test_ap_config.py 9.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. # hostapd configuration tests
  2. # Copyright (c) 2014-2016, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import os
  7. import signal
  8. import time
  9. from remotehost import remote_compatible
  10. import hostapd
  11. from utils import alloc_fail
  12. @remote_compatible
  13. def test_ap_config_errors(dev, apdev):
  14. """Various hostapd configuration errors"""
  15. # IEEE 802.11d without country code
  16. params = { "ssid": "foo", "ieee80211d": "1" }
  17. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  18. if "FAIL" not in hapd.request("ENABLE"):
  19. raise Exception("Unexpected ENABLE success (ieee80211d without country_code)")
  20. hostapd.remove_bss(apdev[0])
  21. # IEEE 802.11h without IEEE 802.11d
  22. params = { "ssid": "foo", "ieee80211h": "1" }
  23. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  24. if "FAIL" not in hapd.request("ENABLE"):
  25. raise Exception("Unexpected ENABLE success (ieee80211h without ieee80211d")
  26. hostapd.remove_bss(apdev[0])
  27. # Power Constraint without IEEE 802.11d
  28. params = { "ssid": "foo", "local_pwr_constraint": "1" }
  29. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  30. if "FAIL" not in hapd.request("ENABLE"):
  31. raise Exception("Unexpected ENABLE success (local_pwr_constraint without ieee80211d)")
  32. hostapd.remove_bss(apdev[0])
  33. # Spectrum management without Power Constraint
  34. params = { "ssid": "foo", "spectrum_mgmt_required": "1" }
  35. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  36. if "FAIL" not in hapd.request("ENABLE"):
  37. raise Exception("Unexpected ENABLE success (spectrum_mgmt_required without local_pwr_constraint)")
  38. hostapd.remove_bss(apdev[0])
  39. # IEEE 802.1X without authentication server
  40. params = { "ssid": "foo", "ieee8021x": "1" }
  41. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  42. if "FAIL" not in hapd.request("ENABLE"):
  43. raise Exception("Unexpected ENABLE success (ieee8021x)")
  44. hostapd.remove_bss(apdev[0])
  45. # RADIUS-PSK without macaddr_acl=2
  46. params = hostapd.wpa2_params(ssid="foo", passphrase="12345678")
  47. params["wpa_psk_radius"] = "1"
  48. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  49. if "FAIL" not in hapd.request("ENABLE"):
  50. raise Exception("Unexpected ENABLE success (wpa_psk_radius)")
  51. hostapd.remove_bss(apdev[0])
  52. # FT without NAS-Identifier
  53. params = { "wpa": "2",
  54. "wpa_key_mgmt": "FT-PSK",
  55. "rsn_pairwise": "CCMP",
  56. "wpa_passphrase": "12345678" }
  57. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  58. if "FAIL" not in hapd.request("ENABLE"):
  59. raise Exception("Unexpected ENABLE success (FT without nas_identifier)")
  60. hostapd.remove_bss(apdev[0])
  61. # Hotspot 2.0 without WPA2/CCMP
  62. params = hostapd.wpa2_params(ssid="foo")
  63. params['wpa_key_mgmt'] = "WPA-EAP"
  64. params['ieee8021x'] = "1"
  65. params['auth_server_addr'] = "127.0.0.1"
  66. params['auth_server_port'] = "1812"
