Lines Matching refs:test

5 special test builds to be used for testing functionality related to
26 functionality. The test commands in wpa_supplicant/hostapd control
31 In theory, the test functionality is available with most drivers
35 sniffer captures and verify that the test tools are behaving correctly.
37 wpa_supplicant is used to control a test device in station mode to test
38 an AP and hostapd is similarly used to control a test device in AP mode
39 to test a station.
41 Various data traffic generators could be used to test the behavior, but
42 this document focuses on using ping to test unicast traffic and arping
43 to test broadcast traffic. To keep things simple and to reduce
50 Example hostapd.conf for the test tool in AP mode:
59 ssid=test-psk
65 Example wpa_supplicant.conf for the test tool in station mode:
70 ssid="test-psk"
79 Device under test: 192.168.1.2/24
85 ping is used to test whether unicast frames go through on the data
115 arping is used to test broadcast connectivity.
139 cleared by disconnection and reconnecting the station (the test tool or
156 unexpected behavior has been detected, e.g., when the test tool ends up
157 clearing its packet number to test replay protection. That can help in
165 Start hostapd and use hostapd_cli on the test device to control testing
173 something is wrong in the test setup and that needs to be resolved
184 that unicast traffic can recover once the packet number from the test
197 from the test device increases beyond the value used prior to that
204 Start the AP (DUT) and start wpa_supplicant on the test device to
205 connect to the network. Use wpa_cli to control the test device.
207 <3>SME: Trying to authenticate with <DUT MAC address> (SSID='test-psk' freq=5240 MHz)
209 <3>Trying to associate with <DUT MAC address> (SSID='test-psk' freq=5240 MHz)
222 traffic can recover once the packet number from the test device
226 there is no need to test AP replay protection behavior separately with
328 Start the AP (DUT) and start wpa_supplicant on the test device to
329 connect to the network. Use wpa_cli to control the test device.
331 <3>SME: Trying to authenticate with <DUT MAC address> (SSID='test-psk' freq=5240 MHz)
333 <3>Trying to associate with <DUT MAC address> (SSID='test-psk' freq=5240 MHz)
355 This test case requires a sniffer to be used and manually analyzed.
357 Enable FT on the DUT AP (likely two AP devices needed), connect test
361 - verify unicast traffic from the AP to test station (either ping from
364 - verify unicast traffic from the AP to test station (either ping from
369 the test station (this is more or less identical to the previous one and
372 test station before the last Reassociation Request frame and the PN in