/hostap-latest/tests/hwsim/ |
D | test_wpas_ap.py | 19 def wait_ap_ready(dev): argument 20 ev = dev.wait_event(["CTRL-EVENT-CONNECTED"]) 24 def set_regdom(dev, country): argument 25 dev.set("country", country) 27 ev = dev.wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=5) 34 def log_channel_info(dev): argument 35 gen = dev.get_status_field('wifi_generation') 38 sig = dev.request("SIGNAL_POLL").splitlines() 41 def test_wpas_ap_open(dev): argument 43 if "FAIL" not in dev[0].request("DEAUTHENTICATE 00:11:22:33:44:55"): [all …]
|
D | test_p2p_persistent.py | 17 def test_persistent_group(dev): argument 19 form(dev[0], dev[1]) 20 invite_from_cli(dev[0], dev[1]) 21 invite_from_go(dev[0], dev[1]) 25 for n in dev[0].list_networks(p2p=True): 31 clients = dev[0].global_request("GET_NETWORK " + id + " p2p_client_list").rstrip() 32 if dev[1].p2p_dev_addr() not in clients: 34 if "FAIL" not in dev[1].request("SELECT_NETWORK " + str(id)): 36 if "FAIL" not in dev[1].request("SELECT_NETWORK 1234567"): 38 if "FAIL" not in dev[1].request("ENABLE_NETWORK " + str(id)): [all …]
|
D | test_wpas_mesh.py | 24 def check_mesh_support(dev, secure=False): argument 25 if "MESH" not in dev.get_capability("modes"): 28 check_sae_capab(dev) 30 def check_mesh_scan(dev, params, other_started=False, beacon_int=0): argument 32 dev.dump_monitor() 33 id = dev.request("SCAN " + params) 39 ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"]) 45 ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"]) 52 ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"]) 58 ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"]) [all …]
|
D | test_p2p_grpform.py | 23 def test_grpform(dev): argument 26 dev[0].global_request("SET p2p_group_idle 2") 27 [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, 28 r_dev=dev[1], r_intent=0) 30 dev[1].remove_group() 31 ev = dev[0].wait_global_event(["P2P-GROUP-REMOVED"], timeout=10) 37 dev[0].global_request("SET p2p_group_idle 0") 39 def test_grpform_a(dev): argument 41 dev[0].global_request("SET p2p_no_group_iface 0") 42 [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, [all …]
|
D | test_p2p_autogo.py | 22 def test_autogo(dev): argument 24 addr0 = dev[0].p2p_dev_addr() 25 addr2 = dev[2].p2p_dev_addr() 26 res = autogo(dev[0]) 29 res = connect_cli(dev[0], dev[1]) 32 bss = dev[1].get_bss("p2p_dev_addr=" + addr0, res['ifname']) 33 if not bss or bss['bssid'] != dev[0].p2p_interface_addr(): 36 bss = dev[1].get_bss("ID-" + id, res['ifname']) 39 res = dev[1].group_request("BSS RANGE=" + id + "- MASK=0x1") 43 res = dev[1].request("SCAN_RESULTS") [all …]
|
D | test_p2p_wifi_display.py | 14 def test_wifi_display(dev): argument 17 dev[0].request("SET wifi_display 1") 18 dev[0].request("WFD_SUBELEM_SET 0 0006" + wfd_devinfo) 19 if wfd_devinfo not in dev[0].request("WFD_SUBELEM_GET 0"): 23 dev[0].request("WFD_SUBELEM_SET 1 0006020304050607") 25 dev[0].request("WFD_SUBELEM_SET 6 000700000000000000") 27 dev[0].request("WFD_SUBELEM_SET 9 0000") 29 dev[0].request("WFD_SUBELEM_SET 7 00020000") 32 dev[0].request("WFD_SUBELEM_SET 5 " + prot) 35 dev[0].request("WFD_SUBELEM_SET 3 " + video) [all …]
|
