passphrase="12345678"
params = ft_params1a(ssid=ssid, passphrase=passphrase)
- params['ft_psk_generate_local'] = "1";
+ params['ft_psk_generate_local'] = "1"
del params['pmk_r1_push']
hapd0 = hostapd.add_ap(apdev[0], params)
params = ft_params2a(ssid=ssid, passphrase=passphrase)
- params['ft_psk_generate_local'] = "1";
+ params['ft_psk_generate_local'] = "1"
del params['pmk_r1_push']
hapd1 = hostapd.add_ap(apdev[1], params)
passphrase="12345678"
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, conndev="brvlan1")
passphrase="12345678"
params = ft_params1a(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
- params['ft_psk_generate_local'] = "1";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
+ params['ft_psk_generate_local'] = "1"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2a(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
- params['ft_psk_generate_local'] = "1";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
+ params['ft_psk_generate_local'] = "1"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, conndev="brvlan1")
passphrase="12345678"
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
+ params['dynamic_vlan'] = "1"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, conndev="brvlan1",
passphrase="12345678"
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, roams=50,
passphrase="12345678"
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, over_ds=True,
passphrase="12345678"
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, over_ds=True,
params = ft_params1(ssid=ssid, passphrase=passphrase)
params["pmk_r1_push"] = "0"
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd0 = hostapd.add_ap(apdev[0]['ifname'], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
params["pmk_r1_push"] = "0"
- params['dynamic_vlan'] = "1";
- params['accept_mac_file'] = "hostapd.accept";
+ params['dynamic_vlan'] = "1"
+ params['accept_mac_file'] = "hostapd.accept"
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, over_ds=True,
radius = hostapd.radius_params()
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
hapd0 = hostapd.add_ap(apdev[0], params)
params = ft_params2_incorrect_rrb_key(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
radius = hostapd.radius_params()
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
hapd0 = hostapd.add_ap(apdev[0], params)
params = ft_params2_r0kh_mismatch(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
passphrase="12345678"
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params['ft_psk_generate_local'] = "1";
+ params['ft_psk_generate_local'] = "1"
hapd0 = hostapd.add_ap(apdev[0], params)
bssid0 = hapd0.own_addr()
scan_freq="2412")
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params['ft_psk_generate_local'] = "1";
+ params['ft_psk_generate_local'] = "1"
hapd1 = hostapd.add_ap(apdev[1], params)
bssid1 = hapd1.own_addr()
dev[0].scan_for_bss(bssid1, freq="2412")
radius = hostapd.radius_params()
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP-SHA384"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
hapd0 = hostapd.add_ap(apdev[0], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP-SHA384"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
radius = hostapd.radius_params()
params = ft_params1(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP-SHA384"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
hapd0 = hostapd.add_ap(apdev[0], params)
params = ft_params2(ssid=ssid, passphrase=passphrase)
- params["ieee80211w"] = "2";
+ params["ieee80211w"] = "2"
params['wpa_key_mgmt'] = "FT-EAP-SHA384"
params["ieee8021x"] = "1"
params = dict(list(radius.items()) + list(params.items()))
'realm': "example.com",
'username': "user",
'eap': "PEAP" })
- dev[0].set_cred(id, "password", "ext:password");
+ dev[0].set_cred(id, "password", "ext:password")
interworking_select(dev[0], bssid, "home", freq=2412)
dev[0].dump_monitor()
dev[0].request("NOTE wpa_config_set(password)")
time.sleep(10)
ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], 12)
if not ev:
- raise Exception("CTRL-EVENT-SCAN-STARTED not seen");
+ raise Exception("CTRL-EVENT-SCAN-STARTED not seen")
b = get_blacklist(wpas)
if '00:00:00:00:00:00' in b:
time.sleep(10)
ev = wpas.wait_event(["CTRL-EVENT-SCAN-STARTED"], 12)
if not ev:
- raise Exception("CTRL-EVENT-SCAN-STARTED not seen");
