blob: 64e05c65dafd52758a22c5b3b66b3b88013bf954 [file] [log] [blame]
#!/usr/bin/python
"""Tests for configs.py."""
import subprocess
import configs
import experiment_testutils
import utils
from wvtest import wvtest
_FREQ_LIST = {
'2.4': '2412,2417,2422,2427,2432,2437,2442,2447,2452,2457,2462',
'5': ('5180,5200,5220,5240,5745,5765,5785,5805,5825,5260,5280,5300,5320,'
'5500,5520,5540,5560,5580,5660,5680,5700'),
}
_WPA_SUPPLICANT_CONFIG = """ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
autoscan=exponential:1:30
freq_list={freq_list}
network={{
\tssid="some ssid"
\t#psk="some passphrase"
\tpsk=41821f7ca3ea5d85beea7644ed7e0fefebd654177fa06c26fbdfdc3c599a317f
\tscan_ssid=1
}}
"""
_WPA_SUPPLICANT_CONFIG_BSSID = """ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
autoscan=exponential:1:30
freq_list={freq_list}
network={{
\tssid="some ssid"
\t#psk="some passphrase"
\tpsk=41821f7ca3ea5d85beea7644ed7e0fefebd654177fa06c26fbdfdc3c599a317f
\tscan_ssid=1
\tbssid=12:34:56:78:90:ab
}}
"""
# pylint: disable=g-backslash-continuation
_WPA_SUPPLICANT_CONFIG_BSSID_UNSECURED = \
"""ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
autoscan=exponential:1:30
freq_list={freq_list}
network={{
\tssid="some ssid"
\tkey_mgmt=NONE
\tscan_ssid=1
\tbssid=12:34:56:78:90:ab
}}
"""
@wvtest.wvtest
def generate_wpa_supplicant_config_test():
if subprocess.call(('which', 'wpa_passphrase')) != 0:
utils.log(
"Can't test generate_wpa_supplicant_config without wpa_passphrase.")
return
for band in ('2.4', '5'):
opt = FakeOptDict()
opt.band = band
got = configs.generate_wpa_supplicant_config(
'some ssid', 'some passphrase', opt)
want = _WPA_SUPPLICANT_CONFIG.format(freq_list=_FREQ_LIST[band])
wvtest.WVPASSEQ(want, got)
opt.bssid = 'TotallyNotValid'
wvtest.WVEXCEPT(utils.BinWifiException,
configs.generate_wpa_supplicant_config,
'some ssid', 'some passphrase', opt)
opt.bssid = '12:34:56:78:90:Ab'
got = configs.generate_wpa_supplicant_config(
'some ssid', 'some passphrase', opt)
want = _WPA_SUPPLICANT_CONFIG_BSSID.format(freq_list=_FREQ_LIST[band])
wvtest.WVPASSEQ(want, got)
got = configs.generate_wpa_supplicant_config(
'some ssid', None, opt)
want = _WPA_SUPPLICANT_CONFIG_BSSID_UNSECURED.format(
freq_list=_FREQ_LIST[band])
wvtest.WVPASSEQ(want, got)
_PHY_INFO = """Wiphy phy0
max # scan SSIDs: 4
max scan IEs length: 2257 bytes
Retry short limit: 7
Retry long limit: 4
Coverage class: 0 (up to 0m)
Device supports RSN-IBSS.
Device supports AP-side u-APSD.
Device supports T-DLS.
