Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(319)

Side by Side Diff: server/site_tests/network_WiFiSecMat/021CheckWPA_BadPassphraseLength

Issue 6484016: Add test for SSID that is too long (Closed) Base URL: http://git.chromium.org/git/autotest.git@master
Patch Set: Created 9 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 1 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 # This test tries invalid WPA and RSN passprhase lengths. 5 # This test tries invalid WPA and RSN passprhase lengths.
6 { "name":"RSNWPABadKeyLength", 6 { "name":"RSNWPABadKeyLength",
7 "steps":[ # Channel [any] 7 "steps":[ # Channel [any]
8 # Test passphrase that is too small by one 8 # Test passphrase that is too small by one
9 [ "!connect", { "security":"rsn", "psk":"0123456", "hidden":True }, 9 [ "!connect", { "security":"rsn", "psk":"0123456", "hidden":True },
10 "org.chromium.flimflam.Error.InvalidArguments" ], 10 "org.chromium.flimflam.Error.InvalidPassphrase" ],
11 [ "!connect", { "security":"wpa", "psk":"0123456", "hidden":True }, 11 [ "!connect", { "security":"wpa", "psk":"0123456", "hidden":True },
12 "org.chromium.flimflam.Error.InvalidArguments" ], 12 "org.chromium.flimflam.Error.InvalidPassphrase" ],
13 # Test a textual passphrase that is too large by one 13 # Test a textual passphrase that is too large by one
14 [ "!connect", { "security":"rsn", "hidden":True, 14 [ "!connect", { "security":"rsn", "hidden":True,
15 "psk":"x123456789" 15 "psk":"x123456789"
16 "0123456789" 16 "0123456789"
17 "0123456789" 17 "0123456789"
18 "0123456789" 18 "0123456789"
19 "0123456789" 19 "0123456789"
20 "0123456789" 20 "0123456789"
21 "0123" }, 21 "0123" },
22 "org.chromium.flimflam.Error.InvalidArguments" ], 22 "org.chromium.flimflam.Error.InvalidPassphrase" ],
23 [ "!connect", { "security":"wpa", "hidden":True, 23 [ "!connect", { "security":"wpa", "hidden":True,
24 "psk":"x123456789" 24 "psk":"x123456789"
25 "0123456789" 25 "0123456789"
26 "0123456789" 26 "0123456789"
27 "0123456789" 27 "0123456789"
28 "0123456789" 28 "0123456789"
29 "0123456789" 29 "0123456789"
30 "0123" }, 30 "0123" },
31 "org.chromium.flimflam.Error.InvalidArguments" ], 31 "org.chromium.flimflam.Error.InvalidPassphrase" ],
32 # Test a hex-only passphrase that is too large by one 32 # Test a hex-only passphrase that is too large by one
33 [ "!connect", { "security":"rsn", "hidden":True, 33 [ "!connect", { "security":"rsn", "hidden":True,
34 "psk":"0123456789" 34 "psk":"0123456789"
35 "0123456789" 35 "0123456789"
36 "0123456789" 36 "0123456789"
37 "0123456789" 37 "0123456789"
38 "0123456789" 38 "0123456789"
39 "0123456789" 39 "0123456789"
40 "01234" }, 40 "01234" },
41 "org.chromium.flimflam.Error.InvalidArguments" ], 41 "org.chromium.flimflam.Error.InvalidPassphrase" ],
42 [ "!connect", { "security":"wpa", "hidden":True, 42 [ "!connect", { "security":"wpa", "hidden":True,
43 "psk":"0123456789" 43 "psk":"0123456789"
44 "0123456789" 44 "0123456789"
45 "0123456789" 45 "0123456789"
46 "0123456789" 46 "0123456789"
47 "0123456789" 47 "0123456789"
48 "0123456789" 48 "0123456789"
49 "01234" }, 49 "01234" },
50 "org.chromium.flimflam.Error.InvalidArguments" ], 50 "org.chromium.flimflam.Error.InvalidPassphrase" ],
51 ], 51 ],
52 } 52 }
OLDNEW
« no previous file with comments | « server/site_tests/network_WiFiMatFunc/090_SSID_Length_Limit ('k') | server/site_wlan_connect.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698