D | test_p2p_ext.py | 16 def test_p2p_ext_discovery(dev): argument 18 addr0 = dev[0].p2p_dev_addr() 19 addr1 = dev[1].p2p_dev_addr() 22 if "OK" not in dev[0].request("VENDOR_ELEM_ADD 1 dd050011223344"): 24 res = dev[0].request("VENDOR_ELEM_GET 1") 27 if "OK" not in dev[0].request("VENDOR_ELEM_ADD 1 dd06001122335566"): 29 res = dev[0].request("VENDOR_ELEM_GET 1") 32 res = dev[0].request("VENDOR_ELEM_GET 2") 35 if "OK" not in dev[0].request("VENDOR_ELEM_REMOVE 1 dd050011223344"): 37 res = dev[0].request("VENDOR_ELEM_GET 1") [all …]
|
D | test_nfc_p2p.py | 22 def set_ip_addr_info(dev): argument 23 dev.global_request("SET ip_addr_go 192.168.42.1") 24 dev.global_request("SET ip_addr_mask 255.255.255.0") 25 dev.global_request("SET ip_addr_start 192.168.42.100") 26 dev.global_request("SET ip_addr_end 192.168.42.199") 42 def test_nfc_p2p_go_neg(dev): argument 45 _test_nfc_p2p_go_neg(dev) 47 dev[0].global_request("SET p2p_go_intent 7") 49 def _test_nfc_p2p_go_neg(dev): argument 50 set_ip_addr_info(dev[0]) [all …]
|
D | test_ibss.py | 17 def connect_ibss_cmd(dev, id, freq=2412): argument 18 dev.dump_monitor() 19 dev.select_network(id, freq=str(freq)) 21 def wait_ibss_connection(dev): argument 22 logger.info(dev.ifname + " waiting for IBSS start/join to complete") 23 ev = dev.wait_connected(timeout=20, 51 def add_ibss(dev, ssid, psk=None, proto=None, key_mgmt=None, pairwise=None, argument 54 id = dev.add_network() 55 dev.set_network(id, "mode", "1") 56 dev.set_network(id, "frequency", str(freq)) [all …]
|
D | test_wpas_ctrl.py | 24 def test_wpas_ctrl_network(dev): argument 26 skip_without_tkip(dev[0]) 27 id = dev[0].add_network() 29 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id)): 31 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " name"): 33 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id + 1) + " proto OPEN"): 35 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id)): 37 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id + 1) + " proto"): 40 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " proto \t WPA2 "): 42 res = dev[0].request("GET_NETWORK " + str(id) + " proto") [all …]
|
D | test_dpp.py | 37 def check_dpp_capab(dev, brainpool=False, min_ver=1): argument 38 if "UNKNOWN COMMAND" in dev.request("DPP_BOOTSTRAP_GET_URI 0"): 41 tls = dev.request("GET tls_library") 44 capa = dev.request("GET_CAPABILITY dpp") 52 def wait_dpp_fail(dev, expected=None): argument 53 ev = dev.wait_event(["DPP-FAIL"], timeout=5) 59 def test_dpp_qr_code_parsing(dev, apdev): argument 61 check_dpp_capab(dev[0]) 75 id.append(dev[0].dpp_qr_code(uri)) 77 uri2 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id[-1]) [all …]
|
D | test_p2p_channel.py | 22 def set_country(country, dev=None): argument 25 if dev: 27 ev = dev.wait_global_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=15) 34 def test_p2p_channel_5ghz(dev): argument 37 set_country("US", dev[0]) 38 [i_res, r_res] = go_neg_pin_authorized(i_dev=dev[0], i_intent=15, 39 r_dev=dev[1], r_intent=0, 45 remove_group(dev[0], dev[1]) 48 dev[1].flush_scan_cache() 50 def test_p2p_channel_5ghz_no_vht(dev): argument [all …]
|
D | test_p2p_discovery.py | 26 def test_discovery(dev): argument 28 addr0 = dev[0].p2p_dev_addr() 29 addr1 = dev[1].p2p_dev_addr() 31 dev[0].p2p_find(social=True, delay=1) 32 if not dev[1].discover_peer(addr0): 34 if not dev[0].discover_peer(addr1): 38 dev[0].global_request("P2P_PROV_DISC " + addr1 + " display") 39 ev1 = dev[1].wait_global_event(["P2P-PROV-DISC-SHOW-PIN"], timeout=15) 44 ev0 = dev[0].wait_global_event(["P2P-PROV-DISC-ENTER-PIN", 54 dev[0].global_request("P2P_PROV_DISC " + addr1 + " keypad") [all …]
