mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
99 lines
3.5 KiB
Python
99 lines
3.5 KiB
Python
|
#!/usr/bin/python
|
||
|
#
|
||
|
# Python class for controlling wlantest
|
||
|
# Copyright (c) 2013, Jouni Malinen <j@w1.fi>
|
||
|
#
|
||
|
# This software may be distributed under the terms of the BSD license.
|
||
|
# See README for more details.
|
||
|
|
||
|
import os
|
||
|
import time
|
||
|
import subprocess
|
||
|
import logging
|
||
|
import wpaspy
|
||
|
|
||
|
logger = logging.getLogger(__name__)
|
||
|
wlantest_cli = '../../wlantest/wlantest_cli'
|
||
|
|
||
|
class Wlantest:
|
||
|
def flush(self):
|
||
|
res = subprocess.check_output([wlantest_cli, "flush"])
|
||
|
if "FAIL" in res:
|
||
|
raise Exception("wlantest_cli flush failed")
|
||
|
|
||
|
def add_passphrase(self, passphrase):
|
||
|
res = subprocess.check_output([wlantest_cli, "add_passphrase",
|
||
|
passphrase])
|
||
|
if "FAIL" in res:
|
||
|
raise Exception("wlantest_cli add_passphrase failed")
|
||
|
|
||
|
def add_wepkey(self, key):
|
||
|
res = subprocess.check_output([wlantest_cli, "add_wepkey", key])
|
||
|
if "FAIL" in res:
|
||
|
raise Exception("wlantest_cli add_key failed")
|
||
|
|
||
|
def info_bss(self, field, bssid):
|
||
|
res = subprocess.check_output([wlantest_cli, "info_bss", field, bssid])
|
||
|
if "FAIL" in res:
|
||
|
raise Exception("Could not get BSS info from wlantest for " + bssid)
|
||
|
return res
|
||
|
|
||
|
def info_sta(self, field, bssid, addr):
|
||
|
res = subprocess.check_output([wlantest_cli, "info_sta", field, bssid,
|
||
|
addr])
|
||
|
if "FAIL" in res:
|
||
|
raise Exception("Could not get STA info from wlantest for " + addr)
|
||
|
return res
|
||
|
|
||
|
def tdls_clear(self, bssid, addr1, addr2):
|
||
|
subprocess.call([wlantest_cli, "clear_tdls_counters", bssid, addr1,
|
||
|
addr2]);
|
||
|
|
||
|
def get_tdls_counter(self, field, bssid, addr1, addr2):
|
||
|
res = subprocess.check_output([wlantest_cli, "get_tdls_counter", field,
|
||
|
bssid, addr1, addr2]);
|
||
|
if "FAIL" in res:
|
||
|
raise Exception("wlantest_cli command failed")
|
||
|
return int(res)
|
||
|
|
||
|
def require_ap_pmf_mandatory(self, bssid):
|
||
|
res = self.info_bss("rsn_capab", bssid)
|
||
|
if "MFPR" not in res:
|
||
|
raise Exception("AP did not require PMF")
|
||
|
if "MFPC" not in res:
|
||
|
raise Exception("AP did not enable PMF")
|
||
|
res = self.info_bss("key_mgmt", bssid)
|
||
|
if "PSK-SHA256" not in res:
|
||
|
raise Exception("AP did not enable SHA256-based AKM for PMF")
|
||
|
|
||
|
def require_ap_pmf_optional(self, bssid):
|
||
|
res = self.info_bss("rsn_capab", bssid)
|
||
|
if "MFPR" in res:
|
||
|
raise Exception("AP required PMF")
|
||
|
if "MFPC" not in res:
|
||
|
raise Exception("AP did not enable PMF")
|
||
|
|
||
|
def require_ap_no_pmf(self, bssid):
|
||
|
res = self.info_bss("rsn_capab", bssid)
|
||
|
if "MFPR" in res:
|
||
|
raise Exception("AP required PMF")
|
||
|
if "MFPC" in res:
|
||
|
raise Exception("AP enabled PMF")
|
||
|
|
||
|
def require_sta_pmf_mandatory(self, bssid, addr):
|
||
|
res = self.info_sta("rsn_capab", bssid, addr)
|
||
|
if "MFPR" not in res:
|
||
|
raise Exception("STA did not require PMF")
|
||
|
if "MFPC" not in res:
|
||
|
raise Exception("STA did not enable PMF")
|
||
|
|
||
|
def require_sta_pmf(self, bssid, addr):
|
||
|
res = self.info_sta("rsn_capab", bssid, addr)
|
||
|
if "MFPC" not in res:
|
||
|
raise Exception("STA did not enable PMF")
|
||
|
|
||
|
def require_sta_key_mgmt(self, bssid, addr, key_mgmt):
|
||
|
res = self.info_sta("key_mgmt", bssid, addr)
|
||
|
if key_mgmt not in res:
|
||
|
raise Exception("Unexpected STA key_mgmt")
|