mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-22 06:29:23 +01:00
auto-t: add DPP PKEX tests
This commit is contained in:
parent
6f7384d5c7
commit
29778733e5
@ -1,5 +1,5 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
channel=6
|
||||
ssid=ssidCCMP
|
||||
|
||||
wpa=2
|
||||
|
@ -1,5 +1,5 @@
|
||||
[SETUP]
|
||||
num_radios=3
|
||||
num_radios=4
|
||||
start_iwd=0
|
||||
hwsim_medium=yes
|
||||
|
||||
@ -8,3 +8,6 @@ rad0=wpas.conf
|
||||
|
||||
[HOSTAPD]
|
||||
rad1=hostapd.conf
|
||||
|
||||
[NameSpaces]
|
||||
ns0=rad2
|
||||
|
209
autotests/testDPP/pkex_test.py
Normal file
209
autotests/testDPP/pkex_test.py
Normal file
@ -0,0 +1,209 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
from iwd import IWD, SharedCodeAgent
|
||||
from iwd import DeviceProvisioning
|
||||
from wpas import Wpas
|
||||
from hostapd import HostapdCLI
|
||||
from hwsim import Hwsim
|
||||
from config import ctx
|
||||
from time import time
|
||||
import os
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
def start_wpas_pkex(self, code, curve=None, **kwargs):
|
||||
self.wpas.dpp_bootstrap_gen(type='pkex', curve=curve)
|
||||
self.wpas.dpp_pkex_add(code=code, **kwargs)
|
||||
if kwargs.get('role', 'configurator') == 'configurator':
|
||||
self.wpas.dpp_configurator_create()
|
||||
self.wpas.dpp_listen(2437)
|
||||
|
||||
def start_iwd_pkex_configurator(self, device, agent=False):
|
||||
self.hapd.reload()
|
||||
self.hapd.wait_for_event('AP-ENABLED')
|
||||
|
||||
IWD.copy_to_storage('ssidCCMP.psk')
|
||||
device.autoconnect = True
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
self.wd.wait_for_object_condition(device, condition)
|
||||
|
||||
if agent:
|
||||
self.agent = SharedCodeAgent(codes = {"test": "secret123"})
|
||||
|
||||
device.dpp_pkex_start_configurator(self.agent.path)
|
||||
else:
|
||||
device.dpp_pkex_configure_enrollee('secret123', identifier="test")
|
||||
|
||||
def test_pkex_iwd_as_enrollee(self):
|
||||
self.start_wpas_pkex('secret123', identifier="test")
|
||||
|
||||
self.device[0].dpp_pkex_enroll('secret123', identifier="test")
|
||||
|
||||
self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
|
||||
|
||||
def test_pkex_iwd_as_enrollee_retransmit(self):
|
||||
self.rule_reveal_req.enabled = True
|
||||
|
||||
self.start_wpas_pkex('secret123', identifier="test")
|
||||
|
||||
self.device[0].dpp_pkex_enroll('secret123', identifier="test")
|
||||
|
||||
self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
|
||||
|
||||
def test_pkex_unsupported_version(self):
|
||||
self.start_wpas_pkex('secret123', identifier="test", version=2)
|
||||
|
||||
now = time()
|
||||
self.device[0].dpp_pkex_enroll('secret123', identifier="test")
|
||||
|
||||
condition = "obj.started == False"
|
||||
self.wd.wait_for_object_condition(self.device[0]._sc_device_provisioning,
|
||||
condition, max_wait=125)
|
||||
|
||||
# Check the enrollee stopped after 2 minutes
|
||||
elapsed = time() - now
|
||||
self.assertLess(elapsed, 125)
|
||||
|
||||
def test_pkex_configurator_timeout(self):
|
||||
self.start_iwd_pkex_configurator(self.device[0])
|
||||
|
||||
now = time()
|
||||
|
||||
condition = "obj.started == False"
|
||||
self.wd.wait_for_object_condition(self.device[0]._sc_device_provisioning,
|
||||
condition, max_wait=125)
|
||||
|
||||
# Check the enrollee stopped after 2 minutes
|
||||
elapsed = time() - now
|
||||
self.assertLess(elapsed, 125)
|
||||
|
||||
def test_pkex_iwd_as_configurator(self):
|
||||
self.start_iwd_pkex_configurator(self.device[0])
|
||||
|
||||
self.start_wpas_pkex('secret123', identifier="test", initiator=True,
|
||||
role='enrollee')
|
||||
|
||||
self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
|
||||
self.wpas.wait_for_event("DPP-CONF-RECEIVED")
|
||||
|
||||
def test_pkex_iwd_as_configurator_retransmit(self):
|
||||
self.rule_xchg_resp.enabled = True
|
||||
self.rule_reveal_resp.enabled = True
|
||||
|
||||
self.start_iwd_pkex_configurator(self.device[0])
|
||||
|
||||
self.start_wpas_pkex('secret123', identifier="test", initiator=True,
|
||||
role='enrollee')
|
||||
|
||||
self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
|
||||
self.wpas.wait_for_event("DPP-CONF-RECEIVED")
|
||||
|
||||
def test_pkex_iwd_as_configurator_bad_group(self):
|
||||
self.start_iwd_pkex_configurator(self.device[0])
|
||||
|
||||
self.start_wpas_pkex('secret123', identifier="test", initiator=True,
|
||||
role='enrollee', curve='P-384')
|
||||
|
||||