Supported Ciphers:
* WEP40 (00-0f-ac:1)
* WEP104 (00-0f-ac:5)
* TKIP (00-0f-ac:2)
* CCMP (00-0f-ac:4)
* CMAC (00-0f-ac:6)
Available Antennas: TX 0x7 RX 0x7
Configured Antennas: TX 0x7 RX 0x7
Supported interface modes:
* IBSS
* managed
* AP
* AP/VLAN
* WDS
* monitor
* P2P-client
* P2P-GO
Band 1:
Capabilities: 0x11ef
RX LDPC
HT20/HT40
SM Power Save disabled
RX HT20 SGI
RX HT40 SGI
TX STBC
RX STBC 1-stream
Max AMSDU length: 3839 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 8 usec (0x06)
HT TX/RX MCS rate indexes supported: 0-23
Bitrates (non-HT):
* 1.0 Mbps
* 2.0 Mbps (short preamble supported)
* 5.5 Mbps (short preamble supported)
* 11.0 Mbps (short preamble supported)
* 6.0 Mbps
* 9.0 Mbps
* 12.0 Mbps
* 18.0 Mbps
* 24.0 Mbps
* 36.0 Mbps
* 48.0 Mbps
* 54.0 Mbps
Frequencies:
* 2412 MHz [1] (30.0 dBm)
* 2417 MHz [2] (30.0 dBm)
* 2422 MHz [3] (30.0 dBm)
* 2427 MHz [4] (30.0 dBm)
* 2432 MHz [5] (30.0 dBm)
* 2437 MHz [6] (30.0 dBm)
* 2442 MHz [7] (30.0 dBm)
* 2447 MHz [8] (30.0 dBm)
* 2452 MHz [9] (30.0 dBm)
* 2457 MHz [10] (30.0 dBm)
* 2462 MHz [11] (30.0 dBm)
* 2467 MHz [12] (disabled)
* 2472 MHz [13] (disabled)
* 2484 MHz [14] (disabled)
Band 2:
Capabilities: 0x11ef
RX LDPC
HT20/HT40
SM Power Save disabled
RX HT20 SGI
RX HT40 SGI
TX STBC
RX STBC 1-stream
Max AMSDU length: 3839 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 8 usec (0x06)
HT TX/RX MCS rate indexes supported: 0-23
Bitrates (non-HT):
* 6.0 Mbps
* 9.0 Mbps
* 12.0 Mbps
* 18.0 Mbps
* 24.0 Mbps
* 36.0 Mbps
* 48.0 Mbps
* 54.0 Mbps
Frequencies:
* 5180 MHz [36] (17.0 dBm)
* 5200 MHz [40] (17.0 dBm)
* 5220 MHz [44] (17.0 dBm)
* 5240 MHz [48] (17.0 dBm)
* 5260 MHz [52] (23.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5280 MHz [56] (23.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5300 MHz [60] (23.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5320 MHz [64] (23.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5500 MHz [100] (20.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5520 MHz [104] (20.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5540 MHz [108] (20.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5560 MHz [112] (20.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5580 MHz [116] (20.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5600 MHz [120] (disabled)
* 5620 MHz [124] (disabled)
* 5640 MHz [128] (disabled)
* 5660 MHz [132] (30.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5680 MHz [136] (30.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5700 MHz [140] (30.0 dBm) (no IR, radar detection)
DFS state: usable (for 7648 sec)
DFS CAC time: 60000 ms
* 5745 MHz [149] (30.0 dBm)
* 5765 MHz [153] (30.0 dBm)
* 5785 MHz [157] (30.0 dBm)
* 5805 MHz [161] (30.0 dBm)
* 5825 MHz [165] (30.0 dBm)
Supported commands:
* new_interface
* set_interface
* new_key
* start_ap
* new_station
* set_bss
* authenticate
* associate
* deauthenticate
* disassociate
* join_ibss
* remain_on_channel
* set_tx_bitrate_mask
* frame
* frame_wait_cancel
* set_wiphy_netns
* set_channel
* set_wds_peer
* tdls_mgmt
* tdls_oper
* probe_client
* set_noack_map
* register_beacons
* start_p2p_device
* set_mcast_rate
* channel_switch
* Unknown command (104)
* connect
* disconnect
Supported TX frame types:
* IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* mesh point: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
* P2P-device: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
Supported RX frame types:
* IBSS: 0x40 0xb0 0xc0 0xd0
* managed: 0x40 0xd0
* AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
* AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
* mesh point: 0xb0 0xc0 0xd0
* P2P-client: 0x40 0xd0
* P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
* P2P-device: 0x40 0xd0
software interface modes (can always be added):
* AP/VLAN
* monitor
valid interface combinations:
* #{ managed } <= 2048, #{ AP } <= 8, #{ P2P-client, P2P-GO } <= 1,
total <= 2048, #channels <= 1, STA/AP BI must match
* #{ WDS } <= 2048,
total <= 2048, #channels <= 1, STA/AP BI must match
* #{ IBSS, AP } <= 1,
total <= 1, #channels <= 1, STA/AP BI must match, radar detect widths: { 20 MHz (no HT), 20 MHz }
HT Capability overrides:
* MCS: ff ff ff ff ff ff ff ff ff ff
* maximum A-MSDU length
* supported channel width
* short GI for 40 MHz
* max A-MPDU length exponent
* min MPDU start spacing
Device supports TX status socket option.
