Merge branch 'master' of github.cyanoptics.com:cord-lab/cord-tester
diff --git a/src/test/builder/buildFsm.sh b/src/test/builder/buildFsm.sh
index 7540008..aee58ca 100644
--- a/src/test/builder/buildFsm.sh
+++ b/src/test/builder/buildFsm.sh
@@ -6,3 +6,6 @@
##Generate TLS authentication state machine
python yamlFsm.py -p TlsAuthHolder -f noseTlsAuthTest.yaml > ${odir}/noseTlsAuthHolder.py
+
+##Generate PAP authentication state machine
+python yamlFsm.py -p PAPAuthHolder -f nosePAPTest.yaml > ${odir}/nosePAPAuthHolder.py
diff --git a/src/test/builder/nosePAPTest.yaml b/src/test/builder/nosePAPTest.yaml
new file mode 100644
index 0000000..ef9caab
--- /dev/null
+++ b/src/test/builder/nosePAPTest.yaml
@@ -0,0 +1,32 @@
+States:
+ ST_EAP_SETUP:
+ Events:
+ EVT_EAP_SETUP:
+ Actions:
+ - _eapSetup
+ NextState: ST_EAP_START
+ ST_EAP_START:
+ Events:
+ EVT_EAP_START:
+ Actions:
+ - _eapStart
+ NextState: ST_EAP_ID_REQ
+ ST_EAP_ID_REQ:
+ Events:
+ EVT_EAP_ID_REQ:
+ Actions:
+ - _eapIdReq
+ NextState: ST_EAP_PAP_USER_REQ
+ ST_EAP_PAP_USER_REQ:
+ Events:
+ EVT_EAP_PAP_USER_REQ:
+ Actions:
+ - _eapPAPUserReq
+ NextState: ST_EAP_PAP_PASSWD_REQ
+ ST_EAP_PAP_PASSWD_REQ:
+ Events:
+ EVT_EAP_PAP_PASSWD_REQ:
+ Actions:
+ - _eapPAPPassReq
+ NextState: ST_EAP_PAP_DONE
+
diff --git a/src/test/fsm/nosePAPAuthHolder.py b/src/test/fsm/nosePAPAuthHolder.py
new file mode 100644
index 0000000..ed797a6
--- /dev/null
+++ b/src/test/fsm/nosePAPAuthHolder.py
@@ -0,0 +1,27 @@
+#!/usr/bin/env python
+
+def initPAPAuthHolderFsmTable(obj,St,Ev):
+ return {
+
+ ## CurrentState Event Actions NextState
+
+ (St.ST_EAP_SETUP, Ev.EVT_EAP_SETUP ):( (obj._eapSetup,), St.ST_EAP_START),
+
+ ## CurrentState Event Actions NextState
+
+ (St.ST_EAP_PAP_PASSWD_REQ, Ev.EVT_EAP_PAP_PASSWD_REQ ):( (obj._eapPAPPassReq,), St.ST_EAP_PAP_DONE),
+
+ ## CurrentState Event Actions NextState
+
+ (St.ST_EAP_PAP_USER_REQ, Ev.EVT_EAP_PAP_USER_REQ ):( (obj._eapPAPUserReq,), St.ST_EAP_PAP_PASSWD_REQ),
+
+ ## CurrentState Event Actions NextState
+
+ (St.ST_EAP_ID_REQ, Ev.EVT_EAP_ID_REQ ):( (obj._eapIdReq,), St.ST_EAP_PAP_USER_REQ),
+
+ ## CurrentState Event Actions NextState
+
+ (St.ST_EAP_START, Ev.EVT_EAP_START ):( (obj._eapStart,), St.ST_EAP_ID_REQ),
+
+}
+
diff --git a/src/test/fsm/noseTlsAuthHolder.py b/src/test/fsm/noseTlsAuthHolder.py
index a060ac8..127b10b 100644
--- a/src/test/fsm/noseTlsAuthHolder.py
+++ b/src/test/fsm/noseTlsAuthHolder.py
@@ -1,4 +1,4 @@
-#!python
+#!/usr/bin/env python
def initTlsAuthHolderFsmTable(obj,St,Ev):
return {
diff --git a/src/test/igmp/igmpTest.py b/src/test/igmp/igmpTest.py
new file mode 100644
index 0000000..60d314e
--- /dev/null
+++ b/src/test/igmp/igmpTest.py
@@ -0,0 +1,96 @@
+import unittest
+from nose.tools import *
+from nose.twistedtools import reactor, deferred
+from twisted.internet import defer
+from scapy.all import *
+import time
+import os, sys
+CORD_TEST_UTILS = 'utils'
+test_root = os.getenv('CORD_TEST_ROOT') or './'
+sys.path.append(test_root + CORD_TEST_UTILS)
+from IGMP import *
+
+class IGMPTestState:
+
+ def __init__(self, groups = [], df = None, state = 0):
+ self.df = df
+ self.state = state
+ self.counter = 0
+ self.groups = groups
