]> git.ipfire.org Git - thirdparty/hostap.git/blob - tests/hwsim/test_ap_psk.py
tests: PTK rekey enforced by AP
[thirdparty/hostap.git] / tests / hwsim / test_ap_psk.py
1 # WPA2-Personal tests
2 # Copyright (c) 2014, Qualcomm Atheros, Inc.
3 #
4 # This software may be distributed under the terms of the BSD license.
5 # See README for more details.
6
7 import logging
8 logger = logging.getLogger()
9 import os
10
11 import hostapd
12 import hwsim_utils
13
14 def check_mib(dev, vals):
15 mib = dev.get_mib()
16 for v in vals:
17 if mib[v[0]] != v[1]:
18 raise Exception("Unexpected {} = {} (expected {})".format(v[0], mib[v[0]], v[1]))
19
20 def test_ap_wpa2_psk(dev, apdev):
21 """WPA2-PSK AP with PSK instead of passphrase"""
22 ssid = "test-wpa2-psk"
23 passphrase = 'qwertyuiop'
24 psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
25 params = hostapd.wpa2_params(ssid=ssid)
26 params['wpa_psk'] = psk
27 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
28 key_mgmt = hapd.get_config()['key_mgmt']
29 if key_mgmt.split(' ')[0] != "WPA-PSK":
30 raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
31 dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
32 dev[1].connect(ssid, psk=passphrase, scan_freq="2412")
33
34 sig = dev[0].request("SIGNAL_POLL").splitlines()
35 pkt = dev[0].request("PKTCNT_POLL").splitlines()
36 if "FREQUENCY=2412" not in sig:
37 raise Exception("Unexpected SIGNAL_POLL value: " + str(sig))
38 if "TXBAD=0" not in pkt:
39 raise Exception("Unexpected TXBAD value: " + str(pkt))
40
41 def test_ap_wpa2_psk_file(dev, apdev):
42 """WPA2-PSK AP with PSK from a file"""
43 ssid = "test-wpa2-psk"
44 passphrase = 'qwertyuiop'
45 psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
46 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
47 params['wpa_psk_file'] = 'hostapd.wpa_psk'
48 hostapd.add_ap(apdev[0]['ifname'], params)
49 dev[1].connect(ssid, psk="very secret", scan_freq="2412", wait_connect=False)
50 dev[2].connect(ssid, raw_psk=psk, scan_freq="2412")
51 dev[2].request("REMOVE_NETWORK all")
52 dev[0].connect(ssid, psk="very secret", scan_freq="2412")
53 dev[0].request("REMOVE_NETWORK all")
54 dev[2].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
55 dev[0].connect(ssid, psk="another passphrase for all STAs", scan_freq="2412")
56 ev = dev[1].wait_event(["WPA: 4-Way Handshake failed"], timeout=10)
57 if ev is None:
58 raise Exception("Timed out while waiting for failure report")
59 dev[1].request("REMOVE_NETWORK all")
60
61 def test_ap_wpa2_ptk_rekey(dev, apdev):
62 """WPA2-PSK AP and PTK rekey enforced by station"""
63 ssid = "test-wpa2-psk"
64 passphrase = 'qwertyuiop'
65 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
66 hostapd.add_ap(apdev[0]['ifname'], params)
67 dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
68 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
69 if ev is None:
70 raise Exception("PTK rekey timed out")
71 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
72
73 def test_ap_wpa2_ptk_rekey_ap(dev, apdev):
74 """WPA2-PSK AP and PTK rekey enforced by AP"""
75 ssid = "test-wpa2-psk"
76 passphrase = 'qwertyuiop'
77 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
78 params['wpa_ptk_rekey'] = '2'
79 hostapd.add_ap(apdev[0]['ifname'], params)
80 dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
81 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
82 if ev is None:
83 raise Exception("PTK rekey timed out")
84 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
85
86 def test_ap_wpa2_sha256_ptk_rekey(dev, apdev):
87 """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by station"""
88 ssid = "test-wpa2-psk"
89 passphrase = 'qwertyuiop'
90 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
91 params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
92 hostapd.add_ap(apdev[0]['ifname'], params)
93 dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
94 wpa_ptk_rekey="1", scan_freq="2412")
95 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
96 if ev is None:
97 raise Exception("PTK rekey timed out")
98 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
99 check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
100 ("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
101
102 def test_ap_wpa2_sha256_ptk_rekey_ap(dev, apdev):
103 """WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by AP"""
104 ssid = "test-wpa2-psk"
105 passphrase = 'qwertyuiop'
106 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
107 params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
108 params['wpa_ptk_rekey'] = '2'
109 hostapd.add_ap(apdev[0]['ifname'], params)
110 dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK-SHA256",
111 scan_freq="2412")
112 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
113 if ev is None:
