test_wpas_ctrl.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273
  1. # wpa_supplicant control interface
  2. # Copyright (c) 2014, Qualcomm Atheros, Inc.
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. def test_wpas_ctrl_network(dev):
  7. """wpa_supplicant ctrl_iface network set/get"""
  8. id = dev[0].add_network()
  9. tests = (("key_mgmt", "WPA-PSK WPA-EAP IEEE8021X NONE WPA-NONE FT-PSK FT-EAP WPA-PSK-SHA256 WPA-EAP-SHA256"),
  10. ("pairwise", "CCMP-256 GCMP-256 CCMP GCMP TKIP"),
  11. ("group", "CCMP-256 GCMP-256 CCMP GCMP TKIP WEP104 WEP40"),
  12. ("auth_alg", "OPEN SHARED LEAP"),
  13. ("scan_freq", "1 2 3 4 5 6 7 8 9 10 11 12 13 14 15"),
  14. ("freq_list", "2412 2417"),
  15. ("scan_ssid", "1"),
  16. ("bssid", "00:11:22:33:44:55"),
  17. ("proto", "WPA RSN OSEN"),
  18. ("eap", "TLS"),
  19. ("go_p2p_dev_addr", "22:33:44:55:66:aa"),
  20. ("p2p_client_list", "22:33:44:55:66:bb 02:11:22:33:44:55"))
  21. dev[0].set_network_quoted(id, "ssid", "test")
  22. for field, value in tests:
  23. dev[0].set_network(id, field, value)
  24. res = dev[0].get_network(id, field)
  25. if res != value:
  26. raise Exception("Unexpected response for '" + field + "': '" + res + "'")
  27. q_tests = (("identity", "hello"),
  28. ("anonymous_identity", "foo@nowhere.com"))
  29. for field, value in q_tests:
  30. dev[0].set_network_quoted(id, field, value)
  31. res = dev[0].get_network(id, field)
  32. if res != '"' + value + '"':
  33. raise Exception("Unexpected quoted response for '" + field + "': '" + res + "'")
  34. get_tests = (("foo", None), ("ssid", '"test"'))
  35. for field, value in get_tests:
  36. res = dev[0].get_network(id, field)
  37. if res != value:
  38. raise Exception("Unexpected response for '" + field + "': '" + res + "'")
  39. if dev[0].get_network(id, "password"):
  40. raise Exception("Unexpected response for 'password'")
  41. dev[0].set_network_quoted(id, "password", "foo")
  42. if dev[0].get_network(id, "password") != '*':
  43. raise Exception("Unexpected response for 'password' (expected *)")
  44. dev[0].set_network(id, "password", "hash:12345678901234567890123456789012")
  45. if dev[0].get_network(id, "password") != '*':
  46. raise Exception("Unexpected response for 'password' (expected *)")
  47. dev[0].set_network(id, "password", "NULL")
  48. if dev[0].get_network(id, "password"):
  49. raise Exception("Unexpected response for 'password'")
  50. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " password hash:12"):
  51. raise Exception("Unexpected success for invalid password hash")
  52. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " password hash:123456789012345678x0123456789012"):
  53. raise Exception("Unexpected success for invalid password hash")
  54. dev[0].set_network(id, "identity", "414243")
  55. if dev[0].get_network(id, "identity") != '"ABC"':
  56. raise Exception("Unexpected identity hex->text response")
  57. dev[0].set_network(id, "identity", 'P"abc\ndef"')
  58. if dev[0].get_network(id, "identity") != "6162630a646566":
  59. raise Exception("Unexpected identity printf->hex response")
  60. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' identity P"foo'):
  61. raise Exception("Unexpected success for invalid identity string")
  62. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' identity 12x3'):
  63. raise Exception("Unexpected success for invalid identity string")
  64. for i in range(0, 4):
  65. if "FAIL" in dev[0].request("SET_NETWORK " + str(id) + ' wep_key' + str(i) + ' aabbccddee'):
  66. raise Exception("Unexpected wep_key set failure")
  67. if dev[0].get_network(id, "wep_key" + str(i)) != '*':
  68. raise Exception("Unexpected wep_key get failure")
  69. if "FAIL" in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  70. raise Exception("Unexpected failure for psk_list string")
  71. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list 00:11:x2:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  72. raise Exception("Unexpected success for invalid psk_list string")
  73. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:x2:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  74. raise Exception("Unexpected success for invalid psk_list string")
  75. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55+0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  76. raise Exception("Unexpected success for invalid psk_list string")
  77. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcde'):
  78. raise Exception("Unexpected success for invalid psk_list string")
