add link probes sniffer test
Bug: 129076522
Test: run test on chromeos1-dev-test-station-3
Change-Id: I7956308901afc4c900b10b447a7f3460309305d6
diff --git a/acts/tests/google/wifi/WifiMacRandomizationTest.py b/acts/tests/google/wifi/WifiMacRandomizationTest.py
index 01f2bbd..89aacdf 100755
--- a/acts/tests/google/wifi/WifiMacRandomizationTest.py
+++ b/acts/tests/google/wifi/WifiMacRandomizationTest.py
@@ -254,11 +254,13 @@
% mac)
def get_sta_mac_address(self):
+ """Gets the current MAC address being used for client mode."""
out = self.dut.adb.shell("ifconfig wlan0")
res = re.match(".* HWaddr (\S+).*", out, re.S)
return res.group(1)
def get_soft_ap_mac_address(self):
+ """Gets the current MAC address being used for SoftAp."""
if self.dut.model in self.dbs_supported_models:
out = self.dut.adb.shell("ifconfig wlan1")
return re.match(".* HWaddr (\S+).*", out, re.S).group(1)
@@ -505,15 +507,16 @@
"roam = %s" %(mac_before_roam, mac_after_roam))
@test_tracker_info(uuid="17b12f1a-7c62-4188-b5a5-52d7a0bb7849")
- def test_check_mac_in_sniffer(self):
+ def test_check_mac_sta_with_link_probe(self):
"""Test to ensure Factory MAC is not exposed, using sniffer data.
Steps:
1. Configure and start the sniffer on 5GHz band.
- 2. Connect to 5GHz network, ping, get the Factory MAC.
- 3. Stop the sniffer.
- 4. Invoke scapy to read the .pcap file.
- 5. Read each packet summary and make sure Factory MAC is not used.
+ 2. Connect to 5GHz network.
+ 3. Send link probes.
+ 4. Stop the sniffer.
+ 5. Invoke scapy to read the .pcap file.
+ 6. Read each packet summary and make sure Factory MAC is not used.
"""
self.pcap_procs = wutils.start_pcap(
@@ -521,6 +524,7 @@
time.sleep(SHORT_TIMEOUT)
network = self.wpapsk_5g
rand_mac = self.connect_to_network_and_verify_mac_randomization(network)
+ wutils.send_link_probes(self.dut, 3, 3)
pcap_fname = os.path.join(self.log_path, self.test_name,
(self.test_name + '_5G.pcap'))
wutils.stop_pcap(self.packet_capture, self.pcap_procs, False)