]>
Commit | Line | Data |
---|---|---|
c89d9ebb JM |
1 | # WPA2-Personal tests |
2 | # Copyright (c) 2014, Qualcomm Atheros, Inc. | |
3 | # | |
4 | # This software may be distributed under the terms of the BSD license. | |
5 | # See README for more details. | |
6 | ||
7 | import logging | |
8 | logger = logging.getLogger() | |
9 | ||
10 | import hostapd | |
fb5c8cea | 11 | import hwsim_utils |
c89d9ebb JM |
12 | |
13 | def test_ap_wpa2_psk(dev, apdev): | |
14 | """WPA2-PSK AP with PSK instead of passphrase""" | |
15 | ssid = "test-wpa2-psk" | |
16 | passphrase = 'qwertyuiop' | |
17 | psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6' | |
18 | params = hostapd.wpa2_params(ssid=ssid) | |
19 | params['wpa_psk'] = psk | |
20 | hostapd.add_ap(apdev[0]['ifname'], params) | |
21 | dev[0].connect(ssid, raw_psk=psk, scan_freq="2412") | |
22 | dev[1].connect(ssid, psk=passphrase, scan_freq="2412") | |
23 | ||
24 | def test_ap_wpa2_psk_file(dev, apdev): | |
25 | """WPA2-PSK AP with PSK from a file""" | |
26 | ssid = "test-wpa2-psk" | |
27 | passphrase = 'qwertyuiop' | |
28 | psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6' | |
29 | params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase) | |
30 | params['wpa_psk_file'] = 'hostapd.wpa_psk' | |
31 | hostapd.add_ap(apdev[0]['ifname'], params) | |
32 | dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False) | |
33 | dev[2].connect(ssid, raw_psk=psk, scan_freq="2412") | |
34 | dev[2].request("REMOVE_NETWORK all") | |
35 | dev[0].connect(ssid, psk="very secret", scan_freq="2412") | |
36 | dev[0].request("REMOVE_NETWORK all") | |
37 | dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412") | |
38 | dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412") | |
39 | ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10) | |
40 | if ev is None: | |
41 | raise Exception("Timed out while waiting for failure report") | |
42 | dev[1].request("REMOVE_NETWORK all") | |
fb5c8cea JM |
43 | |
44 | def test_ap_wpa_ptk_rekey(dev, apdev): | |
45 | """WPA-PSK/TKIP AP and PTK rekey enforced by station""" | |
46 | ssid = "test-wpa-psk" | |
47 | passphrase = 'qwertyuiop' | |
48 | params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase) | |
49 | hostapd.add_ap(apdev[0]['ifname'], params) | |
50 | dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412") | |
51 | ev = dev[0].wait_event(["WPA: Key negotiation completed"]) | |
52 | if ev is None: | |
53 | raise Exception("PTK rekey timed out") | |
54 | hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) |