test_wpas_ctrl.py 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362
  1. # wpa_supplicant control interface
  2. # Copyright (c) 2014, Qualcomm Atheros, Inc.
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. def test_wpas_ctrl_network(dev):
  7. """wpa_supplicant ctrl_iface network set/get"""
  8. id = dev[0].add_network()
  9. tests = (("key_mgmt", "WPA-PSK WPA-EAP IEEE8021X NONE WPA-NONE FT-PSK FT-EAP WPA-PSK-SHA256 WPA-EAP-SHA256"),
  10. ("pairwise", "CCMP-256 GCMP-256 CCMP GCMP TKIP"),
  11. ("group", "CCMP-256 GCMP-256 CCMP GCMP TKIP WEP104 WEP40"),
  12. ("auth_alg", "OPEN SHARED LEAP"),
  13. ("scan_freq", "1 2 3 4 5 6 7 8 9 10 11 12 13 14 15"),
  14. ("freq_list", "2412 2417"),
  15. ("scan_ssid", "1"),
  16. ("bssid", "00:11:22:33:44:55"),
  17. ("proto", "WPA RSN OSEN"),
  18. ("eap", "TLS"),
  19. ("go_p2p_dev_addr", "22:33:44:55:66:aa"),
  20. ("p2p_client_list", "22:33:44:55:66:bb 02:11:22:33:44:55"))
  21. dev[0].set_network_quoted(id, "ssid", "test")
  22. for field, value in tests:
  23. dev[0].set_network(id, field, value)
  24. res = dev[0].get_network(id, field)
  25. if res != value:
  26. raise Exception("Unexpected response for '" + field + "': '" + res + "'")
  27. q_tests = (("identity", "hello"),
  28. ("anonymous_identity", "foo@nowhere.com"))
  29. for field, value in q_tests:
  30. dev[0].set_network_quoted(id, field, value)
  31. res = dev[0].get_network(id, field)
  32. if res != '"' + value + '"':
  33. raise Exception("Unexpected quoted response for '" + field + "': '" + res + "'")
  34. get_tests = (("foo", None), ("ssid", '"test"'))
  35. for field, value in get_tests:
  36. res = dev[0].get_network(id, field)
  37. if res != value:
  38. raise Exception("Unexpected response for '" + field + "': '" + res + "'")
  39. if dev[0].get_network(id, "password"):
  40. raise Exception("Unexpected response for 'password'")
  41. dev[0].set_network_quoted(id, "password", "foo")
  42. if dev[0].get_network(id, "password") != '*':
  43. raise Exception("Unexpected response for 'password' (expected *)")
  44. dev[0].set_network(id, "password", "hash:12345678901234567890123456789012")
  45. if dev[0].get_network(id, "password") != '*':
  46. raise Exception("Unexpected response for 'password' (expected *)")
  47. dev[0].set_network(id, "password", "NULL")
  48. if dev[0].get_network(id, "password"):
  49. raise Exception("Unexpected response for 'password'")
  50. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " password hash:12"):
  51. raise Exception("Unexpected success for invalid password hash")
  52. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " password hash:123456789012345678x0123456789012"):
  53. raise Exception("Unexpected success for invalid password hash")
  54. dev[0].set_network(id, "identity", "414243")
  55. if dev[0].get_network(id, "identity") != '"ABC"':
  56. raise Exception("Unexpected identity hex->text response")
  57. dev[0].set_network(id, "identity", 'P"abc\ndef"')
  58. if dev[0].get_network(id, "identity") != "6162630a646566":
  59. raise Exception("Unexpected identity printf->hex response")
  60. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' identity P"foo'):
  61. raise Exception("Unexpected success for invalid identity string")
  62. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' identity 12x3'):
  63. raise Exception("Unexpected success for invalid identity string")
  64. for i in range(0, 4):
  65. if "FAIL" in dev[0].request("SET_NETWORK " + str(id) + ' wep_key' + str(i) + ' aabbccddee'):
  66. raise Exception("Unexpected wep_key set failure")
  67. if dev[0].get_network(id, "wep_key" + str(i)) != '*':
  68. raise Exception("Unexpected wep_key get failure")
  69. if "FAIL" in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  70. raise Exception("Unexpected failure for psk_list string")
  71. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list 00:11:x2:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  72. raise Exception("Unexpected success for invalid psk_list string")
  73. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:x2:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  74. raise Exception("Unexpected success for invalid psk_list string")
  75. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55+0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef'):
