From 9626962d2f0cf2c8f1ae7349ae269f9cd30610fc Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 29 Sep 2013 20:35:26 +0300 Subject: [PATCH] tests: Add test cases for WPA2-Enterprise Signed-hostap: Jouni Malinen --- tests/hwsim/hostapd.py | 17 +++++ tests/hwsim/test_ap_eap.py | 143 +++++++++++++++++++++++++++++++++++ tests/hwsim/wpasupplicant.py | 27 ++++++- 3 files changed, 185 insertions(+), 2 deletions(-) create mode 100644 tests/hwsim/test_ap_eap.py diff --git a/tests/hwsim/hostapd.py b/tests/hwsim/hostapd.py index 464f026d9..50b6644c0 100644 --- a/tests/hwsim/hostapd.py +++ b/tests/hwsim/hostapd.py @@ -148,3 +148,20 @@ def wpa_mixed_params(ssid=None, passphrase=None): if passphrase: params["wpa_passphrase"] = passphrase return params + +def radius_params(): + params = { "auth_server_addr": "127.0.0.1", + "auth_server_port": "1812", + "auth_server_shared_secret": "radius", + "nas_identifier": "nas.w1.fi" } + return params + +def wpa2_eap_params(ssid=None): + params = radius_params() + params["wpa"] = "2" + params["wpa_key_mgmt"] = "WPA-EAP" + params["rsn_pairwise"] = "CCMP" + params["ieee8021x"] = "1" + if ssid: + params["ssid"] = ssid + return params diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py new file mode 100644 index 000000000..9ed227d06 --- /dev/null +++ b/tests/hwsim/test_ap_eap.py @@ -0,0 +1,143 @@ +#!/usr/bin/python +# +# WPA2-Enterprise tests +# Copyright (c) 2013, Jouni Malinen +# +# This software may be distributed under the terms of the BSD license. +# See README for more details. + +import time +import subprocess +import logging +logger = logging.getLogger(__name__) + +import hwsim_utils +import hostapd + +def eap_connect(dev, method, identity, anonymous_identity=None, password=None, + phase1=None, phase2=None, ca_cert=None): + dev.connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap=method, + identity=identity, anonymous_identity=anonymous_identity, + password=password, phase1=phase1, phase2=phase2, + ca_cert=ca_cert, + wait_connect=False) + ev = dev.wait_event(["CTRL-EVENT-EAP-STARTED"], timeout=10) + if ev is None: + raise Exception("Association and EAP start timed out") + ev = dev.wait_event(["CTRL-EVENT-EAP-METHOD"], timeout=10) + if ev is None: + raise Exception("EAP method selection timed out") + if method not in ev: + raise Exception("Unexpected EAP method") + ev = dev.wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10) + if ev is None: + raise Exception("EAP success timed out") + ev = dev.wait_event(["CTRL-EVENT-CONNECTED"], timeout=10) + if ev is None: + raise Exception("Association with the AP timed out") + + status = dev.get_status() + if status["wpa_state"] != "COMPLETED": + raise Exception("Connection not completed") + if status["suppPortStatus"] != "Authorized": + raise Exception("Port not authorized") + if method not in status["selectedMethod"]: + raise Exception("Incorrect EAP method status") + if status["key_mgmt"] != "WPA2/IEEE 802.1X/EAP": + raise Exception("Unexpected key_mgmt status") + +def test_ap_wpa2_eap_sim(dev, apdev): + """WPA2-Enterprise connection using EAP-SIM""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "SIM", "1232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_aka(dev, apdev): + """WPA2-Enterprise connection using EAP-AKA""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "AKA", "0232010000000000", + password="90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:000000000123") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_aka_prime(dev, apdev): + """WPA2-Enterprise connection using EAP-AKA'""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "AKA'", "6555444333222111", + password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_pap(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/PAP""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "pap user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="auth=PAP") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_chap(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/CHAP""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "chap user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="auth=CHAP") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_mschap(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/MSCHAP""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "mschap user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAP") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_mschapv2(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/MSCHAPv2""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "DOMAIN\mschapv2 user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_eap_gtc(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/EAP-GTC""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="autheap=GTC") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_eap_md5(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/EAP-MD5""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="autheap=MD5") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_ttls_eap_mschapv2(dev, apdev): + """WPA2-Enterprise connection using EAP-TTLS/EAP-MSCHAPv2""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "TTLS", "user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="autheap=MSCHAPV2") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) + +def test_ap_wpa2_eap_peap_eap_mschapv2(dev, apdev): + """WPA2-Enterprise connection using EAP-PEAP/EAP-MSCHAPv2""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], "PEAP", "user", + anonymous_identity="ttls", password="password", + ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2") + hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) diff --git a/tests/hwsim/wpasupplicant.py b/tests/hwsim/wpasupplicant.py index 55b0de4af..cdc97b478 100644 --- a/tests/hwsim/wpasupplicant.py +++ b/tests/hwsim/wpasupplicant.py @@ -452,7 +452,11 @@ class WpaSupplicant: raise Exception("Failed to request TDLS teardown") return None - def connect(self, ssid, psk=None, proto=None, key_mgmt=None, wep_key0=None, ieee80211w=None, pairwise=None, group=None, scan_freq=None): + def connect(self, ssid, psk=None, proto=None, key_mgmt=None, wep_key0=None, + ieee80211w=None, pairwise=None, group=None, scan_freq=None, + eap=None, identity=None, anonymous_identity=None, + password=None, phase1=None, phase2=None, ca_cert=None, + wait_connect=True): logger.info("Connect STA " + self.ifname + " to AP") id = self.add_network() self.set_network_quoted(id, "ssid", ssid) @@ -472,7 +476,26 @@ class WpaSupplicant: self.set_network(id, "wep_key0", wep_key0) if scan_freq: self.set_network(id, "scan_freq", scan_freq) - self.connect_network(id) + if eap: + self.set_network(id, "eap", eap) + if identity: + self.set_network_quoted(id, "identity", identity) + if anonymous_identity: + self.set_network_quoted(id, "anonymous_identity", + anonymous_identity) + if password: + self.set_network_quoted(id, "password", password) + if ca_cert: + self.set_network_quoted(id, "ca_cert", ca_cert) + if phase1: + self.set_network_quoted(id, "phase1", phase1) + if phase2: + self.set_network_quoted(id, "phase2", phase2) + if wait_connect: + self.connect_network(id) + else: + self.dump_monitor() + self.select_network(id) def scan(self, type=None): if type: