2017-03-11 23:48:19 +01:00
|
|
|
# Test cases for Opportunistic Wireless Encryption (OWE)
|
|
|
|
# Copyright (c) 2017, Jouni Malinen <j@w1.fi>
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
2017-10-08 11:29:02 +02:00
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
2017-10-09 12:37:56 +02:00
|
|
|
import time
|
2017-10-08 11:29:02 +02:00
|
|
|
|
2017-03-11 23:48:19 +01:00
|
|
|
import hostapd
|
2017-10-09 11:39:14 +02:00
|
|
|
from wpasupplicant import WpaSupplicant
|
2017-03-11 23:48:19 +01:00
|
|
|
import hwsim_utils
|
|
|
|
from utils import HwsimSkip
|
|
|
|
|
|
|
|
def test_owe(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption"""
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
params = { "ssid": "owe",
|
|
|
|
"wpa": "2",
|
2018-02-06 17:55:18 +01:00
|
|
|
"ieee80211w": "2",
|
2017-03-11 23:48:19 +01:00
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
bss = dev[0].get_bss(bssid)
|
|
|
|
if "[WPA2-OWE-CCMP]" not in bss['flags']:
|
|
|
|
raise Exception("OWE AKM not recognized: " + bss['flags'])
|
|
|
|
|
2018-02-06 17:55:18 +01:00
|
|
|
dev[0].connect("owe", key_mgmt="OWE", ieee80211w="2",
|
|
|
|
scan_freq="2412")
|
2017-03-11 23:48:19 +01:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2017-07-03 13:33:58 +02:00
|
|
|
val = dev[0].get_status_field("key_mgmt")
|
|
|
|
if val != "OWE":
|
|
|
|
raise Exception("Unexpected key_mgmt: " + val)
|
2017-03-11 23:48:19 +01:00
|
|
|
|
2017-10-08 15:38:44 +02:00
|
|
|
def test_owe_groups(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption - DH groups"""
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
params = { "ssid": "owe",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
for group in [ 19, 20, 21 ]:
|
|
|
|
dev[0].connect("owe", key_mgmt="OWE", owe_group=str(group))
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
2017-10-09 11:09:22 +02:00
|
|
|
def test_owe_pmksa_caching(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and PMKSA caching"""
|
2017-10-09 11:39:14 +02:00
|
|
|
run_owe_pmksa_caching(dev, apdev)
|
|
|
|
|
|
|
|
def test_owe_pmksa_caching_connect_cmd(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and PMKSA caching using cfg80211 connect command"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
run_owe_pmksa_caching([ wpas ], apdev)
|
|
|
|
|
|
|
|
def run_owe_pmksa_caching(dev, apdev):
|
2017-10-09 11:09:22 +02:00
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
params = { "ssid": "owe",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
id = dev[0].connect("owe", key_mgmt="OWE")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
pmksa = dev[0].get_pmksa(bssid)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
dev[0].select_network(id, 2412)
|
|
|
|
dev[0].wait_connected()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
pmksa2 = dev[0].get_pmksa(bssid)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
if "OK" not in hapd.request("PMKSA_FLUSH"):
|
|
|
|
raise Exception("PMKSA_FLUSH failed")
|
|
|
|
|
|
|
|
dev[0].select_network(id, 2412)
|
|
|
|
dev[0].wait_connected()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
pmksa3 = dev[0].get_pmksa(bssid)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
if pmksa is None or pmksa2 is None or pmksa3 is None:
|
|
|
|
raise Exception("PMKSA entry missing")
|
|
|
|
if pmksa['pmkid'] != pmksa2['pmkid']:
|
|
|
|
raise Exception("Unexpected PMKID change when using PMKSA caching")
|
|
|
|
if pmksa['pmkid'] == pmksa3['pmkid']:
|
|
|
|
raise Exception("PMKID did not change after PMKSA cache flush")
|
|
|
|
|
2017-03-11 23:48:19 +01:00
|
|
|
def test_owe_and_psk(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and WPA2-PSK enabled"""
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
params = { "ssid": "owe+psk",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE WPA-PSK",
|
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
|
"wpa_passphrase": "12345678" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].connect("owe+psk", psk="12345678")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
|
|
|
|
dev[1].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[1].connect("owe+psk", key_mgmt="OWE")