self.wpas.wait_for_event(f"DPP-RX src={self.device[0].address} freq=2437 type=8")
|
||||
self.wpas.wait_for_event("DPP-FAIL")
|
||||
|
||||
def test_pkex_iwd_to_iwd(self):
|
||||
self.start_iwd_pkex_configurator(self.device[0])
|
||||
|
||||
self.device[1].dpp_pkex_enroll('secret123', identifier="test")
|
||||
|
||||
self.device[1].autoconnect = True
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
self.wd.wait_for_object_condition(self.device[1], condition)
|
||||
|
||||
self.assertTrue(os.path.exists('/tmp/ns0/ssidCCMP.psk'))
|
||||
|
||||
with open('/tmp/ns0/ssidCCMP.psk') as f:
|
||||
data = f.read()
|
||||
|
||||
self.assertIn("SendHostname", data)
|
||||
self.assertIn("SharedCode=secret123", data)
|
||||
self.assertIn("ExactConfig=true", data)
|
||||
|
||||
def test_pkex_configurator_with_agent(self):
|
||||
self.start_iwd_pkex_configurator(self.device[0], agent=True)
|
||||
|
||||
self.device[1].dpp_pkex_enroll('secret123', identifier="test")
|
||||
|
||||
self.device[1].autoconnect = True
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
self.wd.wait_for_object_condition(self.device[1], condition)
|
||||
|
||||
self.agent = None
|
||||
|
||||
def setUp(self):
|
||||
ns0 = ctx.get_namespace('ns0')
|
||||
self.wpas = Wpas('wpas.conf')
|
||||
|
||||
self.wd = IWD(True)
|
||||
self.wd_ns0 = IWD(True, iwd_storage_dir='/tmp/ns0', namespace=ns0)
|
||||
self.device = []
|
||||
self.device.append(self.wd.list_devices(1)[0])
|
||||
self.device.append(self.wd_ns0.list_devices(1)[0])
|
||||
self.hapd = HostapdCLI('hostapd.conf')
|
||||
self.hapd.disable()
|
||||
self.hwsim = Hwsim()
|
||||
|
||||
self.rule_xchg_resp = self.hwsim.rules.create()
|
||||
self.rule_xchg_resp.prefix = 'd0'
|
||||
self.rule_xchg_resp.match_offset = 24
|
||||
self.rule_xchg_resp.match = '04 09 50 6f 9a 1a 01 08'
|
||||
self.rule_xchg_resp.match_times = 1
|
||||
self.rule_xchg_resp.drop = True
|
||||
|
||||
self.rule_reveal_resp = self.hwsim.rules.create()
|
||||
self.rule_reveal_resp.prefix = 'd0'
|
||||
self.rule_reveal_resp.match_offset = 24
|
||||
self.rule_reveal_resp.match = '04 09 50 6f 9a 1a 01 0a'
|
||||
self.rule_reveal_resp.match_times = 1
|
||||
self.rule_reveal_resp.drop = True
|
||||
|
||||
self.rule_reveal_req = self.hwsim.rules.create()
|
||||
self.rule_reveal_req.prefix = 'd0'
|
||||
self.rule_reveal_req.match_offset = 24
|
||||
self.rule_reveal_req.match = '04 09 50 6f 9a 1a 01 09'
|
||||
self.rule_reveal_req.match_times = 1
|
||||
self.rule_reveal_req.drop = True
|
||||
|
||||
def tearDown(self):
|
||||
# Tests end in various states, don't fail when tearing down.
|
||||
try:
|
||||
self.device[0].disconnect()
|
||||
self.device[0].dpp_pkex_stop()
|
||||
self.device[1].disconnect()
|
||||
self.device[1].dpp_pkex_stop()
|
||||
except:
|
||||
pass
|
||||
|
||||
self.wpas.dpp_configurator_remove()
|
||||
self.wpas.clean_up()
|
||||
|
||||
self.wd = None
|
||||
self.wd_ns0 = None
|
||||
self.device = None
|
||||
self.wpas = None
|
||||
self.hapd = None
|
||||
self.rule_xchg_resp = None
|
||||
IWD.clear_storage()
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
pass
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
pass
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,2 +1,14 @@
|
||||
[Security]
|
||||
Passphrase=secret123
|
||||
|
||||
[DeviceProvisioning]
|
||||
SharedCode=secret123
|
||||
SharedCodeIdentifier=test
|
||||
ExactConfig=true
|
||||
|
||||
[IPv4]
|
||||
SendHostname=true
|
||||
|
||||
[Settings]
|
||||
AutoConnect=true
|
||||
Hidden=false
|
||||
|
@ -230,6 +230,11 @@ class SharedCodeAgent(dbus.service.Object):
|
||||
def Release(self):
|
||||
print("SharedCodeAgent released")
|
||||
|
||||
@dbus.service.method(IWD_SHARED_CODE_AGENT_INTERFACE,
|
||||
in_signature='s', out_signature='')
|
||||
def Cancel(self, reason):
|
||||
print("SharedCodeAgent canceled (%s)" % reason)
|
||||
|
||||
@dbus.service.method(IWD_SHARED_CODE_AGENT_INTERFACE,
|
||||
in_signature='s', out_signature='s')
|
||||
def RequestSharedCode(self, identifier):
|
||||
@ -357,12 +362,6 @@ class SharedCodeDeviceProvisioning(IWDDBusAbstract):
|
||||
def stop(self):
|
||||
self._iface.Stop()
|
||||
|
||||
def register_agent(self, path):
|
||||
self._iface.RegisterSharedCodeAgent(path)
|
||||
|
||||
def unregister_agent(self):
|
||||
self._iface.UnregisterSharedCodeAgent()
|
||||
|
||||
@property
|
||||
def started(self):
|
||||
return self._properties['Started']
|
||||
|
Loading…
Reference in New Issue
Block a user