tests: Verify network information in SCAN_RESULTS
[mech_eap.git] / tests / hwsim / test_ap_psk.py
1 # WPA2-Personal tests
2 # Copyright (c) 2014, Qualcomm Atheros, Inc.
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import os
10
11 import hostapd
12 import hwsim_utils
13
14 def check_mib(dev, vals):
15     mib = dev.get_mib()
16     for v in vals:
17         if mib[v[0]] != v[1]:
18             raise Exception("Unexpected {} = {} (expected {})".format(v[0], mib[v[0]], v[1]))
19
20 def test_ap_wpa2_psk(dev, apdev):
21     """WPA2-PSK AP with PSK instead of passphrase"""
22     ssid = "test-wpa2-psk"
23     passphrase = 'qwertyuiop'
24     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
25     params = hostapd.wpa2_params(ssid=ssid)
26     params['wpa_psk'] = psk
27     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
28     key_mgmt = hapd.get_config()['key_mgmt']
29     if key_mgmt.split(' ')[0] != "WPA-PSK":
30         raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
31     dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
32     dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
33
34     sig = dev[0].request("SIGNAL_POLL").splitlines()
35     pkt = dev[0].request("PKTCNT_POLL").splitlines()
36     if "FREQUENCY=2412" not in sig:
37         raise Exception("Unexpected SIGNAL_POLL value: " + str(sig))
38     if "TXBAD=0" not in pkt:
39         raise Exception("Unexpected TXBAD value: " + str(pkt))
40
41 def test_ap_wpa2_psk_file(dev, apdev):
42     """WPA2-PSK AP with PSK from a file"""
43     ssid = "test-wpa2-psk"
44     passphrase = 'qwertyuiop'
45     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
46     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
47     params['wpa_psk_file'] = 'hostapd.wpa_psk'
48     hostapd.add_ap(apdev[0]['ifname'], params)
49     dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
50     dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
51     dev[2].request("REMOVE_NETWORK all")
52     dev[0].connect(ssid, psk="very secret", scan_freq="2412")
53     dev[0].request("REMOVE_NETWORK all")
54     dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
55     dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
56     ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
57     if ev is None:
58         raise Exception("Timed out while waiting for failure report")
59     dev[1].request("REMOVE_NETWORK all")
60
61 def test_ap_wpa2_ptk_rekey(dev, apdev):
62     """WPA2-PSK AP and PTK rekey enforced by station"""
63     ssid = "test-wpa2-psk"
64     passphrase = 'qwertyuiop'
65     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
66     hostapd.add_ap(apdev[0]['ifname'], params)
67     dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
68     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
69     if ev is None:
70         raise Exception("PTK rekey timed out")
71     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
72
73 def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
74     """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
75     ssid = "test-wpa2-psk"
76     passphrase = 'qwertyuiop'
77     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
78     params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
79     hostapd.add_ap(apdev[0]['ifname'], params)
80     dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
81                    wpa_ptk_rekey="1", scan_freq="2412")
82     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
83     if ev is None:
84         raise Exception("PTK rekey timed out")
85     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
86     check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
87                         ("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
88
89 def test_ap_wpa_ptk_rekey(dev, apdev):
90     """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
91     ssid = "test-wpa-psk"
92     passphrase = 'qwertyuiop'
93     params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
94     hostapd.add_ap(apdev[0]['ifname'], params)
95     dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
96     if "[WPA-PSK-TKIP]" not in dev[0].request("SCAN_RESULTS"):
97         raise Exception("Scan results missing WPA element info")
98     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
99     if ev is None:
100         raise Exception("PTK rekey timed out")
101     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
102
103 def test_ap_wpa_ccmp(dev, apdev):
104     """WPA-PSK/CCMP"""
105     ssid = "test-wpa-psk"
106     passphrase = 'qwertyuiop'
107     params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
108     params['wpa_pairwise'] = "CCMP"
109     hostapd.add_ap(apdev[0]['ifname'], params)
110     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
111     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
112     check_mib(dev[0], [ ("dot11RSNAConfigGroupCipherSize", "128"),
113                         ("dot11RSNAGroupCipherRequested", "00-50-f2-4"),
114                         ("dot11RSNAPairwiseCipherRequested", "00-50-f2-4"),
115                         ("dot11RSNAAuthenticationSuiteRequested", "00-50-f2-2"),
116                         ("dot11RSNAGroupCipherSelected", "00-50-f2-4"),
117                         ("dot11RSNAPairwiseCipherSelected", "00-50-f2-4"),
118                         ("dot11RSNAAuthenticationSuiteSelected", "00-50-f2-2"),
119                         ("dot1xSuppSuppControlledPortStatus", "Authorized") ])
120
121 def test_ap_wpa2_psk_file(dev, apdev):
122     """WPA2-PSK AP with various PSK file error and success cases"""
123     addr0 = dev[0].p2p_dev_addr()
124     addr1 = dev[1].p2p_dev_addr()
125     addr2 = dev[2].p2p_dev_addr()
126     ssid = "psk"
127     pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
128     try:
129         os.remove(pskfile)
130     except:
131         pass
132
133     params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
134                "rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
135
136     try:
137         # missing PSK file
138         hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
139         if "FAIL" not in hapd.request("ENABLE"):
140             raise Exception("Unexpected ENABLE success")
141         hapd.request("DISABLE")
142
143         # invalid MAC address
144         with open(pskfile, "w") as f:
145             f.write("\n")
146             f.write("foo\n")
147         if "FAIL" not in hapd.request("ENABLE"):
148             raise Exception("Unexpected ENABLE success")
149         hapd.request("DISABLE")
150
151         # no PSK on line
152         with open(pskfile, "w") as f:
153             f.write("00:11:22:33:44:55\n")
154         if "FAIL" not in hapd.request("ENABLE"):
155             raise Exception("Unexpected ENABLE success")
156         hapd.request("DISABLE")
157
158         # invalid PSK
159         with open(pskfile, "w") as f:
160             f.write("00:11:22:33:44:55 1234567\n")
161         if "FAIL" not in hapd.request("ENABLE"):
162             raise Exception("Unexpected ENABLE success")
163         hapd.request("DISABLE")
164
165         # valid PSK file
166         with open(pskfile, "w") as f:
167             f.write("00:11:22:33:44:55 12345678\n")
168             f.write(addr0 + " 123456789\n")
169             f.write(addr1 + " 123456789a\n")
170             f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
171         if "FAIL" in hapd.request("ENABLE"):
172             raise Exception("Unexpected ENABLE failure")
173
174         dev[0].connect(ssid, psk="123456789", scan_freq="2412")
175         dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
176         dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")
177
178     finally:
179         try:
180             os.remove(pskfile)
181         except:
182             pass
183
184 def test_ap_wpa2_psk_wildcard_ssid(dev, apdev):
185     """WPA2-PSK AP and wildcard SSID configuration"""
186     ssid = "test-wpa2-psk"
187     passphrase = 'qwertyuiop'
188     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
189     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
190     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
191     dev[0].connect("", bssid=apdev[0]['bssid'], psk=passphrase,
192                    scan_freq="2412")
193     dev[1].connect("", bssid=apdev[0]['bssid'], raw_psk=psk, scan_freq="2412")