From 910f16ca0ecc1893fb13662303c1ba55b70ee636 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Thu, 20 Mar 2014 23:47:58 +0200 Subject: [PATCH] tests: EAP-SIM/AKA with protected result indication Signed-off-by: Jouni Malinen --- tests/hwsim/test_ap_eap.py | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 414c4ec2f..87c4e108a 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -1125,3 +1125,40 @@ def test_ap_wpa2_eap_request_identity_message(dev, apdev): hostapd.add_ap(apdev[0]['ifname'], params) eap_connect(dev[0], apdev[0], "PAX", "pax.user@example.com", password_hex="0123456789abcdef0123456789abcdef") + +def test_ap_wpa2_eap_sim_aka_result_ind(dev, apdev): + """WPA2-Enterprise using EAP-SIM/AKA and protected result indication""" + if not os.path.exists("/tmp/hlr_auc_gw.sock"): + logger.info("No hlr_auc_gw available"); + return "skip" + params = int_eap_server_params() + params['eap_sim_db'] = "unix:/tmp/hlr_auc_gw.sock" + params['eap_sim_aka_result_ind'] = "1" + hostapd.add_ap(apdev[0]['ifname'], params) + + eap_connect(dev[0], apdev[0], "SIM", "1232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581", + phase1="result_ind=1") + eap_reauth(dev[0], "SIM") + eap_connect(dev[1], apdev[0], "SIM", "1232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") + + dev[0].request("REMOVE_NETWORK all") + dev[1].request("REMOVE_NETWORK all") + + eap_connect(dev[0], apdev[0], "AKA", "0232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123", + phase1="result_ind=1") + eap_reauth(dev[0], "AKA") + eap_connect(dev[1], apdev[0], "AKA", "0232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123") + + dev[0].request("REMOVE_NETWORK all") + dev[1].request("REMOVE_NETWORK all") + + eap_connect(dev[0], apdev[0], "AKA'", "6555444333222111", + password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123", + phase1="result_ind=1") + eap_reauth(dev[0], "AKA'") + eap_connect(dev[1], apdev[0], "AKA'", "6555444333222111", + password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123") -- 2.39.2