Changes to TLS test scenarios and util
functions.
Change-Id: I76722e6ca1273fe60ac26fd0bf85e09853e7ca0c
diff --git a/src/test/tls/tlsTest.py b/src/test/tls/tlsTest.py
index 1dcf7a2..a94714f 100644
--- a/src/test/tls/tlsTest.py
+++ b/src/test/tls/tlsTest.py
@@ -144,7 +144,7 @@
return df
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_session_id(self):
+ def test_eap_tls_with_invalid_session_id(self):
df = defer.Deferred()
def eap_tls_invalid_session_id(df):
def tls_invalid_session_id_cb():
@@ -157,7 +157,7 @@
return df
@deferred(TLS_TIMEOUT)
- def test_eap_tls_random_gmt_unix_time(self):
+ def test_eap_tls_with_random_gmt_unix_time(self):
df = defer.Deferred()
def eap_tls_invalid_gmt_unix_time(df):
def eap_tls_invalid_gmt_unix_time_cb():
@@ -172,7 +172,7 @@
return df
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_content_type(self,Positive_Test=True):
+ def test_eap_tls_with_invalid_content_type(self,Positive_Test=True):
df = defer.Deferred()
def eap_tls_invalid_content_type(df):
def tls_invalid_content_type_cb():
@@ -185,7 +185,7 @@
return df
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_record_fragment_length(self):
+ def test_eap_tls_with_invalid_record_fragment_length(self):
df = defer.Deferred()
def eap_tls_invalid_record_fragment_length(df):
def eap_tls_invalid_record_fragment_length_cb():
@@ -242,7 +242,7 @@
return df
@deferred(TLS_TIMEOUT)
- def test_eap_tls_aaa_app_deactivate(self):
+ def test_eap_tls_with_aaa_app_deactivation(self):
df = defer.Deferred()
def eap_tls_aaa_app_deactivate(df):
def tls_aaa_app_deactivate_cb():
@@ -251,13 +251,14 @@
self.onos_ctrl.deactivate()
tls.runTest()
assert_equal(tls.failTest, True)
+ self.onos_ctrl.activate()
df.callback(0)
reactor.callLater(0, eap_tls_aaa_app_deactivate, df)
return df
#keeping cipher suite length as zero but including cipher suite key which is more than zero length in client hello packet
@deferred(TLS_TIMEOUT)
- def test_eap_tls_incorrect_cipher_suite_length_field(self):
+ def test_eap_tls_with_incorrect_cipher_suite_length_field(self):
df = defer.Deferred()
def eap_tls_incorrect_cipher_suite_length_field(df):
def tls_incorrect_cipher_suite_length_field_cb():
@@ -271,7 +272,7 @@
#keeping compression methods length to zero but sending compression method of more than 0 zero length in client hello packet
@deferred(TLS_TIMEOUT)
- def test_eap_tls_incorrect_compression_methods_length_field(self):
+ def test_eap_tls_with_incorrect_compression_methods_length_field(self):
df = defer.Deferred()
def eap_tls_incorrect_compression_methods_length_field(df):
def tls_incorrect_compression_methods_length_field_cb():
@@ -285,7 +286,7 @@
#checking with broadcast source mac of EAPOL packet
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_source_mac_broadcast(self):
+ def test_eap_tls_with_invalid_source_mac_broadcast(self):
df = defer.Deferred()
def eap_tls_invalid_source_mac_broadcast(df):
def tls_invalid_source_mac_broadcast_cb():
@@ -299,7 +300,7 @@
#checking with multicast source mac of EAPOL packet
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_source_mac_multicast(self):
+ def test_eap_tls_with_invalid_source_mac_multicast(self):
df = defer.Deferred()
def eap_tls_invalid_source_mac_multicast(df):
def tls_invalid_source_mac_multicast_cb():
@@ -313,7 +314,7 @@
#checking with zero source mac of EAPOL packet
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_source_mac_zero(self):
+ def test_eap_tls_with_invalid_source_mac_zero(self):
df = defer.Deferred()
def eap_tls_invalid_source_mac_zero(df):
def tls_invalid_source_mac_zero_cb():
@@ -327,7 +328,7 @@
#Restarting Radius server after sending client hello
@deferred(TLS_TIMEOUT)
- def test_eap_tls_restart_radius_server(self):
+ def test_eap_tls_with_restart_of_radius_server(self):
df = defer.Deferred()
def eap_tls_restart_radius_server(df):
def tls_restart_radius_server_cb():
@@ -382,7 +383,7 @@
#Sending client hello with zero lenght field in Handshake protocol
@deferred(TLS_TIMEOUT)
- def test_eap_tls_invalid_handshake_length_client_hello(self):
+ def test_eap_tls_with_invalid_handshake_length_client_hello(self):
df = defer.Deferred()
def eap_tls_invalid_handshake_length_client_hello(df):
def tls_invalid_handshake_length_client_hello_cb():
@@ -409,7 +410,7 @@
#simulating authentication for multiple users, 1K in this test case
@deferred(TEST_TIMEOUT)
- def test_eap_tls_1k_with_diff_mac(self):
+ def test_eap_tls_1k_sessions_with_diff_mac(self):
df = defer.Deferred()
def eap_tls_1k_with_diff_mac(df):
for i in xrange(1000):
@@ -421,8 +422,8 @@
return df
#simulating authentication for multiple users, 5K in this test case
- @deferred(TEST_TIMEOUT)
- def test_eap_tls_5k_with_diff_mac(self):
+ @deferred(TEST_TIMEOUT+1800)
+ def test_eap_tls_5k_sessions_with_diff_mac(self):
df = defer.Deferred()
def eap_tls_5k_with_diff_mac(df):
for i in xrange(5000):
diff --git a/src/test/utils/EapTLS.py b/src/test/utils/EapTLS.py
index c9cf599..58e9d8d 100644
--- a/src/test/utils/EapTLS.py
+++ b/src/test/utils/EapTLS.py
@@ -293,6 +293,7 @@
#if self.src_mac == 'mcast': self.setup(src_mac='mcast')
#if self.src_mac == 'zeros': self.setup(src_mac='zeros')
#if self.src_mac == 'default': self.setup(src_mac='default')
+ log.info('source mac is %s'%self.src_mac)
self.setup(src_mac=self.src_mac)
self.nextEvent = self.tlsEventTable.EVT_EAP_START
@@ -307,7 +308,11 @@
log.info('Got EAPOL packet with type id and code request')
log.info('Packet code: %d, type: %d, id: %d', pkt[EAP].code, pkt[EAP].type, pkt[EAP].id)
log.info("<====== Send EAP Response with identity = %s ================>" % USER)
- self.eapol_id_req(pkt[EAP].id, USER)
+ if self.id_mismatch_in_identifier_response_packet:
+ log.info('\nSending invalid id field in EAP Identity Response packet')
+ self.eapol_id_req(pkt[EAP].id+10, USER)
+ else:
+ self.eapol_id_req(pkt[EAP].id, USER)
r = self.eapol_scapy_recv(cb = eapol_cb,
lfilter =