From: Jouni Malinen Date: Thu, 20 Mar 2014 21:47:58 +0000 (+0200) Subject: tests: EAP-SIM/AKA with protected result indication X-Git-Tag: hostap_2_2~514 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=910f16ca0ecc1893fb13662303c1ba55b70ee636;p=thirdparty%2Fhostap.git tests: EAP-SIM/AKA with protected result indication Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 414c4ec2f..87c4e108a 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -1125,3 +1125,40 @@ def test_ap_wpa2_eap_request_identity_message(dev, apdev): hostapd.add_ap(apdev[0]['ifname'], params) eap_connect(dev[0], apdev[0], "PAX", "pax.user@example.com", password_hex="0123456789abcdef0123456789abcdef") + +def test_ap_wpa2_eap_sim_aka_result_ind(dev, apdev): + """WPA2-Enterprise using EAP-SIM/AKA and protected result indication""" + if not os.path.exists("/tmp/hlr_auc_gw.sock"): + logger.info("No hlr_auc_gw available"); + return "skip" + params = int_eap_server_params() + params['eap_sim_db'] = "unix:/tmp/hlr_auc_gw.sock" + params['eap_sim_aka_result_ind'] = "1" + hostapd.add_ap(apdev[0]['ifname'], params) + + eap_connect(dev[0], apdev[0], "SIM", "1232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581", + phase1="result_ind=1") + eap_reauth(dev[0], "SIM") + eap_connect(dev[1], apdev[0], "SIM", "1232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") + + dev[0].request("REMOVE_NETWORK all") + dev[1].request("REMOVE_NETWORK all") + + eap_connect(dev[0], apdev[0], "AKA", "0232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123", + phase1="result_ind=1") + eap_reauth(dev[0], "AKA") + eap_connect(dev[1], apdev[0], "AKA", "0232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123") + + dev[0].request("REMOVE_NETWORK all") + dev[1].request("REMOVE_NETWORK all") + + eap_connect(dev[0], apdev[0], "AKA'", "6555444333222111", + password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123", + phase1="result_ind=1") + eap_reauth(dev[0], "AKA'") + eap_connect(dev[1], apdev[0], "AKA'", "6555444333222111", + password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123")