|
D | test_p2p_service.py | 16 def add_bonjour_services(dev): argument 17 …dev.global_request("P2P_SERVICE_ADD bonjour 0b5f6166706f766572746370c00c000c01 074578616d706c65c02… 18 …dev.global_request("P2P_SERVICE_ADD bonjour 076578616d706c650b5f6166706f766572746370c00c001001 00") 19 dev.global_request("P2P_SERVICE_ADD bonjour 045f697070c00c000c01 094d795072696e746572c027") 20 …dev.global_request("P2P_SERVICE_ADD bonjour 096d797072696e746572045f697070c00c001001 0974787476657… 22 def add_upnp_services(dev): argument 23 …dev.global_request("P2P_SERVICE_ADD upnp 10 uuid:6859dede-8574-59ab-9332-123456789012::upnp:rootde… 24 …dev.global_request("P2P_SERVICE_ADD upnp 10 uuid:5566d33e-9774-09ab-4822-333456785632::upnp:rootde… 25 …dev.global_request("P2P_SERVICE_ADD upnp 10 uuid:1122de4e-8574-59ab-9322-333456789044::urn:schemas… 26 …dev.global_request("P2P_SERVICE_ADD upnp 10 uuid:5566d33e-9774-09ab-4822-333456785632::urn:schemas… [all …]
|
D | test_p2ps.py | 394 def set_no_group_iface(dev, enable): argument 396 res = dev.get_driver_status() 399 dev.global_request("SET p2p_no_group_iface 1") 401 dev.global_request("SET p2p_no_group_iface 0") 404 def test_p2ps_exact_search(dev): argument 406 p2ps_advertise(r_dev=dev[0], r_role='1', svc_name='org.wi-fi.wfds.send.rx', 408 [adv_id, rcvd_svc_name] = p2ps_exact_seek(i_dev=dev[1], r_dev=dev[0], 411 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 416 def test_p2ps_exact_search_srvinfo(dev): argument 418 p2ps_advertise(r_dev=dev[0], r_role='0', svc_name='org.wi-fi.wfds.send.rx', [all …]
|
D | test_p2p_concurrency.py | 19 def test_concurrent_autogo(dev, apdev): argument 22 dev[0].request("P2P_SET cross_connect 0") 24 dev[0].connect("test-open", key_mgmt="NONE", scan_freq="2412") 25 hwsim_utils.test_connectivity(dev[0], hapd) 28 dev[0].global_request("SET p2p_no_group_iface 0") 29 dev[0].p2p_start_go() 30 pin = dev[1].wps_read_pin() 31 dev[0].p2p_go_authorize_client(pin) 32 dev[1].p2p_connect_group(dev[0].p2p_dev_addr(), pin, timeout=60, 34 hwsim_utils.test_connectivity_p2p(dev[0], dev[1]) [all …]
|
D | test_scan.py | 22 def check_scan(dev, params, other_started=False, test_busy=False): argument 24 ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"]) 31 dev.dump_monitor() 32 id = dev.request("SCAN " + params) 38 if "FAIL-BUSY" not in dev.request("SCAN"): 42 ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"]) 48 ev = dev.wait_event(["CTRL-EVENT-SCAN-STARTED"]) 54 if "FAIL-BUSY" not in dev.request("SCAN"): 57 ev = dev.wait_event(["CTRL-EVENT-SCAN-RESULTS"]) 63 def check_scan_retry(dev, params, bssid): argument [all …]
|
D | test_ap_tdls.py | 24 def connectivity(dev, hapd): argument 25 check_connectivity(dev[0], dev[1], hapd) 27 def connect_2sta(dev, ssid, hapd, sae=False): argument 30 dev[0].connect(ssid, key_mgmt=key_mgmt, psk="12345678", 32 dev[1].connect(ssid, key_mgmt=key_mgmt, psk="12345678", 36 connectivity(dev, hapd) 38 def connect_2sta_wpa2_psk(dev, hapd): argument 39 connect_2sta(dev, "test-wpa2-psk", hapd) 41 def connect_2sta_wpa_psk(dev, hapd): argument 42 connect_2sta(dev, "test-wpa-psk", hapd) [all …]
|