114 raise Exception("PTK rekey timed out")
115 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
116 check_mib(dev[0], [ ("dot11RSNAAuthenticationSuiteRequested", "00-0f-ac-6"),
117 ("dot11RSNAAuthenticationSuiteSelected", "00-0f-ac-6") ])
118
119 def test_ap_wpa_ptk_rekey(dev, apdev):
120 """WPA-PSK/TKIP AP and PTK rekey enforced by station"""
121 ssid = "test-wpa-psk"
122 passphrase = 'qwertyuiop'
123 params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
124 hostapd.add_ap(apdev[0]['ifname'], params)
125 dev[0].connect(ssid, psk=passphrase, wpa_ptk_rekey="1", scan_freq="2412")
126 if "[WPA-PSK-TKIP]" not in dev[0].request("SCAN_RESULTS"):
127 raise Exception("Scan results missing WPA element info")
128 ev = dev[0].wait_event(["WPA: Key negotiation completed"])
129 if ev is None:
130 raise Exception("PTK rekey timed out")
131 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
132
133 def test_ap_wpa_ptk_rekey_ap(dev, apdev):
134 """WPA-PSK/TKIP AP and PTK rekey enforced by AP"""
135 ssid = "test-wpa-psk"
136 passphrase = 'qwertyuiop'
137 params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
138 params['wpa_ptk_rekey'] = '2'
139 hostapd.add_ap(apdev[0]['ifname'], params)
140 dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
141 ev = dev[0].wait_event(["WPA: Key negotiation completed"], timeout=10)
142 if ev is None:
143 raise Exception("PTK rekey timed out")
144 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
145
146 def test_ap_wpa_ccmp(dev, apdev):
147 """WPA-PSK/CCMP"""
148 ssid = "test-wpa-psk"
149 passphrase = 'qwertyuiop'
150 params = hostapd.wpa_params(ssid=ssid, passphrase=passphrase)
151 params['wpa_pairwise'] = "CCMP"
152 hostapd.add_ap(apdev[0]['ifname'], params)
153 dev[0].connect(ssid, psk=passphrase, scan_freq="2412")
154 hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname'])
155 check_mib(dev[0], [ ("dot11RSNAConfigGroupCipherSize", "128"),
156 ("dot11RSNAGroupCipherRequested", "00-50-f2-4"),
157 ("dot11RSNAPairwiseCipherRequested", "00-50-f2-4"),
158 ("dot11RSNAAuthenticationSuiteRequested", "00-50-f2-2"),
159 ("dot11RSNAGroupCipherSelected", "00-50-f2-4"),
160 ("dot11RSNAPairwiseCipherSelected", "00-50-f2-4"),
161 ("dot11RSNAAuthenticationSuiteSelected", "00-50-f2-2"),
162 ("dot1xSuppSuppControlledPortStatus", "Authorized") ])
163
164 def test_ap_wpa2_psk_file(dev, apdev):
165 """WPA2-PSK AP with various PSK file error and success cases"""
166 addr0 = dev[0].p2p_dev_addr()
167 addr1 = dev[1].p2p_dev_addr()
168 addr2 = dev[2].p2p_dev_addr()
169 ssid = "psk"
170 pskfile = "/tmp/ap_wpa2_psk_file_errors.psk_file"
171 try:
172 os.remove(pskfile)
173 except:
174 pass
175
176 params = { "ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK",
177 "rsn_pairwise": "CCMP", "wpa_psk_file": pskfile }
178
179 try:
180 # missing PSK file
181 hapd = hostapd.add_ap(apdev[0]['ifname'], params, no_enable=True)
182 if "FAIL" not in hapd.request("ENABLE"):
183 raise Exception("Unexpected ENABLE success")
184 hapd.request("DISABLE")
185
186 # invalid MAC address
187 with open(pskfile, "w") as f:
188 f.write("\n")
189 f.write("foo\n")
190 if "FAIL" not in hapd.request("ENABLE"):
191 raise Exception("Unexpected ENABLE success")
192 hapd.request("DISABLE")
193
194 # no PSK on line
195 with open(pskfile, "w") as f:
196 f.write("00:11:22:33:44:55\n")
197 if "FAIL" not in hapd.request("ENABLE"):
198 raise Exception("Unexpected ENABLE success")
199 hapd.request("DISABLE")
200
201 # invalid PSK
202 with open(pskfile, "w") as f:
203 f.write("00:11:22:33:44:55 1234567\n")
204 if "FAIL" not in hapd.request("ENABLE"):
205 raise Exception("Unexpected ENABLE success")
206 hapd.request("DISABLE")
207
208 # valid PSK file
209 with open(pskfile, "w") as f:
210 f.write("00:11:22:33:44:55 12345678\n")
211 f.write(addr0 + " 123456789\n")
212 f.write(addr1 + " 123456789a\n")
213 f.write(addr2 + " 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef\n")
214 if "FAIL" in hapd.request("ENABLE"):
215 raise Exception("Unexpected ENABLE failure")
216
217 dev[0].connect(ssid, psk="123456789", scan_freq="2412")
218 dev[1].connect(ssid, psk="123456789a", scan_freq="2412")
219 dev[2].connect(ssid, raw_psk="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", scan_freq="2412")
220
221 finally:
222 try:
223 os.remove(pskfile)
224 except:
225 pass
226
227 def test_ap_wpa2_psk_wildcard_ssid(dev, apdev):
228 """WPA2-PSK AP and wildcard SSID configuration"""
229 ssid = "test-wpa2-psk"
230 passphrase = 'qwertyuiop'
231 psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
232 params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
233 hapd = hostapd.add_ap(apdev[0]['ifname'], params)
234 dev[0].connect("", bssid=apdev[0]['bssid'], psk=passphrase,
235 scan_freq="2412")
236 dev[1].connect("", bssid=apdev[0]['bssid'], raw_psk=psk, scan_freq="2412")