Device supports HT-IBSS.
Device supports SAE with AUTHENTICATE command
Device supports low priority scan.
Device supports scan flush.
Device supports AP scan.
Device supports per-vif TX power setting
P2P GO supports CT window setting
Driver supports a userspace MPM
Device supports active monitor (which will ACK incoming frames)
Driver/device bandwidth changes during BSS lifetime (AP/GO mode)
"""
_HOSTAPD_CONFIG = """ctrl_interface=/var/run/hostapd
interface=wlan0
ssid=TEST_SSID
utf8_ssid=1
auth_algs=1
hw_mode=g
channel=1
country_code=US
ieee80211d=1
ieee80211h=1
ieee80211n=1
ht_capab=[HT20][RX-STBC1]
"""
_HOSTAPD_CONFIG_BRIDGE = """ctrl_interface=/var/run/hostapd
interface=wlan0
bridge=br0
ssid=TEST_SSID
utf8_ssid=1
auth_algs=1
hw_mode=g
channel=1
country_code=US
ieee80211d=1
ieee80211h=1
ieee80211n=1
ht_capab=[HT20][RX-STBC1]
"""
_HOSTAPD_CONFIG_PROVISION_VIA = """ctrl_interface=/var/run/hostapd
interface=wlan0
ssid=TEST_SSID
utf8_ssid=1
auth_algs=1
hw_mode=g
channel=1
country_code=US
ieee80211d=1
ieee80211h=1
ieee80211n=1
ignore_broadcast_ssid=1
vendor_elements=dd04f4f5e801dd0df4f5e803544553545f53534944
ht_capab=[HT20][RX-STBC1]
"""
_HOSTAPD_CONFIG_WPA = """wpa=2
wpa_passphrase=asdfqwer
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
"""
class FakeOptDict(object):
"""A fake options.OptDict containing default values."""
def __init__(self):
self.band = '2.4 5'
self.channel = 'auto'
self.autotype = 'NONDFS'
self.ssid = 'TEST_SSID'
self.bssid = ''
self.encryption = 'WPA2_PSK_AES'
self.force_restart = False
self.hidden_mode = False
self.enable_wmm = False
self.short_guard_interval = False
self.protocols = 'a/b/g/n/ac'
self.width = '20'
self.bridge = ''
self.extra_short_timeouts = False
self.yottasecond_timeouts = False
self.persist = False
self.interface_suffix = ''
self.client_isolation = False
self.supports_provisioning = False
def wpa_passphrase(ssid, passphrase):
return configs.make_network_block(
configs.wpa_network_lines(ssid, passphrase))
def wpa_passphrase_subprocess(ssid, passphrase):
return subprocess.check_output(
('wpa_passphrase',
utils.sanitize_ssid(ssid),
utils.validate_and_sanitize_psk(passphrase)))
@wvtest.wvtest
def wpa_passphrase_test():
"""Make sure the configs we generate are the same as wpa_passphrase."""
for testdata in (
('some ssid', 'some passphrase'),
(r'some\ssid', 'some passphrase'),
('some ssid', r'some\passphrase'),
('some"ssid', 'some passphrase'),
('some ssid', 'some"passphrase')):
got, want = wpa_passphrase(*testdata), wpa_passphrase_subprocess(*testdata)
wvtest.WVPASSEQ(got, want)
@wvtest.wvtest
def wpa_raw_psk_test():
"""Make sure we do the right thing when we get a raw PSK too."""
