tests: PSK/EAP without nl80211 control port
Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
c52129bed8
commit
09f96acb9d
2 changed files with 41 additions and 0 deletions
|
@ -7250,3 +7250,20 @@ def test_ap_wpa2_eap_tls_tod_tofu(dev, apdev):
|
||||||
raise Exception("TOD-TOFU policy not reported for server certificate")
|
raise Exception("TOD-TOFU policy not reported for server certificate")
|
||||||
if tod1:
|
if tod1:
|
||||||
raise Exception("TOD-TOFU policy unexpectedly reported for CA certificate")
|
raise Exception("TOD-TOFU policy unexpectedly reported for CA certificate")
|
||||||
|
|
||||||
|
def test_ap_wpa2_eap_sake_no_control_port(dev, apdev):
|
||||||
|
"""WPA2-Enterprise connection using EAP-SAKE without nl80211 control port"""
|
||||||
|
params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
|
||||||
|
params['driver_params'] = "control_port=0"
|
||||||
|
hapd = hostapd.add_ap(apdev[0], params)
|
||||||
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
||||||
|
wpas.interface_add("wlan5", drv_params="control_port=0")
|
||||||
|
eap_connect(wpas, hapd, "SAKE", "sake user",
|
||||||
|
password_hex="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef")
|
||||||
|
eap_reauth(wpas, "SAKE")
|
||||||
|
|
||||||
|
logger.info("Negative test with incorrect password")
|
||||||
|
wpas.request("REMOVE_NETWORK all")
|
||||||
|
eap_connect(wpas, hapd, "SAKE", "sake user",
|
||||||
|
password_hex="ff23456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef",
|
||||||
|
expect_failure=True)
|
||||||
|
|
|
@ -3282,3 +3282,27 @@ def test_ap_wpa2_psk_inject_assoc(dev, apdev, params):
|
||||||
wait=False)
|
wait=False)
|
||||||
if len(res) > 0:
|
if len(res) > 0:
|
||||||
raise Exception("Unexpected frame from unauthorized STA seen")
|
raise Exception("Unexpected frame from unauthorized STA seen")
|
||||||
|
|
||||||
|
def test_ap_wpa2_psk_no_control_port(dev, apdev):
|
||||||
|
"""WPA2-PSK AP without nl80211 control port"""
|
||||||
|
ssid = "test-wpa2-psk"
|
||||||
|
passphrase = 'qwertyuiop'
|
||||||
|
params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
|
||||||
|
params['driver_params'] = "control_port=0"
|
||||||
|
hapd = hostapd.add_ap(apdev[0], params)
|
||||||
|
|
||||||
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
||||||
|
wpas.interface_add("wlan5", drv_params="control_port=0")
|
||||||
|
wpas.connect(ssid, psk=passphrase, scan_freq="2412")
|
||||||
|
hapd.wait_sta()
|
||||||
|
hwsim_utils.test_connectivity(wpas, hapd)
|
||||||
|
if "OK" not in wpas.request("KEY_REQUEST 0 1"):
|
||||||
|
raise Exception("KEY_REQUEST failed")
|
||||||
|
ev = wpas.wait_event(["WPA: Key negotiation completed"])
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("PTK rekey timed out")
|
||||||
|
hapd.wait_ptkinitdone(wpas.own_addr())
|
||||||
|
hwsim_utils.test_connectivity(wpas, hapd)
|
||||||
|
wpas.request("DISCONNECT")
|
||||||
|
wpas.wait_disconnected()
|
||||||
|
wpas.dump_monitor()
|
||||||
|
|
Loading…
Reference in a new issue