  76. raise Exception("Unexpected success for invalid psk_list string")
  77. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcde'):
  78. raise Exception("Unexpected success for invalid psk_list string")
  79. if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + ' psk_list P2P-00:11:22:33:44:55-0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdex'):
  80. raise Exception("Unexpected success for invalid psk_list string")
  81. if dev[0].get_network(id, "psk_list"):
  82. raise Exception("Unexpected psk_list get response")
  83. if dev[0].list_networks()[0]['ssid'] != "test":
  84. raise Exception("Unexpected ssid in LIST_NETWORKS")
  85. dev[0].set_network(id, "ssid", "NULL")
  86. if dev[0].list_networks()[0]['ssid'] != "":
  87. raise Exception("Unexpected ssid in LIST_NETWORKS after clearing it")
  88. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' ssid "0123456789abcdef0123456789abcdef0"'):
  89. raise Exception("Too long SSID accepted")
  90. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' scan_ssid qwerty'):
  91. raise Exception("Invalid integer accepted")
  92. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' scan_ssid 2'):
  93. raise Exception("Too large integer accepted")
  94. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' psk 12345678'):
  95. raise Exception("Invalid PSK accepted")
  96. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' psk "1234567"'):
  97. raise Exception("Too short PSK accepted")
  98. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' psk "1234567890123456789012345678901234567890123456789012345678901234"'):
  99. raise Exception("Too long PSK accepted")
  100. dev[0].set_network_quoted(id, "psk", "123456768");
  101. dev[0].set_network_quoted(id, "psk", "123456789012345678901234567890123456789012345678901234567890123");
  102. if dev[0].get_network(id, "psk") != '*':
  103. raise Exception("Unexpected psk read result");
  104. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' eap UNKNOWN'):
  105. raise Exception("Unknown EAP method accepted")
  106. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' password "foo'):
  107. raise Exception("Invalid password accepted")
  108. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' wep_key0 "foo'):
  109. raise Exception("Invalid WEP key accepted")
  110. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' wep_key0 "12345678901234567"'):
  111. raise Exception("Too long WEP key accepted")
  112. # too short WEP key is ignored
  113. dev[0].set_network_quoted(id, "wep_key0", "1234")
  114. dev[0].set_network_quoted(id, "wep_key1", "12345")
  115. dev[0].set_network_quoted(id, "wep_key2", "1234567890123")
  116. dev[0].set_network_quoted(id, "wep_key3", "1234567890123456")
  117. dev[0].set_network(id, "go_p2p_dev_addr", "any")
  118. if dev[0].get_network(id, "go_p2p_dev_addr") is not None:
  119. raise Exception("Unexpected go_p2p_dev_addr value")
  120. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' go_p2p_dev_addr 00:11:22:33:44'):
  121. raise Exception("Invalid go_p2p_dev_addr accepted")
  122. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' p2p_client_list 00:11:22:33:44'):
  123. raise Exception("Invalid p2p_client_list accepted")
  124. if "FAIL" in dev[0].request('SET_NETWORK ' + str(id) + ' p2p_client_list 00:11:22:33:44:55 00:1'):
  125. raise Exception("p2p_client_list truncation workaround failed")
  126. if dev[0].get_network(id, "p2p_client_list") != "00:11:22:33:44:55":
  127. raise Exception("p2p_client_list truncation workaround did not work")
  128. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' auth_alg '):
  129. raise Exception("Empty auth_alg accepted")
  130. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' auth_alg FOO'):
  131. raise Exception("Invalid auth_alg accepted")
  132. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' proto '):
  133. raise Exception("Empty proto accepted")
  134. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' proto FOO'):
  135. raise Exception("Invalid proto accepted")
  136. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' pairwise '):
  137. raise Exception("Empty pairwise accepted")
  138. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' pairwise FOO'):
