blob: 54bbbda7e6943186f86461f03c37dd124431b476 [file] [log] [blame]
#!/usr/bin/env python3
#
# Copyright 2019 - The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import acts_contrib.test_utils.wifi.wifi_test_utils as wutils
import acts.utils
import time
from acts import asserts
from acts import utils
from acts.test_decorators import test_tracker_info
from acts_contrib.test_utils.wifi.p2p.WifiP2pBaseTest import WifiP2pBaseTest
from acts_contrib.test_utils.wifi.p2p import wifi_p2p_test_utils as wp2putils
from acts_contrib.test_utils.wifi.p2p import wifi_p2p_const as p2pconsts
from acts.controllers.ap_lib.hostapd_constants import BAND_2G
from scapy.all import *
WPS_PBC = wp2putils.WifiP2PEnums.WpsInfo.WIFI_WPS_INFO_PBC
WPS_DISPLAY = wp2putils.WifiP2PEnums.WpsInfo.WIFI_WPS_INFO_DISPLAY
WPS_KEYPAD = wp2putils.WifiP2PEnums.WpsInfo.WIFI_WPS_INFO_KEYPAD
DEFAULT_TIMEOUT = 10
class WifiP2pSnifferTest(WifiP2pBaseTest):
"""Tests factory MAC is not leaked for p2p discovery and associated cases.
Test Bed Requirement:
* At least two Android devices
* An access point as sniffer
"""
def __init__(self, controllers):
WifiP2pBaseTest.__init__(self, controllers)
def setup_class(self):
super(WifiP2pSnifferTest, self).setup_class()
wp2putils.wifi_p2p_set_channels_for_current_group(self.dut1, 6, 6)
wp2putils.wifi_p2p_set_channels_for_current_group(self.dut2, 6, 6)
self.configure_packet_capture()
def setup_test(self):
super(WifiP2pSnifferTest, self).setup_test()
self.pcap_procs = wutils.start_pcap(self.packet_capture, '2g',
self.test_name)
def teardown_test(self):
if self.pcap_procs:
wutils.stop_pcap(self.packet_capture, self.pcap_procs, False)
super(WifiP2pSnifferTest, self).teardown_test()
def configure_packet_capture(self):
"""Configure packet capture on the social channels."""
self.packet_capture = self.packet_capture[0]
result = self.packet_capture.configure_monitor_mode(BAND_2G, 6)
if not result:
raise ValueError("Failed to configure channel for 2G band")
def verify_mac_no_leakage(self):
time.sleep(DEFAULT_TIMEOUT)
self.log.info("Stopping packet capture")
wutils.stop_pcap(self.packet_capture, self.pcap_procs, False)
# Verify factory MAC is not leaked in 2G pcaps
pcap_fname = '%s_%s.pcap' % (self.pcap_procs[BAND_2G][1],
BAND_2G.upper())
self.pcap_procs = None
packets = rdpcap(pcap_fname)
wutils.verify_mac_not_found_in_pcap(self.dut1, self.dut1_mac, packets)
wutils.verify_mac_not_found_in_pcap(self.dut2, self.dut2_mac, packets)
"""Test Cases"""
@test_tracker_info(uuid="d04e62dc-e1ef-4cea-86e6-39f0dd08fb6b")
def test_p2p_discovery_sniffer(self):
"""Verify the p2p discovery functionality
Steps:
1. Discover the target device
2. Check the target device in peer list
"""
self.log.info("Device discovery")
wp2putils.find_p2p_device(self.dut1, self.dut2)
wp2putils.find_p2p_device(self.dut2, self.dut1)
self.verify_mac_no_leakage()
@test_tracker_info(uuid="6a02be84-912d-4b5b-8dfa-fd80d2554c55")
def test_p2p_connect_via_pbc_and_ping_and_reconnect_sniffer(self):
"""Verify the p2p connect via pbc functionality
Steps:
1. Request the connection which include discover the target device
2. check which dut is GO and which dut is GC
3. connection check via ping from GC to GO
4. disconnect
5. Trigger connect again from GO for reconnect test.
6. GO trigger disconnect
7. Trigger connect again from GC for reconnect test.
8. GC trigger disconnect
"""
# Request the connection
wp2putils.p2p_connect(self.dut1, self.dut2, False, WPS_PBC)
if wp2putils.is_go(self.dut1):
go_dut = self.dut1
gc_dut = self.dut2
elif wp2putils.is_go(self.dut2):
go_dut = self.dut2
gc_dut = self.dut1
go_ip = wp2putils.p2p_go_ip(gc_dut)
wp2putils.p2p_connection_ping_test(gc_dut, go_ip)
# trigger disconnect
wp2putils.p2p_disconnect(self.dut1)
wp2putils.check_disconnect(self.dut2)
time.sleep(p2pconsts.DEFAULT_FUNCTION_SWITCH_TIME)
self.log.info("Reconnect test, triggered by GO")
# trigger reconnect from GO
go_dut.ed.clear_all_events()
gc_dut.ed.clear_all_events()
wp2putils.p2p_connect(go_dut, gc_dut, True, WPS_PBC)
wp2putils.p2p_disconnect(go_dut)
wp2putils.check_disconnect(gc_dut)
time.sleep(p2pconsts.DEFAULT_FUNCTION_SWITCH_TIME)
# trigger reconnect from GC
self.log.info("Reconnect test, triggered by GC")
go_dut.ed.clear_all_events()
gc_dut.ed.clear_all_events()
wp2putils.p2p_connect(gc_dut, go_dut, True, WPS_PBC)
wp2putils.p2p_disconnect(gc_dut)
wp2putils.check_disconnect(go_dut)
time.sleep(p2pconsts.DEFAULT_FUNCTION_SWITCH_TIME)
# teardown
self.verify_mac_no_leakage()