+ raise Exception("CTRL-EVENT-SCAN-STARTED not seen")
b = get_blacklist(wpas)
if bssid0 in b:
if "|assoc:" not in res:
raise Exception("Missing assoc info in SIGNATURE")
if "wps:" in res:
- raise Exception("Unexpected WPS info");
+ raise Exception("Unexpected WPS info")
if ",221(0050f2,4)," in res:
- raise Exception("Unexpected WPS IE info");
+ raise Exception("Unexpected WPS IE info")
if ",221(506f9a,9)," in res:
- raise Exception("Unexpected P2P IE info");
+ raise Exception("Unexpected P2P IE info")
res = hapd.request("SIGNATURE " + addr)
logger.info("sta: " + res)
if "wps:track_test" not in res:
raise Exception("Missing WPS model name")
if ",221(0050f2,4)," not in res:
- raise Exception("Missing WPS IE info");
+ raise Exception("Missing WPS IE info")
if ",221(506f9a,9)," not in res:
- raise Exception("Missing P2P IE info");
+ raise Exception("Missing P2P IE info")
addr2 = dev[2].own_addr()
res = hapd.request("SIGNATURE " + addr2)
"server_cert": "auth_serv/server.pem",
"private_key": "auth_serv/server.key",
"eap_message": "hello" }
- return params;
+ return params
def test_authsrv_oom(dev, apdev):
"""Authentication server OOM"""
cmd = "DPP_CONFIGURATOR_ADD"
if conf_curve:
cmd += " curve=" + conf_curve
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
logger.info("Create configurator on dev1")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
cmd = "DPP_CONFIGURATOR_ADD"
if conf_curve:
cmd += " curve=" + conf_curve
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
if conf_curve:
cmd += " curve=" + conf_curve
cmd += " key=" + csign
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator (reconf)")
conf_id = int(res)
check_dpp_capab(dev[0])
check_dpp_capab(dev[1])
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
id1 = int(res)
dev[0].set("dpp_configurator_params",
- " conf=sta-dpp configurator=%d%s" % (conf_id, extra));
+ " conf=sta-dpp configurator=%d%s" % (conf_id, extra))
cmd = "DPP_LISTEN 2412 role=configurator"
if "OK" not in dev[0].request(cmd):
raise Exception("Failed to start listen operation")
check_dpp_capab(hapd)
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[0].set("dpp_configurator_params",
- " conf=ap-dpp configurator=%d" % conf_id);
+ " conf=ap-dpp configurator=%d" % conf_id)
cmd = "DPP_LISTEN 2437 role=configurator"
if "OK" not in dev[0].request(cmd):
raise Exception("Failed to start listen operation")
check_dpp_capab(hapd)
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[0].set("dpp_configurator_params",
- " conf=ap-dpp configurator=%d" % conf_id);
+ " conf=ap-dpp configurator=%d" % conf_id)
cmd = "DPP_LISTEN 2462 role=configurator"
if "OK" not in dev[0].request(cmd):
raise Exception("Failed to start listen operation")
check_dpp_capab(dev[1])
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
check_dpp_capab(dev[0])
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
dev[0].set("dpp_configurator_params",
- " conf=sta-dpp configurator=%d" % conf_id);
+ " conf=sta-dpp configurator=%d" % conf_id)
run_dpp_pkex2(dev, apdev)
def run_dpp_pkex2(dev, apdev, curve=None, init_extra=""):
raise Exception("Failed to set PKEX data (responder/hostapd)")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
check_dpp_capab(hapd)
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
id0 = int(res)
dev[0].set("dpp_configurator_params",
- " conf=ap-dpp configurator=%d" % conf_id);
+ " conf=ap-dpp configurator=%d" % conf_id)
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
res = dev[0].request(cmd)
check_dpp_capab(hapd)
cmd = "DPP_CONFIGURATOR_ADD"
- res = hapd.request(cmd);
+ res = hapd.request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
check_dpp_capab(hapd)
cmd = "DPP_CONFIGURATOR_ADD"
- res = hapd.request(cmd);
+ res = hapd.request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
hapd.set("dpp_configurator_params",
- " conf=sta-dpp configurator=%d" % conf_id);
+ " conf=sta-dpp configurator=%d" % conf_id)
addr = hapd.own_addr().replace(':', '')
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
if expect_failure:
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
if ev is not None:
- raise Exception("Unexpected connection");
+ raise Exception("Unexpected connection")
dev[0].request("DISCONNECT")
else:
dev[0].wait_connected()
check_dpp_capab(hapd)
cmd = "DPP_CONFIGURATOR_ADD"
- res = hapd.request(cmd);
