
4488 adv_proto = struct.pack('BBBB', 108, 2, 127, 0)
4489 elements = struct.pack('<HH', 1234, 1)
4490 data = struct.pack('<H', len(elements)) + elements
4491 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4492 GAS_INITIAL_RESPONSE,
4493 gas['dialog_token'], 0, 0) + adv_proto + data
4494 send_gas_resp(hapd, resp)
4496 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4498 raise Exception("No ANQP-QUERY-DONE seen")
4499 if "result=INVALID_FRAME" not in ev:
4500 raise Exception("Unexpected result: " + ev)
4502 with alloc_fail(dev[0], 1, "=anqp_add_extra"):
4503 dev[0].request("INTERWORKING_SELECT freq=2412")
4505 query = gas_rx(hapd)
4506 gas = parse_gas(query['payload'])
4508 resp = action_response(query)
4509 elements = struct.pack('<HHHH', 1, 0, 1, 0)
4510 data = struct.pack('<H', len(elements)) + elements
4511 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4512 GAS_INITIAL_RESPONSE,
4513 gas['dialog_token'], 0, 0) + adv_proto + data
4514 send_gas_resp(hapd, resp)
4516 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4518 raise Exception("No ANQP-QUERY-DONE seen")
4519 if "result=SUCCESS" not in ev:
4520 raise Exception("Unexpected result: " + ev)
4522 with alloc_fail(dev[0], 1, "wpabuf_alloc_copy;anqp_add_extra"):
4523 dev[0].request("INTERWORKING_SELECT freq=2412")
4525 query = gas_rx(hapd)
4526 gas = parse_gas(query['payload'])
4528 resp = action_response(query)
4529 elements = struct.pack('<HHHH', 1, 0, 1, 0)
4530 data = struct.pack('<H', len(elements)) + elements
4531 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4532 GAS_INITIAL_RESPONSE,
4533 gas['dialog_token'], 0, 0) + adv_proto + data
4534 send_gas_resp(hapd, resp)
4536 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4538 raise Exception("No ANQP-QUERY-DONE seen")
4539 if "result=SUCCESS" not in ev:
4540 raise Exception("Unexpected result: " + ev)
4542 tests = [ struct.pack('<HH', 0xdddd, 0),
4543 struct.pack('<HH3B', 0xdddd, 3, 0x50, 0x6f, 0x9a),
4544 struct.pack('<HH4B', 0xdddd, 4, 0x50, 0x6f, 0x9a, 0),
4545 struct.pack('<HH4B', 0xdddd, 4, 0x11, 0x22, 0x33, 0),
4546 struct.pack('<HHHH', 1, 0, 1, 0) ]
4547 for elements in tests:
4548 dev[0].request("INTERWORKING_SELECT freq=2412")
4550 query = gas_rx(hapd)
4551 gas = parse_gas(query['payload'])
4553 resp = action_response(query)
4554 data = struct.pack('<H', len(elements)) + elements
4555 resp['payload'] = struct.pack('<BBBHH', ACTION_CATEG_PUBLIC,
4556 GAS_INITIAL_RESPONSE,
4557 gas['dialog_token'], 0, 0) + adv_proto + data
4558 send_gas_resp(hapd, resp)
4560 ev = dev[0].wait_event(["ANQP-QUERY-DONE"], timeout=5)
4562 raise Exception("No ANQP-QUERY-DONE seen")
4563 if "result=SUCCESS" not in ev:
4564 raise Exception("Unexpected result: " + ev)
4566 def test_ap_hs20_set_profile_failures(dev, apdev):
4567 """Hotspot 2.0 and failures during profile configuration"""
4568 bssid = apdev[0]['bssid']
4569 params = hs20_ap_params()
4570 params['hessid'] = bssid
4571 params['anqp_3gpp_cell_net'] = "555,444"
4572 hapd = hostapd.add_ap(apdev[0], params)
4574 dev[0].hs20_enable()
4575 dev[0].scan_for_bss(bssid, freq="2412")
4577 id = dev[0].add_cred_values({ 'realm': "example.com",
4578 'domain': "example.com",
4580 'password': "secret",
4582 interworking_select(dev[0], bssid, "home", freq=2412)
4583 dev[0].dump_monitor()
4584 dev[0].request("NOTE ssid->eap.eap_methods = os_malloc()")
4585 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
4586 dev[0].request("INTERWORKING_CONNECT " + bssid)
4587 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4588 dev[0].remove_cred(id)
4590 id = dev[0].add_cred_values({ 'realm': "example.com",
4591 'domain': "example.com",
4592 'username': "hs20-test-with-domain@example.com",
4593 'password': "password" })
4594 interworking_select(dev[0], bssid, "home", freq=2412)
4595 dev[0].dump_monitor()
4596 dev[0].request("NOTE anon = os_malloc()")
4597 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
4598 dev[0].request("INTERWORKING_CONNECT " + bssid)