D | test_ap_hs20.py | 58 def check_auto_select(dev, bssid, hapd=None): argument 59 dev.scan_for_bss(bssid, freq="2412") 60 dev.request("INTERWORKING_SELECT auto freq=2412") 61 ev = dev.wait_connected(timeout=15) 66 dev.request("REMOVE_NETWORK all") 67 dev.wait_disconnected() 68 dev.dump_monitor() 72 def interworking_select(dev, bssid, type=None, no_match=False, freq=None): argument 73 dev.dump_monitor() 75 dev.scan_for_bss(bssid, freq=freq) [all …]
|
D | test_dpp3.py | 16 def test_dpp_network_intro_version(dev, apdev): argument 18 check_dpp_capab(dev[0], min_ver=3) 21 id, hapd = run_dpp_auto_connect(dev, apdev, 1, stop_after_prov=True) 22 dev[0].select_network(id, freq=2412) 23 dev[0].wait_connected() 25 dev[0].set("dpp_config_processing", "0", allow_fail=True) 27 def test_dpp_network_intro_version_change(dev, apdev): argument 29 check_dpp_capab(dev[0], min_ver=3) 32 dev[0].set("dpp_version_override", "2") 33 id, hapd = run_dpp_auto_connect(dev, apdev, 1, stop_after_prov=True) [all …]
|
D | test_owe.py | 21 def test_owe(dev, apdev): argument 23 if "OWE" not in dev[0].get_capability("key_mgmt"): 37 dev[0].scan_for_bss(bssid, freq="2412") 38 bss = dev[0].get_bss(bssid) 42 id = dev[0].connect("owe", key_mgmt="OWE", ieee80211w="2", scan_freq="2412") 44 pmk_h = hapd.request("GET_PMK " + dev[0].own_addr()) 45 pmk_w = dev[0].get_pmk(id) 48 hwsim_utils.test_connectivity(dev[0], hapd) 49 val = dev[0].get_status_field("key_mgmt") 53 def test_owe_groups(dev, apdev): argument [all …]
|
D | test_sae.py | 25 def test_sae(dev, apdev): argument 27 check_sae_capab(dev[0]) 36 dev[0].request("SET sae_groups ") 37 id = dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", 40 if dev[0].get_status_field('sae_group') != '19': 42 bss = dev[0].get_bss(apdev[0]['bssid']) 52 pmk_h = hapd.request("GET_PMK " + dev[0].own_addr()) 53 pmk_w = dev[0].get_pmk(id) 56 dev[0].request("DISCONNECT") 57 dev[0].wait_disconnected() [all …]
|
D | test_ap_eap.py | 41 def check_eap_capa(dev, method): argument 42 res = dev.get_capability("eap") 46 def check_subject_match_support(dev): argument 47 tls = dev.request("GET tls_library") 51 def check_check_cert_subject_support(dev): argument 52 tls = dev.request("GET tls_library") 56 def check_altsubject_match_support(dev): argument 57 tls = dev.request("GET tls_library") 61 def check_domain_match(dev): argument 62 tls = dev.request("GET tls_library") [all …]
|
D | test_p2p_invitation.py | 14 def test_p2p_go_invite(dev): argument 16 addr0 = dev[0].p2p_dev_addr() 17 addr1 = dev[1].p2p_dev_addr() 23 dev[0].p2p_start_go(freq=2422) 24 dev[1].scan() 25 dev[0].remove_group() 28 dev[1].p2p_listen() 29 if not dev[0].discover_peer(addr1, social=True): 33 res = dev[0].p2p_start_go(freq=2417) 37 dev[0].global_request("P2P_INVITE group=" + dev[0].group_ifname + " peer=" + addr1) [all …]
|
D | test_ap_open.py | 23 def test_ap_open(dev, apdev): argument 25 _test_ap_open(dev, apdev) 27 def _test_ap_open(dev, apdev): argument 29 dev[0].connect("open", key_mgmt="NONE", scan_freq="2412", 34 hwsim_utils.test_connectivity(dev[0], hapd) 36 dev[0].request("DISCONNECT") 41 def test_ap_open_packet_loss(dev, apdev): argument 50 dev[i].connect("open", key_mgmt="NONE", scan_freq="2412", 53 dev[i].wait_connected(timeout=20) 56 def test_ap_open_unknown_action(dev, apdev): argument [all …]
|