test_ap_psk.py 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. # WPA2-Personal tests
  2. # Copyright (c) 2014, Qualcomm Atheros, Inc.
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import os
  9. import hostapd
  10. import hwsim_utils
  11. def test_ap_wpa2_psk(dev, apdev):
  12. """WPA2-PSK AP with PSK instead of passphrase"""
  13. ssid = "test-wpa2-psk"
  14. passphrase = 'qwertyuiop'
  15. psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
  16. params = hostapd.wpa2_params(ssid=ssid)
  17. params['wpa_psk'] = psk
  18. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  19. key_mgmt = hapd.get_config()['key_mgmt']
  20. if key_mgmt.split(' ')[0] != "WPA-PSK":
  21. raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
  22. dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
  23. dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
  24. def test_ap_wpa2_psk_file(dev, apdev):
  25. """WPA2-PSK AP with PSK from a file"""
  26. ssid = "test-wpa2-psk"
  27. passphrase = 'qwertyuiop'
  28. psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
  29. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  30. params['wpa_psk_file'] = 'hostapd.wpa_psk'
  31. hostapd.add_ap(apdev[0]['ifname'], params)
  32. dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
  33. dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
  34. dev[2].request("REMOVE_NETWORK all")
  35. dev[0].connect(ssid, psk="very secret", scan_freq="2412")
  36. dev[0].request("REMOVE_NETWORK all")
  37. dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
  38. dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
  39. ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
  40. if ev is None:
  41. raise Exception("Timed out while waiting for failure report")
  42. dev[1].request("REMOVE_NETWORK all")
  43. def test_ap_wpa2_ptk_rekey(dev, apdev):
  44. """WPA2-PSK AP and PTK rekey enforced by station"""
  45. ssid = "test-wpa2-psk"
  46. passphrase = 'qwertyuiop'
  47. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  48. hostapd.add_ap(apdev[0]['ifname'], params)
  49. dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
  50. ev = dev[0].wait_event(["WPA: Key negotiation completed"])
  51. if ev is None:
  52. raise Exception("PTK rekey timed out")
  53. hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
  54. def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
  55. """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
  56. ssid = "test-wpa2-psk"
  57. passphrase = 'qwertyuiop'
  58. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  59. params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
  60. hostapd.add_ap(apdev[0]['ifname'], params)
  61. dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
  62. wpa_ptk_rekey="1", scan_freq="2412")
  63. ev = dev[0].wait_event(["WPA: Key negotiation completed"])
  64. if ev is None:
  65. raise Exception("PTK rekey timed out")
  66. hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
  67. def test_ap_wpa_ptk_rekey(dev, apdev):
  68. """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
  69. ssid = "test-wpa-psk"
  70. passphrase = 'qwertyuiop'
  71. params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
  72. hostapd.add_ap(apdev[0]['ifname'], params)
  73. dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
  74. ev = dev[0].wait_event(["WPA: Key negotiation completed"])
  75. if ev is None:
  76. raise Exception("PTK rekey timed out")
  77. hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
  78. def test_ap_wpa_ccmp(dev, apdev):
  79. """WPA-PSK/CCMP"""
  80. ssid = "test-wpa-psk"
  81. passphrase = 'qwertyuiop'
  82. params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
  83. params['wpa_pairwise'] = "CCMP"
  84. hostapd.add_ap(apdev[0]['ifname'], params)
  85. dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
  86. hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
  87. def test_ap_wpa2_psk_file(dev, apdev):
  88. """WPA2-PSK AP with various PSK file error and success cases"""
  89. addr0 = dev[0].p2p_dev_addr()
  90. addr1 = dev[1].p2p_dev_addr()
  91. addr2 = dev[2].p2p_dev_addr()
  92. ssid = "psk"
  93. pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
  94. try:
  95. os.remove(pskfile)
  96. except:
  97. pass
  98. params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
  99. "rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
  100. try:
  101. # missing PSK file
  102. hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
  103. if "FAIL" not in hapd.request("ENABLE"):
  104. raise Exception("Unexpected ENABLE success")
  105. hapd.request("DISABLE")
  106. # invalid MAC address
  107. with open(pskfile, "w") as f:
  108. f.write("\n")
  109. f.write("foo\n")
  110. if "FAIL" not in hapd.request("ENABLE"):
  111. raise Exception("Unexpected ENABLE success")
  112. hapd.request("DISABLE")
  113. # no PSK on line
  114. with open(pskfile, "w") as f:
  115. f.write("00:11:22:33:44:55\n")
  116. if "FAIL" not in hapd.request("ENABLE"):
  117. raise Exception("Unexpected ENABLE success")
  118. hapd.request("DISABLE")
  119. # invalid PSK
  120. with open(pskfile, "w") as f:
  121. f.write("00:11:22:33:44:55 1234567\n")
  122. if "FAIL" not in hapd.request("ENABLE"):
  123. raise Exception("Unexpected ENABLE success")
  124. hapd.request("DISABLE")
  125. # valid PSK file
  126. with open(pskfile, "w") as f:
  127. f.write("00:11:22:33:44:55 12345678\n")
  128. f.write(addr0 + " 123456789\n")
  129. f.write(addr1 + " 123456789a\n")
  130. f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
  131. if "FAIL" in hapd.request("ENABLE"):
  132. raise Exception("Unexpected ENABLE failure")
  133. dev[0].connect(ssid, psk="123456789", scan_freq="2412")
  134. dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
  135. dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")
  136. finally:
  137. try:
  138. os.remove(pskfile)
  139. except:
  140. pass