4599 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4600 dev[0].request("NOTE Successful connection with cred->username including realm")
4601 dev[0].request("INTERWORKING_CONNECT " + bssid)
4602 dev[0].wait_connected()
4603 dev[0].remove_cred(id)
4604 dev[0].wait_disconnected()
4606 id = dev[0].add_cred_values({ 'realm': "example.com",
4607 'domain': "example.com",
4608 'username': "hs20-test",
4609 'password': "password" })
4610 interworking_select(dev[0], bssid, "home", freq=2412)
4611 dev[0].dump_monitor()
4612 dev[0].request("NOTE anon = os_malloc() (second)")
4613 with alloc_fail(dev[0], 1, "interworking_set_eap_params"):
4614 dev[0].request("INTERWORKING_CONNECT " + bssid)
4615 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4616 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect"):
4617 dev[0].request("INTERWORKING_CONNECT " + bssid)
4618 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4619 with alloc_fail(dev[0], 1, "=interworking_connect"):
4620 dev[0].request("INTERWORKING_CONNECT " + bssid)
4621 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4622 dev[0].request("NOTE wpa_config_set(eap)")
4623 with alloc_fail(dev[0], 1, "wpa_config_parse_eap;wpa_config_set;interworking_connect"):
4624 dev[0].request("INTERWORKING_CONNECT " + bssid)
4625 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4626 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_MSCHAPV2-phase2)")
4627 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4628 dev[0].request("INTERWORKING_CONNECT " + bssid)
4629 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4630 dev[0].remove_cred(id)
4632 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
4633 'domain': "example.com",
4634 'username': "hs20-test",
4635 'password': "password",
4637 'phase2': "auth=MSCHAPV2" })
4638 interworking_select(dev[0], bssid, "home", freq=2412)
4639 dev[0].dump_monitor()
4640 dev[0].request("NOTE anon = os_strdup()")
4641 with alloc_fail(dev[0], 2, "interworking_set_eap_params"):
4642 dev[0].request("INTERWORKING_CONNECT " + bssid)
4643 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4644 dev[0].request("NOTE wpa_config_set_quoted(anonymous_identity)")
4645 with alloc_fail(dev[0], 1, "=wpa_config_set_quoted;interworking_set_eap_params"):
4646 dev[0].request("INTERWORKING_CONNECT " + bssid)
4647 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4648 dev[0].request("NOTE Successful connection with cred->realm not included")
4649 dev[0].request("INTERWORKING_CONNECT " + bssid)
4650 dev[0].wait_connected()
4651 dev[0].remove_cred(id)
4652 dev[0].wait_disconnected()
4654 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
4655 'domain': "example.com",
4656 'realm': "example.com",
4658 'password': "password",
4660 interworking_select(dev[0], bssid, "home", freq=2412)
4661 dev[0].dump_monitor()
4662 dev[0].request("NOTE id = os_strdup()")
4663 with alloc_fail(dev[0], 2, "interworking_set_eap_params"):
4664 dev[0].request("INTERWORKING_CONNECT " + bssid)
4665 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4666 dev[0].request("NOTE wpa_config_set_quoted(identity)")
4667 with alloc_fail(dev[0], 1, "=wpa_config_set_quoted;interworking_set_eap_params"):
4668 dev[0].request("INTERWORKING_CONNECT " + bssid)
4669 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4670 dev[0].remove_cred(id)
4672 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
4673 'domain': "example.com",
4674 'realm': "example.com",
4676 'password': "password",
4678 interworking_select(dev[0], bssid, "home", freq=2412)
4679 dev[0].dump_monitor()
4680 dev[0].request("NOTE wpa_config_set_quoted(identity) (second)")
4681 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_set_eap_params"):
4682 dev[0].request("INTERWORKING_CONNECT " + bssid)
4683 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4684 dev[0].request("NOTE wpa_config_set_quoted(password)")
4685 with alloc_fail(dev[0], 3, "=wpa_config_set_quoted;interworking_set_eap_params"):
4686 dev[0].request("INTERWORKING_CONNECT " + bssid)
