Browse Source

tests: EAP-AKA' and EAP-AKA both enabled (bidding mechanism)

Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen 11 years ago
parent
commit
8583d66478
2 changed files with 10 additions and 0 deletions
  1. 1 0
      tests/hwsim/auth_serv/eap_user.conf
  2. 9 0
      tests/hwsim/test_ap_eap.py

+ 1 - 0
tests/hwsim/auth_serv/eap_user.conf

@@ -32,6 +32,7 @@ radius_accept_attr=25:x:00112233445566778899aa
 "0232010000000000@ttls"	TTLS,AKA
 "0232010000000000@peap"	PEAP,AKA
 "0232010000000000@fast"	FAST,AKA
+"6555444333222111@both" AKA',AKA
 
 "0"*		AKA
 "1"*		SIM

+ 9 - 0
tests/hwsim/test_ap_eap.py

@@ -362,6 +362,15 @@ def test_ap_wpa2_eap_aka_prime(dev, apdev):
     hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
     eap_reauth(dev[0], "AKA'")
 
+    logger.info("EAP-AKA' bidding protection when EAP-AKA enabled as well")
+    dev[1].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="AKA' AKA",
+                   identity="6555444333222111@both",
+                   password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123",
+                   wait_connect=False, scan_freq="2412")
+    ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15)
+    if ev is None:
+        raise Exception("Connection with the AP timed out")
+
     logger.info("Negative test with incorrect key")
     dev[0].request("REMOVE_NETWORK all")
     eap_connect(dev[0], apdev[0], "AKA'", "6555444333222111",