2013-03-30 12:47:22 +01:00
|
|
|
#!/usr/bin/python
|
|
|
|
#
|
|
|
|
# Python class for controlling wlantest
|
|
|
|
# Copyright (c) 2013, Jouni Malinen <j@w1.fi>
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import os
|
|
|
|
import time
|
|
|
|
import subprocess
|
|
|
|
import logging
|
|
|
|
import wpaspy
|
|
|
|
|
2013-10-31 11:46:42 +01:00
|
|
|
logger = logging.getLogger()
|
2013-03-30 12:47:22 +01:00
|
|
|
|
|
|
|
class Wlantest:
|
2013-05-11 10:34:49 +02:00
|
|
|
def __init__(self):
|
|
|
|
if os.path.isfile('../../wlantest/wlantest_cli'):
|
|
|
|
self.wlantest_cli = '../../wlantest/wlantest_cli'
|
|
|
|
else:
|
|
|
|
self.wlantest_cli = 'wlantest_cli'
|
|
|
|
|
2013-03-30 12:47:22 +01:00
|
|
|
def flush(self):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "flush"])
|
2013-03-30 12:47:22 +01:00
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("wlantest_cli flush failed")
|
|
|
|
|
2013-11-17 20:25:17 +01:00
|
|
|
def relog(self):
|
|
|
|
res = subprocess.check_output([self.wlantest_cli, "relog"])
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("wlantest_cli relog failed")
|
|
|
|
|
2013-03-30 12:47:22 +01:00
|
|
|
def add_passphrase(self, passphrase):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "add_passphrase",
|
2013-03-30 12:47:22 +01:00
|
|
|
passphrase])
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("wlantest_cli add_passphrase failed")
|
|
|
|
|
|
|
|
def add_wepkey(self, key):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "add_wepkey", key])
|
2013-03-30 12:47:22 +01:00
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("wlantest_cli add_key failed")
|
|
|
|
|
|
|
|
def info_bss(self, field, bssid):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "info_bss",
|
|
|
|
field, bssid])
|
2013-03-30 12:47:22 +01:00
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Could not get BSS info from wlantest for " + bssid)
|
|
|
|
return res
|
|
|
|
|
|
|
|
def info_sta(self, field, bssid, addr):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "info_sta",
|
|
|
|
field, bssid, addr])
|
2013-03-30 12:47:22 +01:00
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Could not get STA info from wlantest for " + addr)
|
|
|
|
return res
|
|
|
|
|
2013-03-30 14:31:50 +01:00
|
|
|
def get_sta_counter(self, field, bssid, addr):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "get_sta_counter",
|
|
|
|
field, bssid, addr]);
|
2013-03-30 14:31:50 +01:00
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("wlantest_cli command failed")
|
|
|
|
return int(res)
|
|
|
|
|
2013-03-30 12:47:22 +01:00
|
|
|
def tdls_clear(self, bssid, addr1, addr2):
|
2013-08-25 20:48:51 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "clear_tdls_counters",
|
|
|
|
bssid, addr1, addr2]);
|
2013-03-30 12:47:22 +01:00
|
|
|
|
|
|
|
def get_tdls_counter(self, field, bssid, addr1, addr2):
|
2013-05-11 10:34:49 +02:00
|
|
|
res = subprocess.check_output([self.wlantest_cli, "get_tdls_counter",
|
|
|
|
field, bssid, addr1, addr2]);
|
2013-03-30 12:47:22 +01:00
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("wlantest_cli command failed")
|
|
|
|
return int(res)
|
|
|
|
|
|
|
|
def require_ap_pmf_mandatory(self, bssid):
|
|
|
|
res = self.info_bss("rsn_capab", bssid)
|
|
|
|
if "MFPR" not in res:
|
|
|
|
raise Exception("AP did not require PMF")
|
|
|
|
if "MFPC" not in res:
|
|
|
|
raise Exception("AP did not enable PMF")
|
|
|
|
res = self.info_bss("key_mgmt", bssid)
|
|
|
|
if "PSK-SHA256" not in res:
|
|
|
|
raise Exception("AP did not enable SHA256-based AKM for PMF")
|
|
|
|
|
|
|
|
def require_ap_pmf_optional(self, bssid):
|
|
|
|
res = self.info_bss("rsn_capab", bssid)
|
|
|
|
if "MFPR" in res:
|
|
|
|
raise Exception("AP required PMF")
|
|
|
|
if "MFPC" not in res:
|
|
|
|
raise Exception("AP did not enable PMF")
|
|
|
|
|
|
|
|
def require_ap_no_pmf(self, bssid):
|
|
|
|
res = self.info_bss("rsn_capab", bssid)
|
|
|
|
if "MFPR" in res:
|
|
|
|
raise Exception("AP required PMF")
|
|
|
|
if "MFPC" in res:
|
|
|
|
raise Exception("AP enabled PMF")
|
|
|
|
|
|
|
|
def require_sta_pmf_mandatory(self, bssid, addr):
|
|
|
|
res = self.info_sta("rsn_capab", bssid, addr)
|
|
|
|
if "MFPR" not in res:
|
|
|
|
raise Exception("STA did not require PMF")
|
|
|
|
if "MFPC" not in res:
|
|
|
|
raise Exception("STA did not enable PMF")
|
|
|
|
|
|
|
|
def require_sta_pmf(self, bssid, addr):
|
|
|
|
res = self.info_sta("rsn_capab", bssid, addr)
|
|
|
|
if "MFPC" not in res:
|
|
|
|
raise Exception("STA did not enable PMF")
|
|
|
|
|
|
|
|
def require_sta_key_mgmt(self, bssid, addr, key_mgmt):
|
|
|
|
res = self.info_sta("key_mgmt", bssid, addr)
|
|
|
|
if key_mgmt not in res:
|
|
|
|
raise Exception("Unexpected STA key_mgmt")
|