tests: WPA (v1) with CCMP
[mech_eap.git] / tests / hwsim / test_ap_psk.py
1 # WPA2-Personal tests
2 # Copyright (c) 2014, Qualcomm Atheros, Inc.
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import os
10
11 import hostapd
12 import hwsim_utils
13
14 def test_ap_wpa2_psk(dev, apdev):
15     """WPA2-PSK AP with PSK instead of passphrase"""
16     ssid = "test-wpa2-psk"
17     passphrase = 'qwertyuiop'
18     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
19     params = hostapd.wpa2_params(ssid=ssid)
20     params['wpa_psk'] = psk
21     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
22     key_mgmt = hapd.get_config()['key_mgmt']
23     if key_mgmt.split(' ')[0] != "WPA-PSK":
24         raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
25     dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
26     dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
27
28 def test_ap_wpa2_psk_file(dev, apdev):
29     """WPA2-PSK AP with PSK from a file"""
30     ssid = "test-wpa2-psk"
31     passphrase = 'qwertyuiop'
32     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
33     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
34     params['wpa_psk_file'] = 'hostapd.wpa_psk'
35     hostapd.add_ap(apdev[0]['ifname'], params)
36     dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
37     dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
38     dev[2].request("REMOVE_NETWORK all")
39     dev[0].connect(ssid, psk="very secret", scan_freq="2412")
40     dev[0].request("REMOVE_NETWORK all")
41     dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
42     dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
43     ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
44     if ev is None:
45         raise Exception("Timed out while waiting for failure report")
46     dev[1].request("REMOVE_NETWORK all")
47
48 def test_ap_wpa2_ptk_rekey(dev, apdev):
49     """WPA2-PSK AP and PTK rekey enforced by station"""
50     ssid = "test-wpa2-psk"
51     passphrase = 'qwertyuiop'
52     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
53     hostapd.add_ap(apdev[0]['ifname'], params)
54     dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
55     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
56     if ev is None:
57         raise Exception("PTK rekey timed out")
58     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
59
60 def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
61     """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
62     ssid = "test-wpa2-psk"
63     passphrase = 'qwertyuiop'
64     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
65     params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
66     hostapd.add_ap(apdev[0]['ifname'], params)
67     dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
68                    wpa_ptk_rekey="1", scan_freq="2412")
69     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
70     if ev is None:
71         raise Exception("PTK rekey timed out")
72     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
73
74 def test_ap_wpa_ptk_rekey(dev, apdev):
75     """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
76     ssid = "test-wpa-psk"
77     passphrase = 'qwertyuiop'
78     params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
79     hostapd.add_ap(apdev[0]['ifname'], params)
80     dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
81     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
82     if ev is None:
83         raise Exception("PTK rekey timed out")
84     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
85
86 def test_ap_wpa_ccmp(dev, apdev):
87     """WPA-PSK/CCMP"""
88     ssid = "test-wpa-psk"
89     passphrase = 'qwertyuiop'
90     params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
91     params['wpa_pairwise'] = "CCMP"
92     hostapd.add_ap(apdev[0]['ifname'], params)
93     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
94     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
95
96 def test_ap_wpa2_psk_file(dev, apdev):
97     """WPA2-PSK AP with various PSK file error and success cases"""
98     addr0 = dev[0].p2p_dev_addr()
99     addr1 = dev[1].p2p_dev_addr()
100     addr2 = dev[2].p2p_dev_addr()
101     ssid = "psk"
102     pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
103     try:
104         os.remove(pskfile)
105     except:
106         pass
107
108     params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
109                "rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
110
111     try:
112         # missing PSK file
113         hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
114         if "FAIL" not in hapd.request("ENABLE"):
115             raise Exception("Unexpected ENABLE success")
116         hapd.request("DISABLE")
117
118         # invalid MAC address
119         with open(pskfile, "w") as f:
120             f.write("\n")
121             f.write("foo\n")
122         if "FAIL" not in hapd.request("ENABLE"):
123             raise Exception("Unexpected ENABLE success")
124         hapd.request("DISABLE")
125
126         # no PSK on line
127         with open(pskfile, "w") as f:
128             f.write("00:11:22:33:44:55\n")
129         if "FAIL" not in hapd.request("ENABLE"):
130             raise Exception("Unexpected ENABLE success")
131         hapd.request("DISABLE")
132
133         # invalid PSK
134         with open(pskfile, "w") as f:
135             f.write("00:11:22:33:44:55 1234567\n")
136         if "FAIL" not in hapd.request("ENABLE"):
137             raise Exception("Unexpected ENABLE success")
138         hapd.request("DISABLE")
139
140         # valid PSK file
141         with open(pskfile, "w") as f:
142             f.write("00:11:22:33:44:55 12345678\n")
143             f.write(addr0 + " 123456789\n")
144             f.write(addr1 + " 123456789a\n")
145             f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
146         if "FAIL" in hapd.request("ENABLE"):
147             raise Exception("Unexpected ENABLE failure")
148
149         dev[0].connect(ssid, psk="123456789", scan_freq="2412")
150         dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
151         dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")
152
153     finally:
154         try:
155             os.remove(pskfile)
156         except:
157             pass