# -*- coding: utf-8 -*- # SSID contents and encoding tests # Copyright (c) 2013-2014, Jouni Malinen # # This software may be distributed under the terms of the BSD license. # See README for more details. from remotehost import remote_compatible import logging logger = logging.getLogger() import hostapd @remote_compatible def test_ssid_hex_encoded(dev, apdev): """SSID configuration using hex encoded version""" hostapd.add_ap(apdev[0], { "ssid2": '68656c6c6f' }) dev[0].connect("hello", key_mgmt="NONE", scan_freq="2412") dev[1].connect(ssid2="68656c6c6f", key_mgmt="NONE", scan_freq="2412") def test_ssid_printf_encoded(dev, apdev): """SSID configuration using printf encoded version""" hostapd.add_ap(apdev[0], { "ssid2": 'P"\\0hello\\nthere"' }) dev[0].connect(ssid2="0068656c6c6f0a7468657265", key_mgmt="NONE", scan_freq="2412") dev[1].connect(ssid2='P"\\x00hello\\nthere"', key_mgmt="NONE", scan_freq="2412") ssid = dev[0].get_status_field("ssid") bss = dev[1].get_bss(apdev[0]['bssid']) if ssid != bss['ssid']: raise Exception("Unexpected difference in SSID") dev[2].connect(ssid2='P"' + ssid + '"', key_mgmt="NONE", scan_freq="2412") @remote_compatible def test_ssid_1_octet(dev, apdev): """SSID with one octet""" hostapd.add_ap(apdev[0], { "ssid": '1' }) dev[0].connect("1", key_mgmt="NONE", scan_freq="2412") @remote_compatible def test_ssid_32_octets(dev, apdev): """SSID with 32 octets""" hostapd.add_ap(apdev[0], { "ssid": '1234567890abcdef1234567890ABCDEF' }) dev[0].connect("1234567890abcdef1234567890ABCDEF", key_mgmt="NONE", scan_freq="2412") @remote_compatible def test_ssid_utf8(dev, apdev): """SSID with UTF8 encoding""" hapd = hostapd.add_ap(apdev[0], { "ssid": 'testi-åäöÅÄÖ-testi', "utf8_ssid": "1" }) dev[0].connect("testi-åäöÅÄÖ-testi", key_mgmt="NONE", scan_freq="2412") dev[1].connect(ssid2="74657374692dc3a5c3a4c3b6c385c384c3962d7465737469", key_mgmt="NONE", scan_freq="2412") # verify ctrl_iface for coverage addrs = [ dev[0].p2p_interface_addr(), dev[1].p2p_interface_addr() ] sta = hapd.get_sta(None) if sta['addr'] not in addrs: raise Exception("Unexpected STA address") sta2 = hapd.get_sta(sta['addr'], next=True) if sta2['addr'] not in addrs: raise Exception("Unexpected STA2 address") sta3 = hapd.get_sta(sta2['addr'], next=True) if len(sta3) != 0: raise Exception("Unexpected STA iteration result (did not stop)") def clear_scan_cache(hapd, dev): # clear BSS table to avoid issues in following test cases dev[0].request("REMOVE_NETWORK all") dev[1].request("REMOVE_NETWORK all") dev[0].wait_disconnected() hapd.disable() dev[0].flush_scan_cache() dev[1].flush_scan_cache() @remote_compatible def test_ssid_hidden(dev, apdev): """Hidden SSID""" hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret', "ignore_broadcast_ssid": "1" }) dev[1].connect("secret", key_mgmt="NONE", scan_freq="2412", wait_connect=False) dev[0].connect("secret", key_mgmt="NONE", scan_freq="2412", scan_ssid="1") ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1) if ev is not None: raise Exception("Unexpected connection") clear_scan_cache(hapd, dev) @remote_compatible def test_ssid_hidden2(dev, apdev): """Hidden SSID using zero octets as payload""" hapd = hostapd.add_ap(apdev[0], { "ssid": 'secret2', "ignore_broadcast_ssid": "2" }) dev[1].connect("secret2", key_mgmt="NONE", scan_freq="2412", wait_connect=False) dev[0].connect("secret2", key_mgmt="NONE", scan_freq="2412", scan_ssid="1") ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1) if ev is not None: raise Exception("Unexpected connection") clear_scan_cache(hapd, dev) @remote_compatible def test_ssid_hidden_wpa2(dev, apdev): """Hidden SSID with WPA2-PSK""" params = hostapd.wpa2_params(ssid="secret", passphrase="12345678") params["ignore_broadcast_ssid"] = "1" hapd = hostapd.add_ap(apdev[0], params) dev[1].connect("secret", psk="12345678", scan_freq="2412", wait_connect=False) dev[0].connect("secret", psk="12345678", scan_freq="2412", scan_ssid="1") ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1) if ev is not None: raise Exception("Unexpected connection") clear_scan_cache(hapd, dev)