+ res = hapd.request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
if "OK" not in res:
raise Exception("DPP_CONFIGURATOR_REMOVE failed")
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
- res = hapd.request(cmd);
+ res = hapd.request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator (reconf)")
conf_id = int(res)
uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
logger.info("Provision AP with DPP configuration")
- res = dev[1].request("DPP_CONFIGURATOR_ADD");
+ res = dev[1].request("DPP_CONFIGURATOR_ADD")
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
if "OK" not in dev[2].request(cmd):
raise Exception("Failed to start listen operation")
- res = dev[1].request("DPP_CONFIGURATOR_ADD");
+ res = dev[1].request("DPP_CONFIGURATOR_ADD")
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id_2 = int(res)
else:
cmd += " role=configurator"
dev[0].set("dpp_configurator_params",
- " conf=sta-dpp configurator=%d" % conf_id);
+ " conf=sta-dpp configurator=%d" % conf_id)
elif incompatible_roles:
cmd += " role=enrollee"
for count, func in tests:
with alloc_fail(dev[1], count, func):
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" not in res:
raise Exception("Unexpected DPP_CONFIGURATOR_ADD success")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
for count, func in tests:
with fail_test(dev[1], count, func):
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" not in res:
raise Exception("Unexpected DPP_CONFIGURATOR_ADD success")
for count, func in tests:
with fail_test(dev[1], count, func):
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" not in res:
raise Exception("Unexpected DPP_BOOTSTRAP_GEN success")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
def test_dpp_own_config_sign_fail(dev, apdev):
"""DPP own config signing failure"""
check_dpp_capab(dev[0])
- res = dev[0].request("DPP_CONFIGURATOR_ADD");
+ res = dev[0].request("DPP_CONFIGURATOR_ADD")
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
check_dpp_capab(hapd)
- res = hapd.request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256);
+ res = hapd.request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
if "FAIL" in csign or len(csign) == 0:
raise Exception("DPP_CONFIGURATOR_GET_KEY failed")
- res = dev[0].request("DPP_CONFIGURATOR_ADD key=" + csign);
+ res = dev[0].request("DPP_CONFIGURATOR_ADD key=" + csign)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id2 = int(res)
def run_dpp_network_addition_failure(dev, apdev):
check_dpp_capab(dev[0])
- res = dev[0].request("DPP_CONFIGURATOR_ADD");
+ res = dev[0].request("DPP_CONFIGURATOR_ADD")
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
if 'anqp_fils_realm_info' not in bss:
raise Exception("FILS Realm Information ANQP-element not seen")
- info = bss['anqp_fils_realm_info'];
+ info = bss['anqp_fils_realm_info']
expected = ''
for realm in fils_realms:
hash = hashlib.sha256(realm.lower()).digest()
if ev is None:
raise Exception("Association not rejected")
if 'status_code=34' not in ev:
- raise Exception("STA assoc request was not rejected with status code 34: " + ev);
+ raise Exception("STA assoc request was not rejected with status code 34: " + ev)
t_rej = datetime.now()
# Set the scan interval to make dev[0] look for connections
dev[0].flush_scan_cache()
bssid = apdev[0]['bssid']
- logger.info("bssid: " + bssid);
+ logger.info("bssid: " + bssid)
hapd = None
# construct 2 MBSSID IEs, each MBSSID IE contains 1 profile
dev[0].flush_scan_cache()
bssid = apdev[0]['bssid']
- logger.info("bssid: " + bssid);
+ logger.info("bssid: " + bssid)
hapd = None
# construct 2 MBSSID IEs, each MBSSID IE contains 1 profile
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[1].set("dpp_configurator_params",
- " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id));
+ " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id))
cmd = "DPP_LISTEN 2437 role=configurator"
if "OK" not in dev[1].request(cmd):
raise Exception("Failed to start listen operation")
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[1].set("dpp_configurator_params",
- " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id));
+ " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id))
cmd = "DPP_LISTEN 2437 role=configurator qr=mutual"
if "OK" not in dev[1].request(cmd):
raise Exception("Failed to start listen operation")