  79. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdex'):
  80. raise Exception("Unexpected success for invalid psk_list string")
  81. if dev[0].get_network(id, "psk_list"):
  82. raise Exception("Unexpected psk_list get response")
  83. if dev[0].list_networks()[0]['ssid'] != "test":
  84. raise Exception("Unexpected ssid in LIST_NETWORKS")
  85. dev[0].set_network(id, "ssid", "NULL")
  86. if dev[0].list_networks()[0]['ssid'] != "":
  87. raise Exception("Unexpected ssid in LIST_NETWORKS after clearing it")
  88. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' ssid "0123456789abcdef0123456789abcdef0"'):
  89. raise Exception("Too long SSID accepted")
  90. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' scan_ssid qwerty'):
  91. raise Exception("Invalid integer accepted")
  92. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' scan_ssid 2'):
  93. raise Exception("Too large integer accepted")
  94. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' psk 12345678'):
  95. raise Exception("Invalid PSK accepted")
  96. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' psk "1234567"'):
  97. raise Exception("Too short PSK accepted")
  98. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' psk "1234567890123456789012345678901234567890123456789012345678901234"'):
  99. raise Exception("Too long PSK accepted")
  100. dev[0].set_network_quoted(id, "psk", "123456768");
  101. dev[0].set_network_quoted(id, "psk", "123456789012345678901234567890123456789012345678901234567890123");
  102. if dev[0].get_network(id, "psk") != '*':
  103. raise Exception("Unexpected psk read result");
  104. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' eap UNKNOWN'):
  105. raise Exception("Unknown EAP method accepted")
  106. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' password "foo'):
  107. raise Exception("Invalid password accepted")
  108. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' wep_key0 "foo'):
  109. raise Exception("Invalid WEP key accepted")
  110. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' wep_key0 "12345678901234567"'):
  111. raise Exception("Too long WEP key accepted")
  112. # too short WEP key is ignored
  113. dev[0].set_network_quoted(id, "wep_key0", "1234")
  114. dev[0].set_network_quoted(id, "wep_key1", "12345")
  115. dev[0].set_network_quoted(id, "wep_key2", "1234567890123")
  116. dev[0].set_network_quoted(id, "wep_key3", "1234567890123456")
  117. dev[0].set_network(id, "go_p2p_dev_addr", "any")
  118. if dev[0].get_network(id, "go_p2p_dev_addr") is not None:
  119. raise Exception("Unexpected go_p2p_dev_addr value")
  120. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' go_p2p_dev_addr 00:11:22:33:44'):
  121. raise Exception("Invalid go_p2p_dev_addr accepted")
  122. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' p2p_client_list 00:11:22:33:44'):
  123. raise Exception("Invalid p2p_client_list accepted")
  124. if "FAIL" in dev[0].request('SET_NETWORK ' + str(id) + ' p2p_client_list 00:11:22:33:44:55 00:1'):
  125. raise Exception("p2p_client_list truncation workaround failed")
  126. if dev[0].get_network(id, "p2p_client_list") != "00:11:22:33:44:55":
  127. raise Exception("p2p_client_list truncation workaround did not work")
  128. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' auth_alg '):
  129. raise Exception("Empty auth_alg accepted")
  130. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' auth_alg FOO'):
  131. raise Exception("Invalid auth_alg accepted")
  132. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' proto '):
  133. raise Exception("Empty proto accepted")
  134. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' proto FOO'):
  135. raise Exception("Invalid proto accepted")
  136. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' pairwise '):
  137. raise Exception("Empty pairwise accepted")
  138. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' pairwise FOO'):
  139. raise Exception("Invalid pairwise accepted")
  140. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' pairwise WEP40'):
  141. raise Exception("Invalid pairwise accepted")
  142. def test_wpas_ctrl_cred(dev):
  143. """wpa_supplicant ctrl_iface cred set"""
  144. id1 = dev[0].add_cred()
  145. id = dev[0].add_cred()
  146. id2 = dev[0].add_cred()
  147. dev[0].set_cred(id, "temporary", "1")
  148. dev[0].set_cred(id, "priority", "1")
  149. dev[0].set_cred(id, "pcsc", "1")
  150. dev[0].set_cred_quoted(id, "private_key_passwd", "test")
