Commit graph

12485 commits

Author SHA1 Message Date
Jouni Malinen
fd7f3440eb tests: Additional radius_auth/acct_req_attr coverage
The third attribute is needed in the list to cover full parsing code
coverage.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 20:10:18 +02:00
Jouni Malinen
4814a136b6 tests: IEEE 802.1X and EAPOL-Key index workaround
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 18:43:33 +02:00
Jouni Malinen
a821797219 tests: WPA2-Enterprise using EAP-SIM with zero database timeout
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 18:43:33 +02:00
Jouni Malinen
4c62638234 tests: EAP-FAST and provisioning options
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 18:43:33 +02:00
Jouni Malinen
c24ca04a52 tests: hostapd eapol_version configuration
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 18:43:33 +02:00
Jouni Malinen
cedca7d054 tests: hostapd configuration SET OOM and error cases
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 18:43:33 +02:00
Jouni Malinen
d8de904872 Remove deprecated tx_queue_* params from hostapd.conf notes
The after_beacon and beacon TX queue parameters has not been
configurable through this mechanism for years, so do not list them in
hostapd.conf notes.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:47:00 +02:00
Jouni Malinen
a4d744fe06 tests: hostapd eap_user_file parsing
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:47:00 +02:00
Jouni Malinen
78022c8366 Fix memory leak on hostapd eap_user_file parsing error paths
Need to free all the pending completed EAP users if a parsing error
prevents the file from being used.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:47:00 +02:00
Jouni Malinen
44785ff27b tests: hostapd vlan_file/mac_file parsing
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:47:00 +02:00
Jouni Malinen
02f999c6d8 hostapd: Remove unnecessary NULL check from parser functions
The fname argument cannot be NULL in these location.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
53cef5e58d tests: hostapd global ctrl_iface DETACH failure
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
f4d66e7b3c tests: hostapd and TEST_ALLOC_FAIL/TEST_FAIL
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
2baa15309b tests: hostapd and SET accept_mac_file ctrl_iface command (VLAN ID)
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
ee734e9aab tests: hostapd global control interface with unknown IFNAME= prefix
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
ea173088c7 tests: hostapd DUP_NETWORK error cases
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
f1d7742c53 tests: hostapd global ctrl_iface INTERFACES
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
76f9133cf5 tests: hostapd and UPDATE_BEACON
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
f608a9a077 tests: hostapd and POLL_STA errors
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
02ad9f0b8d tests: Invalid hostapd STA ctrl_iface command subparameter
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
7b28c40892 tests: sae_group in hostapd STA ctrl_iface command
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
603b09b950 tests: hostapd and RELOG
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
d620ae2f54 tests: More SET_NEIGHBOR and REMOVE_NEIGHBOR error cases
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:43 +02:00
Jouni Malinen
d8fae7bc12 tests: More hostapd REQ_RANGE error case coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
15667cd1d4 tests: hostapd and EAPOL_REAUTH errors
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
ec9feaf6e9 tests: hostapd and VENDOR errors
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
9005c33780 tests: hostapd and external I/O errors
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
adbc89ebd4 tests: hostapd and RADAR ctrl_iface command
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
454b66d2c5 tests: WPS PIN provisioning with configured AP using dummy cred
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
b6b6858df1 tests: More hostapd SET command coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
a58bb54f7d tests: More hostapd GET_CONFIG key_mgmt coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
d58f4c641f tests: More BSS_TM_REQ coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
fd5f29e7ed Fix memory leak in hostapd BSS_TM_REQ error path handling
The optional url=<URL> parameter was stored in allocated memory and that
memory was leaked if some following parameter parsing attempts failed.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
def947b771 tests: More hostapd ctrl_iface QoS Map error coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
b25e0fe5c0 tests: HS20_DEAUTH_REQ OOM
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
d0d215d4b7 tests: Additional HS20_WNM_NOTIF coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
95de34a10a Remove trailing whitespace
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
db98b58736 tests: Remove trailing whitespace
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
82358a2a63 tests: Additional hostapd WPS control interface coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
cd8cd01cc1 tests: Additional SA_QUERY coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
e6c65001f8 tests: Additional hostapd NEW_STA coverage
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
3f9e6ca5a9 tests: hostapd BSS config file
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-28 14:31:42 +02:00
Jouni Malinen
45997cce40 hostapd: Add TERMINATE as per-interface command
This was already avaialble through the global control interface, but not
the per-interface one.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 14:50:14 +02:00
Jouni Malinen
a0fda9002a tests: hostapd -i command line argument
This adds some more code coverage reachability testing.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 14:27:03 +02:00
Jouni Malinen
f3569aba06 tests: hostapd SIGUSR1
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 14:23:46 +02:00
Jouni Malinen
412a70c1ee tests: Ignoring invalid hostapd configuration parameter updates
Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 12:39:44 +02:00
Jouni Malinen
546680f81a hostapd: Do not update dtim_period with invalid value
Previously, the update command was rejected, but the actual value was
updated.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 12:24:02 +02:00
Jouni Malinen
3567730589 RADIUS server: Increase maximum number of sessions
It was possible to hit the previously used maximum of 100 active session
in some hwsim test case sequences like this one: eap_proto_pwd_errors
eap_proto_ikev2_errors eap_proto_sim_errors. This happened due to the
large number of RADIUS authentication iterations in short period of
time, i.e., within the 10 second timeout for expiring completed
sessions.

Increase RADIUS_MAX_SESSION from 100 to 1000 and also reduce the timeout
on expiring completed sessions from 10 to 5 seconds.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 12:14:48 +02:00
Jouni Malinen
a5861afcbd hostapd: Do not update invalid wep_key_len_unicast
Previously, the update command was rejected, but the configuration
parameter value was updated anyway.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 12:02:53 +02:00
Jouni Malinen
f78402acea hostapd: Do not update rejected wep_key_len_broadcast
Previously, update command with invalid value got rejected, but the
actual configuration data was updated anyway.

Signed-off-by: Jouni Malinen <j@w1.fi>
2016-12-27 12:02:17 +02:00