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
def dpp_resp_conf_mutual(dev, conf_id, uri):
logger.info("Starting DPP responder/configurator in a thread")
dev.set("dpp_configurator_params",
- " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id));
+ " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id))
cmd = "DPP_LISTEN 2437 role=configurator qr=mutual"
if "OK" not in dev.request(cmd):
raise Exception("Failed to initiate DPP listen")
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[1].set("dpp_configurator_params",
- " conf=sta-psk ssid=%s pass=%s configurator=%d" % ("DPPNET01".encode("hex"), "ThisIsDppPassphrase".encode("hex"), conf_id));
+ " conf=sta-psk ssid=%s pass=%s configurator=%d" % ("DPPNET01".encode("hex"), "ThisIsDppPassphrase".encode("hex"), conf_id))
cmd = "DPP_LISTEN 2437 role=configurator"
if "OK" not in dev[1].request(cmd):
raise Exception("Failed to start listen operation")
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[1].set("dpp_configurator_params",
- " conf=sta-sae ssid=%s pass=%s configurator=%d" % ("DPPNET01".encode("hex"), "ThisIsDppPassphrase".encode("hex"), conf_id));
+ " conf=sta-sae ssid=%s pass=%s configurator=%d" % ("DPPNET01".encode("hex"), "ThisIsDppPassphrase".encode("hex"), conf_id))
cmd = "DPP_LISTEN 2437 role=configurator"
if "OK" not in dev[1].request(cmd):
raise Exception("Failed to start listen operation")
logger.info("URI from sigma_dut: " + uri)
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
sigma_dut_cmd_check("ap_reset_default,program,DPP")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[0].request(cmd);
+ res = dev[0].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
def run_sigma_dut_dpp_pkex_responder_proto(dev, apdev):
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
time.sleep(1)
logger.info("Starting DPP initiator/configurator in a thread")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev.request(cmd);
+ res = dev.request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
time.sleep(1)
logger.info("Starting DPP PKEX initiator/configurator in a thread")
cmd = "DPP_CONFIGURATOR_ADD"
- res = dev.request(cmd);
+ res = dev.request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
dev[0].set("dpp_config_processing", "2")
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
- res = dev[1].request(cmd);
+ res = dev[1].request(cmd)
if "FAIL" in res:
raise Exception("Failed to add configurator")
conf_id = int(res)
uri0 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
dev[1].set("dpp_configurator_params",
- " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id));
+ " conf=sta-dpp ssid=%s configurator=%d" % ("DPPNET01".encode("hex"), conf_id))
cmd = "DPP_LISTEN 2437 role=configurator"
if "OK" not in dev[1].request(cmd):
raise Exception("Failed to start listen operation")
if ev is None:
raise Exception("Disconnection not reported")
if "reason=23" not in ev:
- raise Exception("Unexpected disconnection reason: " + ev);
+ raise Exception("Unexpected disconnection reason: " + ev)
def test_suite_b_pmkid_failure(dev, apdev):
"""WPA2/GCMP connection at Suite B 128-bit level and PMKID derivation failure"""
if ev is None:
raise Exception("Disconnection not reported")
if "reason=23" not in ev:
- raise Exception("Unexpected disconnection reason: " + ev);
+ raise Exception("Unexpected disconnection reason: " + ev)
CFG = """
ifaces :
{
- ids = ["%s", "%s" ];
+ ids = ["%s", "%s" ]
links = (
(0, 1, 30)
- );
-};
+ )
+}
"""
CFG2 = """
ifaces :
{
- ids = ["%s", "%s", "%s"];
-};
+ ids = ["%s", "%s", "%s"]
+}
model:
{
- type = "prob";
+ type = "prob"
links = (
(0, 1, 0.000000),
(0, 2, 0.000000),
(1, 2, 1.000000)
- );
-};
+ )
+}
"""
CFG3 = """
ifaces :
{
- ids = ["%s", "%s", "%s", "%s", "%s" ];
-};
+ ids = ["%s", "%s", "%s", "%s", "%s" ]
+}
model:
{
- type = "prob";
+ type = "prob"
- default_prob = 1.0;
+ default_prob = 1.0
links = (
(0, 1, 0.000000),
(1, 2, 0.000000),
(2, 3, 0.000000),
(3, 4, 0.000000)
- );
-};
+ )
+}
"""
def get_wmediumd_version():
if len(LocalVariables.revs) > 0:
- return LocalVariables.revs;
+ return LocalVariables.revs
try:
verstr = subprocess.check_output(['wmediumd', '-V'])
while len(LocalVariables.revs) < 3:
LocalVariables.revs += [0]
- return LocalVariables.revs;
+ return LocalVariables.revs
def require_wmediumd_version(major, minor, patch):
revs = get_wmediumd_version()