test_ap_psk.py 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. # WPA2-Personal tests
  2. # Copyright (c) 2014, Qualcomm Atheros, Inc.
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import hostapd
  9. import hwsim_utils
  10. def test_ap_wpa2_psk(dev, apdev):
  11. """WPA2-PSK AP with PSK instead of passphrase"""
  12. ssid = "test-wpa2-psk"
  13. passphrase = 'qwertyuiop'
  14. psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
  15. params = hostapd.wpa2_params(ssid=ssid)
  16. params['wpa_psk'] = psk
  17. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  18. key_mgmt = hapd.get_config()['key_mgmt']
  19. if key_mgmt.split(' ')[0] != "WPA-PSK":
  20. raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
  21. dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
  22. dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
  23. def test_ap_wpa2_psk_file(dev, apdev):
  24. """WPA2-PSK AP with PSK from a file"""
  25. ssid = "test-wpa2-psk"
  26. passphrase = 'qwertyuiop'
  27. psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
  28. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  29. params['wpa_psk_file'] = 'hostapd.wpa_psk'
  30. hostapd.add_ap(apdev[0]['ifname'], params)
  31. dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
  32. dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
  33. dev[2].request("REMOVE_NETWORK all")
  34. dev[0].connect(ssid, psk="very secret", scan_freq="2412")
  35. dev[0].request("REMOVE_NETWORK all")
  36. dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
  37. dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
  38. ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
  39. if ev is None:
  40. raise Exception("Timed out while waiting for failure report")
  41. dev[1].request("REMOVE_NETWORK all")
  42. def test_ap_wpa_ptk_rekey(dev, apdev):
  43. """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
  44. ssid = "test-wpa-psk"
  45. passphrase = 'qwertyuiop'
  46. params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
  47. hostapd.add_ap(apdev[0]['ifname'], params)
  48. dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
  49. ev = dev[0].wait_event(["WPA: Key negotiation completed"])
  50. if ev is None:
  51. raise Exception("PTK rekey timed out")
  52. hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])