ssid = 'some ssid'
psk = '41821f7ca3ea5d85beea7644ed7e0fefebd654177fa06c26fbdfdc3c599a317f'
got = wpa_passphrase(ssid, psk)
# hard code since `wpa_passphrase` dies if given a 64-character hex psk
want = """network={
\tssid="some ssid"
\tpsk=41821f7ca3ea5d85beea7644ed7e0fefebd654177fa06c26fbdfdc3c599a317f
}
"""
wvtest.WVPASSEQ(got, want)
# pylint: disable=protected-access
@wvtest.wvtest
def generate_hostapd_config_test():
"""Tests generate_hostapd_config."""
unused_raii = experiment_testutils.MakeExperimentDirs()
opt = FakeOptDict()
# Test a simple case.
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ('\n'.join((_HOSTAPD_CONFIG,
_HOSTAPD_CONFIG_WPA,
'# Experiments: ()\n')), config)
# Test bridge.
default_bridge, opt.bridge = opt.bridge, 'br0'
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ('\n'.join((_HOSTAPD_CONFIG_BRIDGE,
_HOSTAPD_CONFIG_WPA,
'# Experiments: ()\n')),
config)
opt.bridge = default_bridge
# Test provisioning IEs.
default_hidden_mode, opt.hidden_mode = opt.hidden_mode, True
default_supports_provisioning, opt.supports_provisioning = (
opt.supports_provisioning, True)
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ('\n'.join((_HOSTAPD_CONFIG_PROVISION_VIA,
_HOSTAPD_CONFIG_WPA,
'# Experiments: ()\n')),
config)
opt.hidden_mode = default_hidden_mode
opt.supports_provisioning = default_supports_provisioning
# Test with no encryption.
default_encryption, opt.encryption = opt.encryption, 'NONE'
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ(_HOSTAPD_CONFIG + '\n# Experiments: ()\n', config)
opt.encryption = default_encryption
# Now enable extra short timeout intervals and the Wifi80211k experiment.
experiment_testutils.enable('Wifi80211k')
opt.extra_short_timeouts = 2
new_config = '\n'.join((
_HOSTAPD_CONFIG,
_HOSTAPD_CONFIG_WPA,
configs._EXPERIMENT_80211K_TPL.format(interface='wlan0'),
configs._EXTRA_SHORT_TIMEOUTS2_TPL,
'# Experiments: (Wifi80211k)\n'))
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ(new_config, config)
opt.extra_short_timeouts = 1
new_config = '\n'.join((
_HOSTAPD_CONFIG,
_HOSTAPD_CONFIG_WPA,
configs._EXPERIMENT_80211K_TPL.format(interface='wlan0'),
configs._EXTRA_SHORT_TIMEOUTS1_TPL,
'# Experiments: (Wifi80211k)\n'))
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ(new_config, config)
opt.extra_short_timeouts = 2
opt.yottasecond_timeouts = 1
new_config = '\n'.join((
_HOSTAPD_CONFIG,
_HOSTAPD_CONFIG_WPA,
configs._EXPERIMENT_80211K_TPL.format(interface='wlan0'),
configs._YOTTASECOND_TIMEOUTS_TPL,
'# Experiments: (Wifi80211k)\n'))
config = configs.generate_hostapd_config(
_PHY_INFO, 'wlan0', '2.4', '1', '20', set(('a', 'b', 'g', 'n', 'ac')),
'asdfqwer', opt)
wvtest.WVPASSEQ(new_config, config)
@wvtest.wvtest
def create_vendor_ie_test():
wvtest.WVPASSEQ(configs.create_vendor_ie('01'), 'dd04f4f5e801')
wvtest.WVPASSEQ(configs.create_vendor_ie('03', 'GFiberSetupAutomation'),
'dd19f4f5e80347466962657253657475704175746f6d6174696f6e')
if __name__ == '__main__':
wvtest.wvtest_main()