From 8583d66478b57d30f0a50a449f2625ce6dce6149 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 18 May 2014 00:04:18 +0300 Subject: [PATCH] tests: EAP-AKA' and EAP-AKA both enabled (bidding mechanism) Signed-off-by: Jouni Malinen --- tests/hwsim/auth_serv/eap_user.conf | 1 + tests/hwsim/test_ap_eap.py | 9 +++++++++ 2 files changed, 10 insertions(+) diff --git a/tests/hwsim/auth_serv/eap_user.conf b/tests/hwsim/auth_serv/eap_user.conf index 2358a5902..2bbfae83d 100644 --- a/tests/hwsim/auth_serv/eap_user.conf +++ b/tests/hwsim/auth_serv/eap_user.conf @@ -32,6 +32,7 @@ radius_accept_attr=25:x:00112233445566778899aa "0232010000000000@ttls" TTLS,AKA "0232010000000000@peap" PEAP,AKA "0232010000000000@fast" FAST,AKA +"6555444333222111@both" AKA',AKA "0"* AKA "1"* SIM diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 43983bbb3..5b5cfd621 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -362,6 +362,15 @@ def test_ap_wpa2_eap_aka_prime(dev, apdev): hwsim_utils.test_connectivity(dev[0].ifname, apdev[0]['ifname']) eap_reauth(dev[0], "AKA'") + logger.info("EAP-AKA' bidding protection when EAP-AKA enabled as well") + dev[1].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="AKA' AKA", + identity="6555444333222111@both", + password="5122250214c33e723a5dd523fc145fc0:981d464c7c52eb6e5036234984ad0bcf:000000000123", + wait_connect=False, scan_freq="2412") + ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED"], timeout=15) + if ev is None: + raise Exception("Connection with the AP timed out") + logger.info("Negative test with incorrect key") dev[0].request("REMOVE_NETWORK all") eap_connect(dev[0], apdev[0], "AKA'", "6555444333222111",