|
|
|
|
hwsim_utils.test_connectivity(dev[1], hapd)
|
2017-10-08 11:29:02 +02:00
|
|
|
|
|
|
|
def test_owe_transition_mode(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption transition mode"""
|
2017-10-09 11:39:14 +02:00
|
|
|
run_owe_transition_mode(dev, apdev)
|
|
|
|
|
|
|
|
def test_owe_transition_mode_connect_cmd(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption transition mode using cfg80211 connect command"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
run_owe_transition_mode([ wpas ], apdev)
|
|
|
|
|
|
|
|
def run_owe_transition_mode(dev, apdev):
|
2017-10-08 11:29:02 +02:00
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
2017-10-17 23:39:43 +02:00
|
|
|
dev[0].flush_scan_cache()
|
2017-10-08 11:29:02 +02:00
|
|
|
params = { "ssid": "owe-random",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP",
|
2018-01-13 02:57:40 +01:00
|
|
|
"ieee80211w": "2",
|
2017-10-08 11:29:02 +02:00
|
|
|
"owe_transition_bssid": apdev[1]['bssid'],
|
|
|
|
"owe_transition_ssid": '"owe-test"',
|
|
|
|
"ignore_broadcast_ssid": "1" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
params = { "ssid": "owe-test",
|
|
|
|
"owe_transition_bssid": apdev[0]['bssid'],
|
|
|
|
"owe_transition_ssid": '"owe-random"' }
|
|
|
|
hapd2 = hostapd.add_ap(apdev[1], params)
|
|
|
|
bssid2 = hapd2.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
|
|
|
|
|
|
|
bss = dev[0].get_bss(bssid)
|
|
|
|
if "[WPA2-OWE-CCMP]" not in bss['flags']:
|
|
|
|
raise Exception("OWE AKM not recognized: " + bss['flags'])
|
|
|
|
if "[OWE-TRANS]" not in bss['flags']:
|
|
|
|
raise Exception("OWE transition not recognized: " + bss['flags'])
|
|
|
|
|
|
|
|
bss = dev[0].get_bss(bssid2)
|
|
|
|
if "[OWE-TRANS-OPEN]" not in bss['flags']:
|
|
|
|
raise Exception("OWE transition (open) not recognized: " + bss['flags'])
|
|
|
|
|
2018-01-13 02:57:40 +01:00
|
|
|
id = dev[0].connect("owe-test", key_mgmt="OWE", ieee80211w="2",
|
|
|
|
scan_freq="2412")
|
2017-10-08 11:29:02 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
val = dev[0].get_status_field("key_mgmt")
|
|
|
|
if val != "OWE":
|
|
|
|
raise Exception("Unexpected key_mgmt: " + val)
|
|
|
|
|
|
|
|
logger.info("Move to OWE only mode (disable transition mode)")
|
|
|
|
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
hapd2.disable()
|
|
|
|
hapd.disable()
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
hapd.set("owe_transition_bssid", "00:00:00:00:00:00")
|
|
|
|
hapd.set("ignore_broadcast_ssid", '0')
|
|
|
|
hapd.set("ssid", 'owe-test')
|
|
|
|
hapd.enable()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].select_network(id, 2412)
|
|
|
|
dev[0].wait_connected()
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2017-10-09 12:37:56 +02:00
|
|
|
|
2018-01-13 02:57:40 +01:00
|
|
|
def test_owe_transition_mode_open_only_ap(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption transition mode connect to open-only AP"""
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = { "ssid": "owe-test-open" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
|
|
|
|
bss = dev[0].get_bss(bssid)
|
|
|
|
|
|
|
|
id = dev[0].connect("owe-test-open", key_mgmt="OWE", ieee80211w="2",
|
|
|
|
scan_freq="2412")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
val = dev[0].get_status_field("key_mgmt")
|
|
|
|
if val != "NONE":
|
|
|
|
raise Exception("Unexpected key_mgmt: " + val)
|
|
|
|
|
2017-10-09 12:37:56 +02:00
|
|
|
def test_owe_transition_mode_multi_bss(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption transition mode (multi BSS)"""
|
|
|
|
try:
|
|
|
|
run_owe_transition_mode_multi_bss(dev, apdev)
|
|
|
|
finally:
|
|
|
|
dev[0].request("SCAN_INTERVAL 5")
|
|
|
|
|
|
|
|
def run_owe_transition_mode_multi_bss(dev, apdev):
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
ifname1 = apdev[0]['ifname']
|
|
|
|
ifname2 = apdev[0]['ifname'] + '-2'
|
|
|
|
hapd1 = hostapd.add_bss(apdev[0], ifname1, 'owe-bss-1.conf')
|
|
|
|
hapd2 = hostapd.add_bss(apdev[0], ifname2, 'owe-bss-2.conf')
|
2018-02-07 12:45:48 +01:00
|
|
|
hapd2.bssidx = 1
|
2017-10-09 12:37:56 +02:00
|
|
|
|
|
|
|
bssid = hapd1.own_addr()
|
|
|
|
bssid2 = hapd2.own_addr()