  139. raise Exception("Invalid pairwise accepted")
  140. if "FAIL" not in dev[0].request('SET_NETWORK ' + str(id) + ' pairwise WEP40'):
  141. raise Exception("Invalid pairwise accepted")
  142. def add_cred(dev):
  143. id = dev.add_cred()
  144. ev = dev.wait_event(["CRED-ADDED"])
  145. if ev is None:
  146. raise Exception("Missing CRED-ADDED event")
  147. if " " + str(id) not in ev:
  148. raise Exception("CRED-ADDED event without matching id")
  149. return id
  150. def set_cred(dev, id, field, value):
  151. dev.set_cred(id, field, value)
  152. ev = dev.wait_event(["CRED-MODIFIED"])
  153. if ev is None:
  154. raise Exception("Missing CRED-MODIFIED event")
  155. if " " + str(id) + " " not in ev:
  156. raise Exception("CRED-MODIFIED event without matching id")
  157. if field not in ev:
  158. raise Exception("CRED-MODIFIED event without matching field")
  159. def set_cred_quoted(dev, id, field, value):
  160. dev.set_cred_quoted(id, field, value)
  161. ev = dev.wait_event(["CRED-MODIFIED"])
  162. if ev is None:
  163. raise Exception("Missing CRED-MODIFIED event")
  164. if " " + str(id) + " " not in ev:
  165. raise Exception("CRED-MODIFIED event without matching id")
  166. if field not in ev:
  167. raise Exception("CRED-MODIFIED event without matching field")
  168. def remove_cred(dev, id):
  169. dev.remove_cred(id)
  170. ev = dev.wait_event(["CRED-REMOVED"])
  171. if ev is None:
  172. raise Exception("Missing CRED-REMOVED event")
  173. if " " + str(id) not in ev:
  174. raise Exception("CRED-REMOVED event without matching id")
  175. def test_wpas_ctrl_cred(dev):
  176. """wpa_supplicant ctrl_iface cred set"""
  177. id1 = add_cred(dev[0])
  178. id = add_cred(dev[0])
  179. id2 = add_cred(dev[0])
  180. set_cred(dev[0], id, "temporary", "1")
  181. set_cred(dev[0], id, "priority", "1")
  182. set_cred(dev[0], id, "pcsc", "1")
  183. set_cred_quoted(dev[0], id, "private_key_passwd", "test")
  184. set_cred_quoted(dev[0], id, "domain_suffix_match", "test")
  185. set_cred_quoted(dev[0], id, "phase1", "test")
  186. set_cred_quoted(dev[0], id, "phase2", "test")
  187. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " eap FOO"):
  188. raise Exception("Unexpected success on unknown EAP method")
  189. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " username 12xa"):
  190. raise Exception("Unexpected success on invalid string")
  191. for i in ("11", "1122", "112233445566778899aabbccddeeff00"):
  192. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " roaming_consortium " + i):
  193. raise Exception("Unexpected success on invalid roaming_consortium")
  194. dev[0].set_cred(id, "excluded_ssid", "00112233445566778899aabbccddeeff00112233445566778899aabbccddeeff")
  195. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " excluded_ssid 00112233445566778899aabbccddeeff00112233445566778899aabbccddeeff00"):
  196. raise Exception("Unexpected success on invalid excluded_ssid")
  197. if "FAIL" not in dev[0].request("SET_CRED " + str(id) + " foo 4142"):
  198. raise Exception("Unexpected success on unknown field")
  199. id3 = add_cred(dev[0])
  200. id4 = add_cred(dev[0])
  201. remove_cred(dev[0], id1)
  202. remove_cred(dev[0], id3)
  203. remove_cred(dev[0], id4)
  204. remove_cred(dev[0], id2)
  205. remove_cred(dev[0], id)
  206. if "FAIL" not in dev[0].request("REMOVE_CRED 1"):
  207. raise Exception("Unexpected success on invalid remove cred")
  208. id = add_cred(dev[0])
  209. values = [ ("temporary", "1", False),
  210. ("temporary", "0", False),
  211. ("pcsc", "1", False),
  212. ("realm", "example.com", True),
  213. ("username", "user@example.com", True),
  214. ("password", "foo", True, "*"),
  215. ("ca_cert", "ca.pem", True),
  216. ("client_cert", "user.pem", True),
  217. ("private_key", "key.pem", True),
  218. ("private_key_passwd", "foo", True, "*"),
  219. ("imsi", "310026-000000000", True),
  220. ("milenage", "foo", True, "*"),
  221. ("domain_suffix_match", "example.com", True),
  222. ("domain", "example.com", True),
  223. ("domain", "example.org", True, "example.com\nexample.org"),
  224. ("roaming_consortium", "0123456789", False),
  225. ("required_roaming_consortium", "456789", False),
  226. ("eap", "TTLS", False),
  227. ("phase1", "foo=bar1", True),
  228. ("phase2", "foo=bar2", True),
