2 # Copyright (c) 2014, Qualcomm Atheros, Inc.
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
8 logger = logging.getLogger()
14 def check_mib(dev, vals):
18 raise Exception("Unexpected {} = {} (expected {})".format(v[0], mib[v[0]], v[1]))
20 def test_ap_wpa2_psk(dev, apdev):
21 """WPA2-PSK AP with PSK instead of passphrase"""
22 ssid = "test-wpa2-psk"
23 passphrase = 'qwertyuiop'
24 psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
25 params = hostapd.wpa2_params(ssid=ssid)
26 params['wpa_psk'] = psk
27 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
28 key_mgmt = hapd.get_config()['key_mgmt']
29 if key_mgmt.split(' ')[0] != "WPA-PSK":
30 raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
31 dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
32 dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
34 def test_ap_wpa2_psk_file(dev, apdev):
35 """WPA2-PSK AP with PSK from a file"""
36 ssid = "test-wpa2-psk"
37 passphrase = 'qwertyuiop'
38 psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
39 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
40 params['wpa_psk_file'] = 'hostapd.wpa_psk'
41 hostapd.add_ap(apdev[0]['ifname'], params)
42 dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
43 dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
44 dev[2].request("REMOVE_NETWORK all")
45 dev[0].connect(ssid, psk="very secret", scan_freq="2412")
46 dev[0].request("REMOVE_NETWORK all")
47 dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
48 dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
49 ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
51 raise Exception("Timed out while waiting for failure report")
52 dev[1].request("REMOVE_NETWORK all")
54 def test_ap_wpa2_ptk_rekey(dev, apdev):
55 """WPA2-PSK AP and PTK rekey enforced by station"""
56 ssid = "test-wpa2-psk"
57 passphrase = 'qwertyuiop'
58 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
59 hostapd.add_ap(apdev[0]['ifname'], params)
60 dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
61 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
63 raise Exception("PTK rekey timed out")
64 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
66 def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
67 """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
68 ssid = "test-wpa2-psk"
69 passphrase = 'qwertyuiop'
70 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
71 params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
72 hostapd.add_ap(apdev[0]['ifname'], params)
73 dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
74 wpa_ptk_rekey="1", scan_freq="2412")
75 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
77 raise Exception("PTK rekey timed out")
78 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
79 check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
80 ("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
82 def test_ap_wpa_ptk_rekey(dev, apdev):
83 """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
85 passphrase = 'qwertyuiop'
86 params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
87 hostapd.add_ap(apdev[0]['ifname'], params)
88 dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
89 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
91 raise Exception("PTK rekey timed out")
92 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
94 def test_ap_wpa_ccmp(dev, apdev):
97 passphrase = 'qwertyuiop'
98 params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
99 params['wpa_pairwise'] = "CCMP"
100 hostapd.add_ap(apdev[0]['ifname'], params)
101 dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
102 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
103 check_mib(dev[0], [ ("dot11RSNAConfigGroupCipherSize", "128"),
104 ("dot11RSNAGroupCipherRequested", "00-50-f2-4"),
105 ("dot11RSNAPairwiseCipherRequested", "00-50-f2-4"),
106 ("dot11RSNAAuthenticationSuiteRequested", "00-50-f2-2"),
107 ("dot11RSNAGroupCipherSelected", "00-50-f2-4"),
108 ("dot11RSNAPairwiseCipherSelected", "00-50-f2-4"),
109 ("dot11RSNAAuthenticationSuiteSelected", "00-50-f2-2"),
110 ("dot1xSuppSuppControlledPortStatus", "Authorized") ])
112 def test_ap_wpa2_psk_file(dev, apdev):
113 """WPA2-PSK AP with various PSK file error and success cases"""
114 addr0 = dev[0].p2p_dev_addr()
115 addr1 = dev[1].p2p_dev_addr()
116 addr2 = dev[2].p2p_dev_addr()
118 pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
124 params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
125 "rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
129 hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
130 if "FAIL" not in hapd.request("ENABLE"):
131 raise Exception("Unexpected ENABLE success")
132 hapd.request("DISABLE")
134 # invalid MAC address
135 with open(pskfile, "w") as f:
138 if "FAIL" not in hapd.request("ENABLE"):
139 raise Exception("Unexpected ENABLE success")
140 hapd.request("DISABLE")
143 with open(pskfile, "w") as f:
144 f.write("00:11:22:33:44:55\n")
145 if "FAIL" not in hapd.request("ENABLE"):
146 raise Exception("Unexpected ENABLE success")
147 hapd.request("DISABLE")
150 with open(pskfile, "w") as f:
151 f.write("00:11:22:33:44:55 1234567\n")
152 if "FAIL" not in hapd.request("ENABLE"):
153 raise Exception("Unexpected ENABLE success")
154 hapd.request("DISABLE")
157 with open(pskfile, "w") as f:
158 f.write("00:11:22:33:44:55 12345678\n")
159 f.write(addr0 + " 123456789\n")
160 f.write(addr1 + " 123456789a\n")
161 f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
162 if "FAIL" in hapd.request("ENABLE"):
163 raise Exception("Unexpected ENABLE failure")
165 dev[0].connect(ssid, psk="123456789", scan_freq="2412")
166 dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
167 dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")