tests: wpa_supplicant MIB command output for WPA/WPA2 information
[mech_eap.git] / tests / hwsim / test_ap_psk.py
1 # WPA2-Personal tests
2 # Copyright (c) 2014, Qualcomm Atheros, Inc.
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import os
10
11 import hostapd
12 import hwsim_utils
13
14 def check_mib(dev, vals):
15     mib = dev.get_mib()
16     for v in vals:
17         if mib[v[0]] != v[1]:
18             raise Exception("Unexpected {} = {} (expected {})".format(v[0], mib[v[0]], v[1]))
19
20 def test_ap_wpa2_psk(dev, apdev):
21     """WPA2-PSK AP with PSK instead of passphrase"""
22     ssid = "test-wpa2-psk"
23     passphrase = 'qwertyuiop'
24     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
25     params = hostapd.wpa2_params(ssid=ssid)
26     params['wpa_psk'] = psk
27     hapd = hostapd.add_ap(apdev[0]['ifname'], params)
28     key_mgmt = hapd.get_config()['key_mgmt']
29     if key_mgmt.split(' ')[0] != "WPA-PSK":
30         raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
31     dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
32     dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
33
34 def test_ap_wpa2_psk_file(dev, apdev):
35     """WPA2-PSK AP with PSK from a file"""
36     ssid = "test-wpa2-psk"
37     passphrase = 'qwertyuiop'
38     psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
39     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
40     params['wpa_psk_file'] = 'hostapd.wpa_psk'
41     hostapd.add_ap(apdev[0]['ifname'], params)
42     dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
43     dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
44     dev[2].request("REMOVE_NETWORK all")
45     dev[0].connect(ssid, psk="very secret", scan_freq="2412")
46     dev[0].request("REMOVE_NETWORK all")
47     dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
48     dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
49     ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
50     if ev is None:
51         raise Exception("Timed out while waiting for failure report")
52     dev[1].request("REMOVE_NETWORK all")
53
54 def test_ap_wpa2_ptk_rekey(dev, apdev):
55     """WPA2-PSK AP and PTK rekey enforced by station"""
56     ssid = "test-wpa2-psk"
57     passphrase = 'qwertyuiop'
58     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
59     hostapd.add_ap(apdev[0]['ifname'], params)
60     dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
61     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
62     if ev is None:
63         raise Exception("PTK rekey timed out")
64     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
65
66 def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
67     """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
68     ssid = "test-wpa2-psk"
69     passphrase = 'qwertyuiop'
70     params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
71     params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
72     hostapd.add_ap(apdev[0]['ifname'], params)
73     dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
74                    wpa_ptk_rekey="1", scan_freq="2412")
75     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
76     if ev is None:
77         raise Exception("PTK rekey timed out")
78     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
79     check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
80                         ("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
81
82 def test_ap_wpa_ptk_rekey(dev, apdev):
83     """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
84     ssid = "test-wpa-psk"
85     passphrase = 'qwertyuiop'
86     params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
87     hostapd.add_ap(apdev[0]['ifname'], params)
88     dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
89     ev = dev[0].wait_event(["WPA: Key negotiation completed"])
90     if ev is None:
91         raise Exception("PTK rekey timed out")
92     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
93
94 def test_ap_wpa_ccmp(dev, apdev):
95     """WPA-PSK/CCMP"""
96     ssid = "test-wpa-psk"
97     passphrase = 'qwertyuiop'
98     params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
99     params['wpa_pairwise'] = "CCMP"
100     hostapd.add_ap(apdev[0]['ifname'], params)
101     dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
102     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
103     check_mib(dev[0], [ ("dot11RSNAConfigGroupCipherSize", "128"),
104                         ("dot11RSNAGroupCipherRequested", "00-50-f2-4"),
105                         ("dot11RSNAPairwiseCipherRequested", "00-50-f2-4"),
106                         ("dot11RSNAAuthenticationSuiteRequested", "00-50-f2-2"),
107                         ("dot11RSNAGroupCipherSelected", "00-50-f2-4"),
108                         ("dot11RSNAPairwiseCipherSelected", "00-50-f2-4"),
109                         ("dot11RSNAAuthenticationSuiteSelected", "00-50-f2-2"),
110                         ("dot1xSuppSuppControlledPortStatus", "Authorized") ])
111
112 def test_ap_wpa2_psk_file(dev, apdev):
113     """WPA2-PSK AP with various PSK file error and success cases"""
114     addr0 = dev[0].p2p_dev_addr()
115     addr1 = dev[1].p2p_dev_addr()
116     addr2 = dev[2].p2p_dev_addr()
117     ssid = "psk"
118     pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
119     try:
120         os.remove(pskfile)
121     except:
122         pass
123
124     params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
125                "rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
126
127     try:
128         # missing PSK file
129         hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
130         if "FAIL" not in hapd.request("ENABLE"):
131             raise Exception("Unexpected ENABLE success")
132         hapd.request("DISABLE")
133
134         # invalid MAC address
135         with open(pskfile, "w") as f:
136             f.write("\n")
137             f.write("foo\n")
138         if "FAIL" not in hapd.request("ENABLE"):
139             raise Exception("Unexpected ENABLE success")
140         hapd.request("DISABLE")
141
142         # no PSK on line
143         with open(pskfile, "w") as f:
144             f.write("00:11:22:33:44:55\n")
145         if "FAIL" not in hapd.request("ENABLE"):
146             raise Exception("Unexpected ENABLE success")
147         hapd.request("DISABLE")
148
149         # invalid PSK
150         with open(pskfile, "w") as f:
151             f.write("00:11:22:33:44:55 1234567\n")
152         if "FAIL" not in hapd.request("ENABLE"):
153             raise Exception("Unexpected ENABLE success")
154         hapd.request("DISABLE")
155
156         # valid PSK file
157         with open(pskfile, "w") as f:
158             f.write("00:11:22:33:44:55 12345678\n")
159             f.write(addr0 + " 123456789\n")
160             f.write(addr1 + " 123456789a\n")
161             f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
162         if "FAIL" in hapd.request("ENABLE"):
163             raise Exception("Unexpected ENABLE failure")
164
165         dev[0].connect(ssid, psk="123456789", scan_freq="2412")
166         dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
167         dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")
168
169     finally:
170         try:
171             os.remove(pskfile)
172         except:
173             pass