TEST : Multiple basic validation scenarios for TLS and AAA.
Change-Id: Ic0bb12fc2143bbbc572b00b14e2defdbd253edf3
diff --git a/src/test/utils/EapolAAA.py b/src/test/utils/EapolAAA.py
index c51f111..5cf79fd 100644
--- a/src/test/utils/EapolAAA.py
+++ b/src/test/utils/EapolAAA.py
@@ -50,16 +50,29 @@
class EapolPacket(object):
+ src_mac_map = { 'bcast': 'ff:ff:ff:ff:ff:ff',
+ 'mcast': '01:80:C2:00:00:03',
+ 'zeros': '00:00:00:00:00:00',
+ 'default': None
+ }
+
def __init__(self, intf = 'veth0'):
self.intf = intf
self.s = None
self.max_recv_size = 1600
- def setup(self):
+ def setup(self, src_mac = 'default'):
self.s = socket(AF_PACKET, SOCK_RAW, htons(ETHERTYPE_PAE))
self.s.bind((self.intf, ETHERTYPE_PAE))
self.mymac = self.s.getsockname()[4]
- self.llheader = Ether(dst = PAE_GROUP_ADDR, src = self.mymac, type = ETHERTYPE_PAE)
+ mac = None
+ if self.src_mac_map.has_key(src_mac):
+ mac = self.src_mac_map[src_mac]
+ if mac is None:
+ mac = self.mymac
+ self.llheader = Ether(dst = PAE_GROUP_ADDR, src = mac, type = ETHERTYPE_PAE)
+ log.info('llheader packet is %s'%self.llheader.show())
+ log.info('source mac of packet is %s'%mac)
self.recv_sock = L2Socket(iface = self.intf, type = ETHERTYPE_PAE)
def cleanup(self):