4687 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4688 with alloc_fail(dev[0], 1, "wpa_config_add_network;interworking_connect_roaming_consortium"):
4689 dev[0].request("INTERWORKING_CONNECT " + bssid)
4690 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4691 with alloc_fail(dev[0], 1, "=interworking_connect_roaming_consortium"):
4692 dev[0].request("INTERWORKING_CONNECT " + bssid)
4693 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4694 dev[0].remove_cred(id)
4696 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
4697 'domain': "example.com",
4698 'realm': "example.com",
4701 dev[0].set_cred(id, "password", "ext:password");
4702 interworking_select(dev[0], bssid, "home", freq=2412)
4703 dev[0].dump_monitor()
4704 dev[0].request("NOTE wpa_config_set(password)")
4705 with alloc_fail(dev[0], 3, "wpa_config_set;interworking_set_eap_params"):
4706 dev[0].request("INTERWORKING_CONNECT " + bssid)
4707 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4708 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
4709 dev[0].request("INTERWORKING_CONNECT " + bssid)
4710 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4711 dev[0].remove_cred(id)
4713 id = dev[0].add_cred_values({ 'realm': "example.com",
4714 'domain': "example.com",
4715 'username': "certificate-user",
4716 'phase1': "include_tls_length=0",
4717 'domain_suffix_match': "example.com",
4718 'ca_cert': "auth_serv/ca.pem",
4719 'client_cert': "auth_serv/user.pem",
4720 'private_key': "auth_serv/user.key",
4721 'private_key_passwd': "secret" })
4722 interworking_select(dev[0], bssid, "home", freq=2412)
4723 dev[0].dump_monitor()
4724 dev[0].request("NOTE wpa_config_set_quoted(client_cert)")
4725 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_set_eap_params"):
4726 dev[0].request("INTERWORKING_CONNECT " + bssid)
4727 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4728 dev[0].request("NOTE wpa_config_set_quoted(private_key)")
4729 with alloc_fail(dev[0], 3, "=wpa_config_set_quoted;interworking_set_eap_params"):
4730 dev[0].request("INTERWORKING_CONNECT " + bssid)
4731 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4732 dev[0].request("NOTE wpa_config_set_quoted(private_key_passwd)")
4733 with alloc_fail(dev[0], 4, "=wpa_config_set_quoted;interworking_set_eap_params"):
4734 dev[0].request("INTERWORKING_CONNECT " + bssid)
4735 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4736 dev[0].request("NOTE wpa_config_set_quoted(ca_cert)")
4737 with alloc_fail(dev[0], 5, "=wpa_config_set_quoted;interworking_set_eap_params"):
4738 dev[0].request("INTERWORKING_CONNECT " + bssid)
4739 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4740 dev[0].request("NOTE wpa_config_set_quoted(domain_suffix_match)")
4741 with alloc_fail(dev[0], 6, "=wpa_config_set_quoted;interworking_set_eap_params"):
4742 dev[0].request("INTERWORKING_CONNECT " + bssid)
4743 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4744 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
4745 dev[0].request("INTERWORKING_CONNECT " + bssid)
4746 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4747 dev[0].remove_cred(id)
4749 id = dev[0].add_cred_values({ 'imsi': "555444-333222111", 'eap': "SIM",
4750 'milenage': "5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123"})
4751 interworking_select(dev[0], bssid, freq=2412)
4752 dev[0].dump_monitor()
4753 with alloc_fail(dev[0], 1, "interworking_set_hs20_params"):
4754 dev[0].request("INTERWORKING_CONNECT " + bssid)
4755 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4756 dev[0].request("NOTE wpa_config_set_quoted(password;milenage)")
4757 with alloc_fail(dev[0], 2, "=wpa_config_set_quoted;interworking_connect_3gpp"):
4758 dev[0].request("INTERWORKING_CONNECT " + bssid)
4759 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4760 dev[0].request("NOTE wpa_config_set(eap)")
4761 with alloc_fail(dev[0], 1, "wpa_config_parse_eap;wpa_config_set;interworking_connect_3gpp"):
4762 dev[0].request("INTERWORKING_CONNECT " + bssid)