  229. ("excluded_ssid", "test", True),
  230. ("excluded_ssid", "foo", True, "test\nfoo"),
  231. ("roaming_partner", "example.com,0,4,*", True),
  232. ("roaming_partner", "example.org,1,2,US", True,
  233. "example.com,0,4,*\nexample.org,1,2,US"),
  234. ("update_identifier", "4", False),
  235. ("provisioning_sp", "sp.example.com", True),
  236. ("sp_priority", "7", False),
  237. ("min_dl_bandwidth_home", "100", False),
  238. ("min_ul_bandwidth_home", "101", False),
  239. ("min_dl_bandwidth_roaming", "102", False),
  240. ("min_ul_bandwidth_roaming", "103", False),
  241. ("max_bss_load", "57", False),
  242. ("req_conn_capab", "6:22,80,443", False),
  243. ("req_conn_capab", "17:500", False, "6:22,80,443\n17:500"),
  244. ("req_conn_capab", "50", False, "6:22,80,443\n17:500\n50"),
  245. ("ocsp", "1", False) ]
  246. for v in values:
  247. if v[2]:
  248. set_cred_quoted(dev[0], id, v[0], v[1])
  249. else:
  250. set_cred(dev[0], id, v[0], v[1])
  251. val = dev[0].get_cred(id, v[0])
  252. if len(v) == 4:
  253. expect = v[3]
  254. else:
  255. expect = v[1]
  256. if val != expect:
  257. raise Exception("Unexpected GET_CRED value for {}: {} != {}".format(v[0], val, expect))
  258. remove_cred(dev[0], id)
  259. def test_wpas_ctrl_pno(dev):
  260. """wpa_supplicant ctrl_iface pno"""
  261. if "FAIL" not in dev[0].request("SET pno 1"):
  262. raise Exception("Unexpected success in enabling PNO without enabled network blocks")
  263. id = dev[0].add_network()
  264. dev[0].set_network_quoted(id, "ssid", "test")
  265. dev[0].set_network(id, "key_mgmt", "NONE")
  266. dev[0].request("ENABLE_NETWORK " + str(id) + " no-connect")
  267. #mac80211_hwsim does not yet support PNO, so this fails
  268. if "FAIL" not in dev[0].request("SET pno 1"):
  269. raise Exception("Unexpected success in enabling PNO")
  270. if "FAIL" in dev[0].request("SET pno 0"):
  271. raise Exception("Unexpected failure in disabling PNO")
  272. def test_wpas_ctrl_get(dev):
  273. """wpa_supplicant ctrl_iface get"""
  274. if "FAIL" in dev[0].request("GET version"):
  275. raise Exception("Unexpected get failure for version")
  276. if "FAIL" in dev[0].request("GET wifi_display"):
  277. raise Exception("Unexpected get failure for wifi_display")
  278. if "FAIL" not in dev[0].request("GET foo"):
  279. raise Exception("Unexpected success on get command")
  280. def test_wpas_ctrl_preauth(dev):
  281. """wpa_supplicant ctrl_iface preauth"""
  282. if "FAIL" not in dev[0].request("PREAUTH "):
  283. raise Exception("Unexpected success on invalid PREAUTH")
  284. if "FAIL" in dev[0].request("PREAUTH 00:11:22:33:44:55"):
  285. raise Exception("Unexpected failure on PREAUTH")
  286. def test_wpas_ctrl_stkstart(dev):
  287. """wpa_supplicant ctrl_iface strkstart"""
  288. if "FAIL" not in dev[0].request("STKSTART "):
  289. raise Exception("Unexpected success on invalid STKSTART")
  290. if "FAIL" not in dev[0].request("STKSTART 00:11:22:33:44:55"):
  291. raise Exception("Unexpected success on STKSTART")
  292. def test_wpas_ctrl_tdls_discover(dev):
  293. """wpa_supplicant ctrl_iface tdls_discover"""
  294. if "FAIL" not in dev[0].request("TDLS_DISCOVER "):
  295. raise Exception("Unexpected success on invalid TDLS_DISCOVER")
  296. if "FAIL" not in dev[0].request("TDLS_DISCOVER 00:11:22:33:44:55"):
  297. raise Exception("Unexpected success on TDLS_DISCOVER")
  298. def test_wpas_ctrl_config_parser(dev):
  299. """wpa_supplicant ctrl_iface SET config parser"""
  300. if "FAIL" not in dev[0].request("SET pbc_in_m1 qwerty"):
  301. raise Exception("Non-number accepted as integer")
  302. if "FAIL" not in dev[0].request("SET eapol_version 0"):
  303. raise Exception("Out-of-range value accepted")
  304. if "FAIL" not in dev[0].request("SET eapol_version 10"):
  305. raise Exception("Out-of-range value accepted")
  306. if "FAIL" not in dev[0].request("SET serial_number 0123456789abcdef0123456789abcdef0"):
  307. raise Exception("Too long string accepted")
  308. def test_wpas_ctrl_mib(dev):
  309. """wpa_supplicant ctrl_iface MIB"""
  310. mib = dev[0].get_mib()
  311. if "dot11RSNAOptionImplemented" not in mib:
  312. raise Exception("Missing MIB entry")
  313. if mib["dot11RSNAOptionImplemented"] != "TRUE":
  314. raise Exception("Unexpected dot11RSNAOptionImplemented value")