[PATCH 3/5] tests: Add testcase for (reassoc) roam failure due to auth timeout

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Add testcase to verify failed roaming attempt due to authentication
timeout blacklists the correct AP. Roaming attempt is performed
with the reassociate command and bssid_set=1. Driver capabilities
are forced to non-SME and driver roaming (BSS selection) mode.

Signed-off-by: Mikael Kanstrup <mikael.kanstrup@xxxxxxxxxxxxxx>
---
 tests/hwsim/test_ap_roam.py | 42 ++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)

diff --git a/tests/hwsim/test_ap_roam.py b/tests/hwsim/test_ap_roam.py
index 0da1c7f..1fc8df1 100644
--- a/tests/hwsim/test_ap_roam.py
+++ b/tests/hwsim/test_ap_roam.py
@@ -11,6 +11,7 @@ logger = logging.getLogger()
 
 import hwsim_utils
 import hostapd
+from wpasupplicant import WpaSupplicant
 
 @remote_compatible
 def test_ap_roam_open(dev, apdev):
@@ -61,6 +62,47 @@ def test_ap_roam_wpa2_psk(dev, apdev):
     dev[0].roam(apdev[0]['bssid'])
     hwsim_utils.test_connectivity(dev[0], hapd0)
 
+def get_blacklist(dev):
+    return dev.request("BLACKLIST").splitlines()
+
+def test_ap_roam_with_reassoc_auth_timeout(dev, apdev, params):
+    """Roam using reassoc between two APs and authentication times out"""
+    wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
+    wpas.interface_add("wlan5", drv_params="force_connect_cmd=1,force_bss_selection=1")
+
+    try:
+        params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
+        hapd0 = hostapd.add_ap(apdev[0], params)
+        bssid0 = hapd0.own_addr()
+
+        id = wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
+        hwsim_utils.test_connectivity(wpas, hapd0)
+
+        hapd1 = hostapd.add_ap(apdev[1], params)
+        bssid1 = hapd1.own_addr()
+        wpas.scan_for_bss(bssid1, freq=2412)
+
+        if "OK" not in wpas.request("SET_NETWORK " + str(id) + " bssid " + bssid1):
+            raise Exception("SET_NETWORK failed")
+        if "OK" not in wpas.global_request("SET IGNORE_AUTH_RESP 1"):
+            raise Exception("SET IGNORE_AUTH_RESP failed")
+        if "OK" not in wpas.request("REASSOCIATE"):
+            raise Exception("REASSOCIATE failed")
+
+        logger.info("Wait ~10s for auth timeout...")
+        time.sleep(10)
+        ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], 12)
+        if not ev:
+            raise Exception("CTRL-EVENT-SCAN-STARTED not seen");
+
+        b = get_blacklist(wpas)
+        if bssid0 in b:
+            raise Exception("Unexpected blacklist contents: " + str(b))
+    except Exception as e:
+        wpas.reset()
+        raise e
+    wpas.reset()
+
 def test_ap_roam_wpa2_psk_failed(dev, apdev, params):
     """Roam failure with WPA2-PSK AP due to wrong passphrase"""
     params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
-- 
2.9.0.137.gcf4c2cf


_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux