Merge branch 'master' of https://github.cyanoptics.com/cord-lab/cord-tester into test
diff --git a/src/test/utils/EapMD5.py b/src/test/utils/EapMD5.py
new file mode 100644
index 0000000..61ca405
--- /dev/null
+++ b/src/test/utils/EapMD5.py
@@ -0,0 +1,96 @@
+import sys, os
+from EapolAAA import *
+from enum import *
+import noseMd5AuthHolder as md5AuthHolder
+from socket import *
+from struct import *
+from md5 import md5
+from scapy.all import *
+from nose.tools import *
+from CordTestBase import CordTester
+
+class MD5AuthTest(EapolPacket, CordTester):
+
+ md5StateTable = Enumeration("MD5StateTable", ("ST_EAP_SETUP",
+ "ST_EAP_START",
+ "ST_EAP_ID_REQ",
+ "ST_EAP_MD5_CHALLENGE",
+ "ST_EAP_STATUS",
+ "ST_EAP_MD5_DONE"
+ )
+ )
+ md5EventTable = Enumeration("MD5EventTable", ("EVT_EAP_SETUP",
+ "EVT_EAP_START",
+ "EVT_EAP_ID_REQ",
+ "EVT_EAP_MD5_CHALLENGE",
+ "EVT_EAP_STATUS",
+ "EVT_EAP_MD5_DONE"
+ )
+ )
+ def __init__(self, intf = 'veth0', password = "password", required_status = "EAP_SUCCESS"):
+ self.passwd = password
+ self.req_status = required_status
+ self.fsmTable = md5AuthHolder.initMd5AuthHolderFsmTable(self, self.md5StateTable, self.md5EventTable)
+ EapolPacket.__init__(self, intf)
+ CordTester.__init__(self, self.fsmTable, self.md5StateTable.ST_EAP_MD5_DONE)
+ self.currentState = self.md5StateTable.ST_EAP_SETUP
+ self.currentEvent = self.md5EventTable.EVT_EAP_SETUP
+ self.nextState = None
+ self.nextEvent = None
+
+ def _eapSetup(self):
+ print 'Inside EAP Setup'
+ self.setup()
+ self.nextEvent = self.md5EventTable.EVT_EAP_START
+
+ def _eapStart(self):
+ print 'Inside EAP Start'
+ self.eapol_start()
+ self.nextEvent = self.md5EventTable.EVT_EAP_ID_REQ
+
+ def _eapIdReq(self):
+ print 'Inside EAP ID Req'
+ p = self.eapol_recv()
+ code, pkt_id, eaplen = unpack("!BBH", p[0:4])
+ print "Code %d, id %d, len %d" %(code, pkt_id, eaplen)
+ assert_equal(code, EAP_REQUEST)
+ reqtype = unpack("!B", p[4:5])[0]
+ reqdata = p[5:4+eaplen]
+ assert_equal(reqtype, EAP_TYPE_ID)
+ print "<====== Send EAP Response with identity = %s ================>" % USER
+ self.eapol_id_req(pkt_id, USER)
+ self.nextEvent = self.md5EventTable.EVT_EAP_MD5_CHALLENGE
+
+ def _eapMd5Challenge(self):
+ print 'Inside EAP MD5 Challenge Exchange'
+ challenge,pkt_id =self.eap_md5_challenge_recv(self.passwd)
+ resp=md5(challenge).digest()
+ resp=chr(len(resp))+resp
+ length= 5+len(resp)
+ print "Generated MD5 challenge is %s Length : %d" % (resp,length)
+ print "--> Send EAP response with MD5 challenge"
+ eap_payload = self.eap(EAP_RESPONSE, pkt_id, EAP_TYPE_MD5, str(resp))
+ self.eapol_send(EAPOL_EAPPACKET, eap_payload)
+ self.nextEvent = self.md5EventTable.EVT_EAP_STATUS
+
+ def _eapStatus(self):
+ print 'Inside EAP Status -- Sucess/Failure'
+ if self.req_status == "EAP_SUCCESS":
+ status=self.eap_Status()
+ print "<============EAP code received is = %d ====================>" % status
+ assert_equal(status, EAP_SUCCESS)
+ print"Received EAP SUCCESS"
+ else:
+ print 'Inside EAP Status -- Sucess/Failure ===> SUCCESS should not be received , Since Negative Testcase'
+ self.s.settimeout(10)
+ assert_equal(self.s.gettimeout(), 10)
+ print "Check if the socket timed out ====> Since negative testcase socket should timeout because ONOS is not sending the EAP FAILURE Message"
+ assert_raises(socket.error, self.s.recv, 1024)
+ self.nextEvent = self.md5EventTable.EVT_EAP_MD5_DONE
+
+ def _wrong_password(self):
+ print 'Start Testcase for EAP-MD5 Wrong Password'
+ #self._eap_md5_states()
+ self.__init__(intf = 'veth0', password = "wrong_password", required_status = "EAP_FAILURE")
+
+