+ self.group_map = {} ##create a send/recv count map
+ for g in groups:
+ self.group_map[g] = [0, 0]
+
+ def update(self, group, tx = 0, rx = 0):
+ index = 0 if rx == 0 else 1
+ v = tx if rx == 0 else rx
+ if self.group_map.has_key(group):
+ self.group_map[group][index] += v
+
+ def update_state(self):
+ self.state = self.state ^ 1
+ self.counter += 1
+
+class igmp_exchange(unittest.TestCase):
+
+ def igmp_verify(self, igmpState):
+ ## check if the send is received for the groups
+ for g in igmpState.groups:
+ tx = igmpState.group_map[g][0]
+ rx = igmpState.group_map[g][1]
+ assert_greater(tx, 0)
+ assert_equal(tx, rx)
+ print 'IGMP test verification success'
+
+ def igmp_send(self, igmpState, iface = 'veth2'):
+ dst_mac = '01:00:5e:00:01:01'
+ src_mac = '02:88:b4:e4:90:77'
+ src_ip = '1.2.3.4'
+ eth = Ether(dst = dst_mac, src = src_mac)
+ data = repr(time.time())
+ for g in igmpState.groups:
+ ip = IP(dst = g, src = src_ip)
+ sendp(eth/ip/data, iface=iface)
+ igmpState.update(g, tx = 1)
+
+ ##done sending. Bounce the states
+ igmpState.update_state()
+ return 0
+
+ def igmp_recv(self, igmpState, iface = 'veth0'):
+ for g in igmpState.groups:
+ igmpState.update(g, rx = 1)
+ ##done receiving. Bounce the state back to send
+ igmpState.update_state()
+ return 0
+
+ def send_igmp_join(self, igmpState, iface = 'veth0'):
+ src_list = ['1.2.3.4']
+ for g in igmpState.groups:
+ igmp = IGMP(mtype = IGMPV3_REPORT,
+ group = g,
+ rtype = IGMP_EXCLUDE,
+ src_list = src_list)
+ sendp(igmp.scapify(), iface = iface)
+
+ @deferred(timeout=10)
+ def test_igmp_sendrecv(self):
+ groups = ['224.0.1.1', '225.0.0.1']
+ def igmp_srp_task(stateObject):
+ if stateObject.state == 0:
+ result = self.igmp_send(stateObject)
+ else:
+ result = self.igmp_recv(stateObject)
+
+ if stateObject.counter < 20:
+ reactor.callLater(0, igmp_srp_task, stateObject)
+ else:
+ self.igmp_verify(stateObject)
+ stateObject.df.callback(0)
+
+ df = defer.Deferred()
+ igmpState = IGMPTestState(groups = groups, df = df)
+ self.send_igmp_join(igmpState)
+ reactor.callLater(0, igmp_srp_task, igmpState)
+ return df
+
diff --git a/src/test/pap/papTest.py b/src/test/pap/papTest.py
new file mode 100644
index 0000000..3ce25f9
--- /dev/null
+++ b/src/test/pap/papTest.py
@@ -0,0 +1,16 @@
+import unittest
+import os,sys
+CORD_TEST_UTILS = 'utils'
+test_root = os.getenv('CORD_TEST_ROOT') or './'
+sys.path.append(test_root + CORD_TEST_UTILS)
+from EapPAP import PAPAuthTest
+
+class eap_auth_exchange(unittest.TestCase):
+ def test_eap_pap(self):
+ pap = PAPAuthTest()
+ pap.runTest()
+
+if __name__ == '__main__':
+ t = PAPAuthTest()
+ t.runTest()
+
diff --git a/src/test/utils/EapPAP.py b/src/test/utils/EapPAP.py
new file mode 100644
index 0000000..c936dc3
--- /dev/null
+++ b/src/test/utils/EapPAP.py
@@ -0,0 +1,87 @@
+import sys, os
+cord_root = os.getenv('CORD_TEST_ROOT') or './'
+CORD_TEST_FSM = 'fsm'
+sys.path.append(cord_root + CORD_TEST_FSM)
+from EapolAAA import *
+from enum import *
+import nosePAPAuthHolder as PAPAuthHolder
+from socket import *
+from struct import *
+import scapy
+from nose.tools import *
+from CordTestBase import CordTester
+PAP_USER = "raduser"
+PAP_PASSWD = "radpass"
+
+class PAPAuthTest(EapolPacket, CordTester):
+
+ PAPStateTable = Enumeration("PAPStateTable", ("ST_EAP_SETUP",
+ "ST_EAP_START",
+ "ST_EAP_ID_REQ",
+ "ST_EAP_PAP_USER_REQ",
+ "ST_EAP_PAP_PASSWD_REQ",
+ "ST_EAP_PAP_DONE"
+ )
+ )
+ PAPEventTable = Enumeration("PAPEventTable", ("EVT_EAP_SETUP",
+ "EVT_EAP_START",
+ "EVT_EAP_ID_REQ",
+ "EVT_EAP_PAP_USER_REQ",
+ "EVT_EAP_PAP_PASSWD_REQ",
+ "EVT_EAP_PAP_DONE"
+ )
+ )
+ def __init__(self, intf = 'veth0'):
+ self.fsmTable = PAPAuthHolder.initPAPAuthHolderFsmTable(self, self.PAPStateTable, self.PAPEventTable)
+ EapolPacket.__init__(self, intf)
+ CordTester.__init__(self, self.fsmTable, self.PAPStateTable.ST_EAP_PAP_DONE)
+ #self.PAPStateTable, self.PAPEventTable)
+ self.currentState = self.PAPStateTable.ST_EAP_SETUP
+ self.currentEvent = self.PAPEventTable.EVT_EAP_SETUP
+ self.nextState = None
+ self.nextEvent = None
+
+ def _eapSetup(self):
+ print 'Inside EAP PAP Setup'
+ self.setup()
+ self.nextEvent = self.PAPEventTable.EVT_EAP_START
+
+ def _eapStart(self):
+ print 'Inside EAP PAP Start'
+ self.eapol_start()
+ self.nextEvent = self.PAPEventTable.EVT_EAP_ID_REQ
+
+ def _eapIdReq(self):
+ print 'Inside EAP ID Req'
+ p = self.eapol_recv()
+ code, pkt_id, eaplen = unpack("!BBH", p[0:4])
+ print "Code %d, id %d, len %d" %(code, pkt_id, eaplen)
+ assert_equal(code, EAP_REQUEST)
+ reqtype = unpack("!B", p[4:5])[0]
+ reqdata = p[5:4+eaplen]
+ assert_equal(reqtype, EAP_TYPE_ID)
+ print "<====== Send EAP Response with identity = %s ================>" % PAP_USER
+ self.eapol_id_req(pkt_id, PAP_USER)
+ self.nextEvent = self.PAPEventTable.EVT_EAP_PAP_USER_REQ
+
+ def _eapPAPUserReq(self):
+ print 'Inside Challenge'
+ p = self.eapol_recv()
+ code, pkt_id, eaplen = unpack("!BBH", p[0:4])
+ print "Code %d, id %d, len %d" %(code, pkt_id, eaplen)
+ assert_equal(code, EAP_REQUEST)
+ reqtype = unpack("!B", p[4:5])[0]
+ reqdata = p[5:4+eaplen]
+ assert_equal(reqtype, EAP_TYPE_MD5)
+ print "<====== Send EAP Response with Password = %s ================>" % PAP_PASSWD
+ self.eapol_id_req(pkt_id, PAP_PASSWD)
+ self.nextEvent = self.PAPEventTable.EVT_EAP_PAP_PASSWD_REQ
+
+ def _eapPAPPassReq(self):
+ print 'Inside Challenge'
+ p = self.eapol_recv()
+ code, pkt_id, eaplen = unpack("!BBH", p[0:4])
+ print "Code %d, id %d, len %d" %(code, pkt_id, eaplen)
+ assert_equal(code, EAP_SUCCESS)
+ self.nextEvent = self.PAPEventTable.EVT_EAP_PAP_DONE
+
diff --git a/src/test/utils/IGMP.py b/src/test/utils/IGMP.py
new file mode 100644
index 0000000..95ce1ec
--- /dev/null
+++ b/src/test/utils/IGMP.py
@@ -0,0 +1,148 @@
+from socket import *
+from struct import *
+from scapy.all import *
+from itertools import *
+
+IGMPV3_REPORT = 0x22
+IGMP_LEAVE = 0x17
+IGMP_EXCLUDE = 0x04
+IGMP_INCLUDE = 0x03
+IGMPV3_ALL_ROUTERS = '224.0.0.22'
+IGMPv3 = 3
+IP_SRC = '1.2.3.4'
+ETHERTYPE_IP = 0x0800
+IGMP_DST_MAC = "01:00:5e:00:01:01"
+IGMP_SRC_MAC = "5a:e1:ac:ec:4d:a1"
+
+class IGMP:
+
+ def __init__(self, mtype = None, group = '', rtype = None, src_list = []):
+ self.version = IGMPv3
+ self.mtype = mtype
+ self.group = group
+ self.src_list= src_list
+ self.rtype = rtype
+
+ def checksum(self, msg):
+ s = 0
+ for i in range(0, len(msg), 2):
+ w = ord(msg[i]) + (ord(msg[i+1]) << 8)