  151. dev[0].set_cred_quoted(id, "domain_suffix_match", "test")
  152. dev[0].set_cred_quoted(id, "phase1", "test")
  153. dev[0].set_cred_quoted(id, "phase2", "test")
  154. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " eap FOO"):
  155. raise Exception("Unexpected success on unknown EAP method")
  156. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " username 12xa"):
  157. raise Exception("Unexpected success on invalid string")
  158. for i in ("11", "1122", "112233445566778899aabbccddeeff00"):
  159. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " roaming_consortium " + i):
  160. raise Exception("Unexpected success on invalid roaming_consortium")
  161. dev[0].set_cred(id, "excluded_ssid", "00112233445566778899aabbccddeeff00112233445566778899aabbccddeeff")
  162. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " excluded_ssid 00112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00"):
  163. raise Exception("Unexpected success on invalid excluded_ssid")
  164. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " foo 4142"):
  165. raise Exception("Unexpected success on unknown field")
  166. id3 = dev[0].add_cred()
  167. id4 = dev[0].add_cred()
  168. dev[0].remove_cred(id1)
  169. dev[0].remove_cred(id3)
  170. dev[0].remove_cred(id4)
  171. dev[0].remove_cred(id2)
  172. dev[0].remove_cred(id)
  173. if "FAIL" not in dev[0].request("REMOVE_CRED 1"):
  174. raise Exception("Unexpected success on invalid remove cred")
  175. def test_wpas_ctrl_pno(dev):
  176. """wpa_supplicant ctrl_iface pno"""
  177. if "FAIL" not in dev[0].request("SET pno 1"):
  178. raise Exception("Unexpected success in enabling PNO without enabled network blocks")
  179. id = dev[0].add_network()
  180. dev[0].set_network_quoted(id, "ssid", "test")
  181. dev[0].set_network(id, "key_mgmt", "NONE")
  182. dev[0].request("ENABLE_NETWORK " + str(id) + " no-connect")
  183. #mac80211_hwsim does not yet support PNO, so this fails
  184. if "FAIL" not in dev[0].request("SET pno 1"):
  185. raise Exception("Unexpected success in enabling PNO")
  186. if "FAIL" in dev[0].request("SET pno 0"):
  187. raise Exception("Unexpected failure in disabling PNO")
  188. def test_wpas_ctrl_get(dev):
  189. """wpa_supplicant ctrl_iface get"""
  190. if "FAIL" in dev[0].request("GET version"):
  191. raise Exception("Unexpected get failure for version")
  192. if "FAIL" in dev[0].request("GET wifi_display"):
  193. raise Exception("Unexpected get failure for wifi_display")
  194. if "FAIL" not in dev[0].request("GET foo"):
  195. raise Exception("Unexpected success on get command")
  196. def test_wpas_ctrl_preauth(dev):
  197. """wpa_supplicant ctrl_iface preauth"""
  198. if "FAIL" not in dev[0].request("PREAUTH "):
  199. raise Exception("Unexpected success on invalid PREAUTH")
  200. if "FAIL" in dev[0].request("PREAUTH 00:11:22:33:44:55"):
  201. raise Exception("Unexpected failure on PREAUTH")
  202. def test_wpas_ctrl_stkstart(dev):
  203. """wpa_supplicant ctrl_iface strkstart"""
  204. if "FAIL" not in dev[0].request("STKSTART "):
  205. raise Exception("Unexpected success on invalid STKSTART")
  206. if "FAIL" not in dev[0].request("STKSTART 00:11:22:33:44:55"):
  207. raise Exception("Unexpected success on STKSTART")
  208. def test_wpas_ctrl_tdls_discover(dev):
  209. """wpa_supplicant ctrl_iface tdls_discover"""
  210. if "FAIL" not in dev[0].request("TDLS_DISCOVER "):
  211. raise Exception("Unexpected success on invalid TDLS_DISCOVER")
  212. if "FAIL" not in dev[0].request("TDLS_DISCOVER 00:11:22:33:44:55"):
  213. raise Exception("Unexpected success on TDLS_DISCOVER")
  214. def test_wpas_ctrl_config_parser(dev):
  215. """wpa_supplicant ctrl_iface SET config parser"""
  216. if "FAIL" not in dev[0].request("SET pbc_in_m1 qwerty"):
  217. raise Exception("Non-number accepted as integer")
  218. if "FAIL" not in dev[0].request("SET eapol_version 0"):
  219. raise Exception("Out-of-range value accepted")
  220. if "FAIL" not in dev[0].request("SET eapol_version 10"):
  221. raise Exception("Out-of-range value accepted")
  222. if "FAIL" not in dev[0].request("SET serial_number 0123456789abcdef0123456789abcdef0"):
  223. raise Exception("Too long string accepted")
  224. def test_wpas_ctrl_mib(dev):
  225. """wpa_supplicant ctrl_iface MIB"""
  226. mib = dev[0].get_mib()
  227. if "dot11RSNAOptionImplemented" not in mib:
  228. raise Exception("Missing MIB entry")
  229. if mib["dot11RSNAOptionImplemented"] != "TRUE":
  230. raise Exception("Unexpected dot11RSNAOptionImplemented value")