4763 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4764 dev[0].request("NOTE set_root_nai:wpa_config_set(identity)")
4765 with alloc_fail(dev[0], 1, "wpa_config_parse_str;interworking_connect_3gpp"):
4766 dev[0].request("INTERWORKING_CONNECT " + bssid)
4767 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4768 dev[0].remove_cred(id)
4770 id = dev[0].add_cred_values({ 'roaming_consortium': "112233",
4771 'username': "user@example.com",
4772 'password': "password" })
4773 interworking_select(dev[0], bssid, freq=2412)
4774 dev[0].dump_monitor()
4775 dev[0].request("NOTE Interworking: No EAP method set for credential using roaming consortium")
4776 dev[0].request("INTERWORKING_CONNECT " + bssid)
4777 dev[0].remove_cred(id)
4780 params = hs20_ap_params()
4781 params['nai_realm'] = "0,example.com,25[3:26]"
4782 hapd = hostapd.add_ap(apdev[0], params)
4783 id = dev[0].add_cred_values({ 'realm': "example.com",
4784 'domain': "example.com",
4785 'username': "hs20-test",
4786 'password': "password" })
4787 interworking_select(dev[0], bssid, freq=2412)
4788 dev[0].dump_monitor()
4789 dev[0].request("NOTE wpa_config_set(PEAP/FAST-phase1)")
4790 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4791 dev[0].request("INTERWORKING_CONNECT " + bssid)
4792 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4793 dev[0].request("NOTE wpa_config_set(PEAP/FAST-pac_interworking)")
4794 with alloc_fail(dev[0], 2, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4795 dev[0].request("INTERWORKING_CONNECT " + bssid)
4796 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4797 dev[0].request("NOTE wpa_config_set(PEAP/FAST-phase2)")
4798 with alloc_fail(dev[0], 3, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4799 dev[0].request("INTERWORKING_CONNECT " + bssid)
4800 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4803 params = hs20_ap_params()
4804 params['nai_realm'] = "0,example.com,21"
4805 hapd = hostapd.add_ap(apdev[0], params)
4806 interworking_select(dev[0], bssid, freq=2412)
4807 dev[0].request("NOTE wpa_config_set(TTLS-defaults-phase2)")
4808 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4809 dev[0].request("INTERWORKING_CONNECT " + bssid)
4810 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4813 params = hs20_ap_params()
4814 params['nai_realm'] = "0,example.com,21[2:3]"
4815 hapd = hostapd.add_ap(apdev[0], params)
4816 interworking_select(dev[0], bssid, freq=2412)
4817 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_MSCHAP-phase2)")
4818 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4819 dev[0].request("INTERWORKING_CONNECT " + bssid)
4820 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4823 params = hs20_ap_params()
4824 params['nai_realm'] = "0,example.com,21[2:2]"
4825 hapd = hostapd.add_ap(apdev[0], params)
4826 interworking_select(dev[0], bssid, freq=2412)
4827 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_CHAP-phase2)")
4828 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4829 dev[0].request("INTERWORKING_CONNECT " + bssid)
4830 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4833 params = hs20_ap_params()
4834 params['nai_realm'] = "0,example.com,21[2:1]"
4835 hapd = hostapd.add_ap(apdev[0], params)
4836 interworking_select(dev[0], bssid, freq=2412)
4837 dev[0].request("NOTE wpa_config_set(TTLS-NON_EAP_PAP-phase2)")
4838 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4839 dev[0].request("INTERWORKING_CONNECT " + bssid)
4840 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4843 params = hs20_ap_params()
4844 params['nai_realm'] = "0,example.com,21[3:26]"
4845 hapd = hostapd.add_ap(apdev[0], params)
4846 interworking_select(dev[0], bssid, freq=2412)
4847 dev[0].request("NOTE wpa_config_set(TTLS-EAP-MSCHAPV2-phase2)")
4848 with alloc_fail(dev[0], 1, "wpa_config_parse_str;wpa_config_set;interworking_connect"):
4849 dev[0].request("INTERWORKING_CONNECT " + bssid)
4850 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
4852 dev[0].remove_cred(id)