+ c = s + w
+ s = (c & 0xffff) + (c >> 16)
+ return ~s & 0xffff
+
+ def update_igmp_checksum(self, pkt):
+ cs = self.checksum(pkt)
+ #print 'igmp checksum: ' + str(hex(cs))
+ m = []
+ for x in pkt:
+ m.append(ord(x))
+ higher = (cs >> 8) & 0xff
+ lower = cs & 0xff
+ m[2] = lower
+ m[3] = higher
+ m = pack("%dB" % len(m), *m)
+ return m
+
+ def update_ip_checksum(self, pkt):
+ cs = self.checksum(pkt)
+ #print 'ip hdr checksum: ' + str(hex(cs))
+ m = []
+ for x in pkt:
+ m.append(ord(x))
+ higher = (cs >> 8) & 0xff
+ lower = cs & 0xff
+ m[10] = lower
+ m[11] = higher
+ m = pack("%dB" % len(m), *m)
+ return m
+
+ def build_ip_hdr(self, s, d):
+ ip_ihl_len = 0x46 #8 bits
+ ip_dscp = 0xc0 #8 bits
+ ip_hdr_total_len = 0x0028 #16 bits
+ ip_id = 0x0000 #16 bits
+ ip_flags = 0x4000 #16 bits
+ ip_ttl = 1 #8 bits
+ ip_protocol = 0x02 #8 bits
+ ip_cs = 0x0000 #16 bits (should filled by kernel but seems not???)
+ #ip_src #32 bits
+ #ip_dst #32 bits
+ ip_options = 0x94040000 #32 bits
+ #total len 24 bytes
+ ip_header = pack('!BBHHHBBH4s4sI', ip_ihl_len, ip_dscp, ip_hdr_total_len,
+ ip_id, ip_flags, ip_ttl, ip_protocol, ip_cs, inet_aton(s),
+ inet_aton(d), ip_options)
+ return ip_header
+
+ def dump_packet(self, data):
+ i = 0
+ for x in data:
+ if i == 4:
+ print ''
+ i = 0
+ i += 1
+ sys.stdout.write(' %0.2x' % ord(x))
+ print ''
+
+ def build_igmp(self, msg_type = None, group = None, record_type = None, src_list = None):
+ msg_type = self.mtype if msg_type == None else msg_type
+ group = self.group if group == None else group
+ record_type = self.rtype if record_type == None else record_type
+ src_list = self.src_list if src_list == None else src_list
+ if msg_type == IGMP_LEAVE:
+ pkt = pack('!BBH4s', msg_type, 0, 0, inet_aton(group))
+ elif msg_type == IGMPV3_REPORT:
+ pkt = pack('!BBHHHBBH', msg_type, 0x00, 0x0000, 0x0000, 0x0001, record_type,
+ 0x00, len(src_list))
+ pkt += pack('!4s', inet_aton(group))
+ for a in src_list:
+ pkt += pack('!4s', inet_aton(a))
+ else:
+ print 'unsupported report type: ' + str(msg_type)
+ return None
+ return pkt
+
+ def build_join_msg(self, group = None, record_type = None, src_list = None):
+ return self.build_igmp(msg_type = IGMPV3_REPORT,
+ group = group,
+ record_type = record_type,
+ src_list = src_list)
+
+ def build_leave_msg(self, group = None):
+ return self.build_igmp(msg_type = IGMPV3_REPORT,
+ group = group,
+ record_type = IGMP_INCLUDE,
+ src_list = [])
+
+ def build_ip_igmp(self,
+ src = IP_SRC,
+ msg_type = None,
+ group = None,
+ record_type = None,
+ src_list = None):
+
+ igmp = self.build_igmp(msg_type = msg_type,
+ group = group,
+ record_type = record_type,
+ src_list = src_list)
+ igmp = self.update_igmp_checksum(igmp)
+ ip_hdr = self.build_ip_hdr(src, IGMPV3_ALL_ROUTERS)
+ p = ip_hdr + igmp
+ p = self.update_ip_checksum(p)
+ return p
+
+ def scapify(self,
+ src = IP_SRC,
+ msg_type = None,
+ group = None,
+ record_type = None,
+ src_list = None):
+
+ ip_igmp = self.build_ip_igmp(src = src,
+ msg_type = msg_type,
+ group = group,
+ record_type = record_type,
+ src_list = src_list)
+ eth = Ether(dst = IGMP_DST_MAC, src = IGMP_SRC_MAC, type = ETHERTYPE_IP)
+ return eth/ip_igmp