|
|
|
|
|
|
|
|
# Beaconing with the OWE Transition Mode element can start only once both
|
|
|
|
# BSSs are enabled, so the very first Beacon frame may go out without this
|
|
|
|
# element. Wait a bit to avoid getting incomplete scan results.
|
|
|
|
time.sleep(0.1)
|
|
|
|
|
|
|
|
dev[0].request("SCAN_INTERVAL 1")
|
|
|
|
dev[0].scan_for_bss(bssid2, freq="2412")
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].connect("transition-mode-open", key_mgmt="OWE")
|
2018-02-07 12:45:48 +01:00
|
|
|
val = dev[0].get_status_field("bssid")
|
|
|
|
if val != bssid2:
|
|
|
|
raise Exception("Unexpected bssid: " + val)
|
2017-10-09 12:37:56 +02:00
|
|
|
val = dev[0].get_status_field("key_mgmt")
|
|
|
|
if val != "OWE":
|
|
|
|
raise Exception("Unexpected key_mgmt: " + val)
|
2018-02-07 12:45:48 +01:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd2)
|
2017-10-10 17:27:58 +02:00
|
|
|
|
|
|
|
def test_owe_unsupported_group(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and unsupported group"""
|
|
|
|
try:
|
|
|
|
run_owe_unsupported_group(dev, apdev)
|
|
|
|
finally:
|
|
|
|
dev[0].request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
|
2017-12-11 13:01:45 +01:00
|
|
|
def test_owe_unsupported_group_connect_cmd(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and unsupported group using cfg80211 connect command"""
|
|
|
|
try:
|
|
|
|
wpas = None
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
run_owe_unsupported_group([ wpas ], apdev)
|
|
|
|
finally:
|
|
|
|
if wpas:
|
|
|
|
wpas.request("VENDOR_ELEM_REMOVE 13 *")
|
|
|
|
|
2017-10-10 17:27:58 +02:00
|
|
|
def run_owe_unsupported_group(dev, apdev):
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
# Override OWE Dh Parameters element with a payload that uses invalid group
|
|
|
|
# 0 (and actual group 19 data) to make the AP reject this with the specific
|
|
|
|
# status code 77.
|
|
|
|
dev[0].request("VENDOR_ELEM_ADD 13 ff23200000783590fb7440e03d5b3b33911f86affdcc6b4411b707846ac4ff08ddc8831ccd")
|
|
|
|
|
|
|
|
params = { "ssid": "owe",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].connect("owe", key_mgmt="OWE", wait_connect=False)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=10)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Association not rejected")
|
|
|
|
if "status_code=77" not in ev:
|
|
|
|
raise Exception("Unexpected rejection reason: " + ev)
|
2017-10-10 18:02:09 +02:00
|
|
|
|
|
|
|
def test_owe_limited_group_set(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and limited group set"""
|
|
|
|
if "OWE" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
params = { "ssid": "owe",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
|
"owe_groups": "20 21" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev[0].scan_for_bss(bssid, freq="2412")
|
|
|
|
dev[0].connect("owe", key_mgmt="OWE", owe_group="19", wait_connect=False)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=10)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Association not rejected")
|
|
|
|
if "status_code=77" not in ev:
|
|
|
|
raise Exception("Unexpected rejection reason: " + ev)
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
for group in [ 20, 21 ]:
|
|
|
|
dev[0].connect("owe", key_mgmt="OWE", owe_group=str(group))
|
|
|
|
dev[0].request("REMOVE_NETWORK all")
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
2017-12-27 20:07:05 +01:00
|
|
|
|
|
|
|
def test_owe_group_negotiation(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and group negotiation"""
|
|
|
|
run_owe_group_negotiation(dev[0], apdev)
|
|
|
|
|
|
|
|
def test_owe_group_negotiation_connect_cmd(dev, apdev):
|
|
|
|
"""Opportunistic Wireless Encryption and group negotiation (connect command)"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
run_owe_group_negotiation(wpas, apdev)
|
|
|
|
|
|
|
|
def run_owe_group_negotiation(dev, apdev):
|
|
|
|
if "OWE" not in dev.get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("OWE not supported")
|
|
|
|
params = { "ssid": "owe",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "OWE",
|
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
|
"owe_groups": "21" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
|
|
|
|
dev.scan_for_bss(bssid, freq="2412")
|
|
|
|
dev.connect("owe", key_mgmt="OWE")
|