  67. params['auth_server_shared_secret'] = "radius"
  68. params['interworking'] = "1"
  69. params['hs20'] = "1"
  70. params['wpa'] = "1"
  71. hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
  72. if "FAIL" not in hapd.request("ENABLE"):
  73. raise Exception("Unexpected ENABLE success (HS 2.0 without WPA2/CCMP)")
  74. hostapd.remove_bss(apdev[0])
  75. def test_ap_config_reload(dev, apdev, params):
  76. """hostapd configuration reload"""
  77. hapd = hostapd.add_ap(apdev[0], { "ssid": "foo" })
  78. hapd.set("ssid", "foobar")
  79. with open(os.path.join(params['logdir'], 'hostapd-test.pid'), "r") as f:
  80. pid = int(f.read())
  81. os.kill(pid, signal.SIGHUP)
  82. time.sleep(0.1)
  83. dev[0].connect("foobar", key_mgmt="NONE", scan_freq="2412")
  84. hapd.set("ssid", "foo")
  85. os.kill(pid, signal.SIGHUP)
  86. dev[0].wait_disconnected()
  87. dev[0].request("DISCONNECT")
  88. def test_ap_config_reload_file(dev, apdev, params):
  89. """hostapd configuration reload from file"""
  90. hapd = hostapd.add_iface(apdev[0], "bss-1.conf")
  91. hapd.enable()
  92. hapd.set("ssid", "foobar")
  93. with open(os.path.join(params['logdir'], 'hostapd-test.pid'), "r") as f:
  94. pid = int(f.read())
  95. os.kill(pid, signal.SIGHUP)
  96. time.sleep(0.1)
  97. dev[0].connect("foobar", key_mgmt="NONE", scan_freq="2412")
  98. hapd.set("ssid", "foo")
  99. os.kill(pid, signal.SIGHUP)
  100. dev[0].wait_disconnected()
  101. dev[0].request("DISCONNECT")
  102. def test_ap_config_reload_before_enable(dev, apdev, params):
  103. """hostapd configuration reload before enable"""
  104. hapd = hostapd.add_iface(apdev[0], "bss-1.conf")
  105. with open(os.path.join(params['logdir'], 'hostapd-test.pid'), "r") as f:
  106. pid = int(f.read())
  107. os.kill(pid, signal.SIGHUP)
  108. hapd.ping()
  109. def test_ap_config_sigusr1(dev, apdev, params):
  110. """hostapd SIGUSR1"""
  111. hapd = hostapd.add_ap(apdev[0], { "ssid": "foobar" })
  112. with open(os.path.join(params['logdir'], 'hostapd-test.pid'), "r") as f:
  113. pid = int(f.read())
  114. os.kill(pid, signal.SIGUSR1)
  115. dev[0].connect("foobar", key_mgmt="NONE", scan_freq="2412")
  116. os.kill(pid, signal.SIGUSR1)
  117. def test_ap_config_invalid_value(dev, apdev, params):
  118. """Ignoring invalid hostapd configuration parameter updates"""
  119. hapd = hostapd.add_ap(apdev[0], { "ssid": "test" }, no_enable=True)
  120. not_exist = "/tmp/hostapd-test/does-not-exist"
  121. tests = [ ("driver", "foobar"),
  122. ("ssid2", "Q"),
  123. ("macaddr_acl", "255"),
  124. ("accept_mac_file", not_exist),
  125. ("deny_mac_file", not_exist),
  126. ("eapol_version", "255"),
  127. ("eap_user_file", not_exist),
  128. ("wep_key_len_broadcast", "-1"),
  129. ("wep_key_len_unicast", "-1"),
  130. ("wep_rekey_period", "-1"),
  131. ("eap_rekey_period", "-1"),
  132. ("radius_client_addr", "foo"),
  133. ("acs_chan_bias", "-1:0.8"),
  134. ("acs_chan_bias", "1"),
  135. ("acs_chan_bias", "1:p"),
  136. ("acs_chan_bias", "1:-0.8"),
  137. ("acs_chan_bias", "1:0.8p"),
  138. ("dtim_period", "0"),
  139. ("bss_load_update_period", "-1"),
  140. ("send_probe_response", "255"),
  141. ("beacon_rate", "ht:-1"),
  142. ("beacon_rate", "ht:32"),
  143. ("beacon_rate", "vht:-1"),
  144. ("beacon_rate", "vht:10"),
  145. ("beacon_rate", "9"),
  146. ("beacon_rate", "10001"),
  147. ("vlan_file", not_exist),
  148. ("bss", ""),
  149. ("bssid", "foo"),
  150. ("extra_cred", not_exist),
  151. ("anqp_elem", "265"),
  152. ("anqp_elem", "265"),
  153. ("anqp_elem", "265:1"),
  154. ("anqp_elem", "265:1q"),
  155. ("fst_priority", ""),
  156. ("fils_cache_id", "q"),
  157. ("unknown-item", "foo") ]
  158. for field, val in tests:
  159. if "FAIL" not in hapd.request("SET %s %s" % (field, val)):
  160. raise Exception("Invalid %s accepted" % field)
  161. hapd.enable()
  162. dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
  163. def test_ap_config_eap_user_file_parsing(dev, apdev, params):
  164. """hostapd eap_user_file parsing"""
  165. tmp = os.path.join(params['logdir'], 'ap_vlan_file_parsing.tmp')
  166. hapd = hostapd.add_ap(apdev[0], { "ssid": "foobar" })
  167. for i in range(2):
  168. if "OK" not in hapd.request("SET eap_user_file auth_serv/eap_user.conf"):
  169. raise Exception("eap_user_file rejected")
  170. tests = [ "#\n\n*\tTLS\nradius_accept_attr=:",
  171. "foo\n",
  172. "\"foo\n",
  173. "\"foo\"\n",
  174. "\"foo\" FOOBAR\n",
  175. "\"foo\" " + 10*"TLS," + "TLS \"\n",
  176. "\"foo\" TLS \nfoo\n",
  177. "\"foo\" PEAP hash:foo\n",
  178. "\"foo\" PEAP hash:8846f7eaee8fb117ad06bdd830b7586q\n",
  179. "\"foo\" PEAP 01020\n",
  180. "\"foo\" PEAP 010q\n",
  181. "\"foo\" TLS\nradius_accept_attr=123:x:012\n",
  182. "\"foo\" TLS\nradius_accept_attr=123:x:012q\n",
  183. "\"foo\" TLS\nradius_accept_attr=123:Q:01\n",
  184. "\"foo\" TLS\nradius_accept_attr=123\nfoo\n" ]
  185. for t in tests:
  186. with open(tmp, "w") as f:
  187. f.write(t)
  188. if "FAIL" not in hapd.request("SET eap_user_file " + tmp):
  189. raise Exception("Invalid eap_user_file accepted")
  190. tests = [ ("\"foo\" TLS\n", 2, "hostapd_config_read_eap_user"),
  191. ("\"foo\" PEAP \"foo\"\n", 3, "hostapd_config_read_eap_user"),
  192. ("\"foo\" PEAP hash:8846f7eaee8fb117ad06bdd830b75861\n", 3,
  193. "hostapd_config_read_eap_user"),
  194. ("\"foo\" PEAP 0102\n", 3, "hostapd_config_read_eap_user"),
  195. ("\"foo\" TLS\nradius_accept_attr=123\n", 1,
  196. "=hostapd_parse_radius_attr"),
  197. ("\"foo\" TLS\nradius_accept_attr=123\n", 1,
  198. "wpabuf_alloc;hostapd_parse_radius_attr"),
  199. ("\"foo\" TLS\nradius_accept_attr=123:s:foo\n", 2,
  200. "hostapd_parse_radius_attr"),
  201. ("\"foo\" TLS\nradius_accept_attr=123:x:0102\n", 2,
  202. "hostapd_parse_radius_attr"),
  203. ("\"foo\" TLS\nradius_accept_attr=123:d:1\n", 2,
  204. "hostapd_parse_radius_attr"),
  205. ("* TLS\n", 1, "hostapd_config_read_eap_user") ]
  206. for t, count, func in tests:
  207. with alloc_fail(hapd, count, func):
  208. with open(tmp, "w") as f:
  209. f.write(t)
  210. if "FAIL" not in hapd.request("SET eap_user_file " + tmp):
  211. raise Exception("eap_user_file accepted during OOM")