tests: Increase ctrl_iface SET test coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
f3ff948753
commit
4f23926caf
1 changed files with 32 additions and 0 deletions
|
@ -415,6 +415,9 @@ def test_wpas_ctrl_bssid_filter(dev, apdev):
|
||||||
bss = dev[2].get_bss(apdev[1]['bssid'])
|
bss = dev[2].get_bss(apdev[1]['bssid'])
|
||||||
if len(bss) == 0:
|
if len(bss) == 0:
|
||||||
raise Exception("Missing BSS data(2)")
|
raise Exception("Missing BSS data(2)")
|
||||||
|
|
||||||
|
if "FAIL" not in dev[2].request("SET bssid_filter 00:11:22:33:44:55 00:11:22:33:44"):
|
||||||
|
raise Exception("Unexpected success for invalid SET bssid_filter")
|
||||||
finally:
|
finally:
|
||||||
dev[2].request("SET bssid_filter ")
|
dev[2].request("SET bssid_filter ")
|
||||||
|
|
||||||
|
@ -431,6 +434,8 @@ def test_wpas_ctrl_disallow_aps(dev, apdev):
|
||||||
raise Exception("Unexpected success on invalid disallow_aps")
|
raise Exception("Unexpected success on invalid disallow_aps")
|
||||||
if "FAIL" not in dev[0].request("SET disallow_aps ssid 4q"):
|
if "FAIL" not in dev[0].request("SET disallow_aps ssid 4q"):
|
||||||
raise Exception("Unexpected success on invalid disallow_aps")
|
raise Exception("Unexpected success on invalid disallow_aps")
|
||||||
|
if "FAIL" not in dev[0].request("SET disallow_aps bssid 00:11:22:33:44:55 ssid 112233 ssid 123"):
|
||||||
|
raise Exception("Unexpected success on invalid disallow_aps")
|
||||||
if "FAIL" not in dev[0].request("SET disallow_aps ssid 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f00"):
|
if "FAIL" not in dev[0].request("SET disallow_aps ssid 000102030405060708090a0b0c0d0e0f000102030405060708090a0b0c0d0e0f00"):
|
||||||
raise Exception("Unexpected success on invalid disallow_aps")
|
raise Exception("Unexpected success on invalid disallow_aps")
|
||||||
if "FAIL" not in dev[0].request("SET disallow_aps foo 112233445566"):
|
if "FAIL" not in dev[0].request("SET disallow_aps foo 112233445566"):
|
||||||
|
@ -439,6 +444,8 @@ def test_wpas_ctrl_disallow_aps(dev, apdev):
|
||||||
dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
|
dev[0].connect("test", key_mgmt="NONE", scan_freq="2412")
|
||||||
hostapd.add_ap(apdev[1]['ifname'], params)
|
hostapd.add_ap(apdev[1]['ifname'], params)
|
||||||
dev[0].dump_monitor()
|
dev[0].dump_monitor()
|
||||||
|
if "OK" not in dev[0].request("SET disallow_aps bssid 00:11:22:33:44:55 bssid 00:22:33:44:55:66"):
|
||||||
|
raise Exception("Failed to set disallow_aps")
|
||||||
if "OK" not in dev[0].request("SET disallow_aps bssid " + apdev[0]['bssid']):
|
if "OK" not in dev[0].request("SET disallow_aps bssid " + apdev[0]['bssid']):
|
||||||
raise Exception("Failed to set disallow_aps")
|
raise Exception("Failed to set disallow_aps")
|
||||||
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
|
||||||
|
@ -480,11 +487,36 @@ def test_wpas_ctrl_set_uapsd(dev):
|
||||||
raise Exception("Unexpected SET success")
|
raise Exception("Unexpected SET success")
|
||||||
if "FAIL" not in dev[0].request("SET uapsd 0"):
|
if "FAIL" not in dev[0].request("SET uapsd 0"):
|
||||||
raise Exception("Unexpected SET success")
|
raise Exception("Unexpected SET success")
|
||||||
|
if "OK" not in dev[0].request("SET uapsd 1,1,1,1;1"):
|
||||||
|
raise Exception("Unexpected SET failure")
|
||||||
if "OK" not in dev[0].request("SET uapsd 0,0,0,0;0"):
|
if "OK" not in dev[0].request("SET uapsd 0,0,0,0;0"):
|
||||||
raise Exception("Unexpected SET failure")
|
raise Exception("Unexpected SET failure")
|
||||||
if "OK" not in dev[0].request("SET uapsd disable"):
|
if "OK" not in dev[0].request("SET uapsd disable"):
|
||||||
raise Exception("Unexpected SET failure")
|
raise Exception("Unexpected SET failure")
|
||||||
|
|
||||||
|
def test_wpas_ctrl_set(dev):
|
||||||
|
"""wpa_supplicant ctrl_iface SET"""
|
||||||
|
vals = [ "foo",
|
||||||
|
"dot11RSNAConfigPMKLifetime 0",
|
||||||
|
"dot11RSNAConfigPMKReauthThreshold 101",
|
||||||
|
"dot11RSNAConfigSATimeout 0",
|
||||||
|
"wps_version_number -1",
|
||||||
|
"wps_version_number 256" ]
|
||||||
|
for val in vals:
|
||||||
|
if "FAIL" not in dev[0].request("SET " + val):
|
||||||
|
raise Exception("Unexpected SET success for " + val)
|
||||||
|
|
||||||
|
vals = [ "EAPOL::heldPeriod 60",
|
||||||
|
"EAPOL::authPeriod 30",
|
||||||
|
"EAPOL::startPeriod 30",
|
||||||
|
"EAPOL::maxStart 3",
|
||||||
|
"dot11RSNAConfigSATimeout 60",
|
||||||
|
"tdls_disabled 1",
|
||||||
|
"tdls_disabled 0" ]
|
||||||
|
for val in vals:
|
||||||
|
if "OK" not in dev[0].request("SET " + val):
|
||||||
|
raise Exception("Unexpected SET failure for " + val)
|
||||||
|
|
||||||
def test_wpas_ctrl_get_capability(dev):
|
def test_wpas_ctrl_get_capability(dev):
|
||||||
"""wpa_supplicant ctrl_iface GET_CAPABILITY"""
|
"""wpa_supplicant ctrl_iface GET_CAPABILITY"""
|
||||||
res = dev[0].get_capability("eap")
|
res = dev[0].get_capability("eap")
|
||||||
|
|
Loading…
Reference in a new issue