diff --git a/tests/hwsim/test_ap_ft.py b/tests/hwsim/test_ap_ft.py index f364b209b..298fd8228 100644 --- a/tests/hwsim/test_ap_ft.py +++ b/tests/hwsim/test_ap_ft.py @@ -1,5 +1,5 @@ # Fast BSS Transition tests -# Copyright (c) 2013-2015, Jouni Malinen +# Copyright (c) 2013-2017, Jouni Malinen # # This software may be distributed under the terms of the BSD license. # See README for more details. @@ -10,10 +10,11 @@ import os import time import logging logger = logging.getLogger() +import struct import hwsim_utils import hostapd -from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger, skip_with_fips +from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger, skip_with_fips, parse_ie from wlantest import Wlantest from test_ap_psk import check_mib, find_wpas_process, read_process_memory, verify_not_present, get_key_locations @@ -1689,3 +1690,111 @@ def test_ap_ft_ric(dev, apdev): dev[0].request("REMOVE_NETWORK all") dev[0].wait_disconnected() dev[0].dump_monitor() + +def ie_hex(ies, id): + return binascii.hexlify(struct.pack('BB', id, len(ies[id])) + ies[id]) + +def test_ap_ft_reassoc_proto(dev, apdev): + """WPA2-PSK-FT AP Reassociation Request frame parsing""" + ssid = "test-ft" + passphrase="12345678" + + params = ft_params1(ssid=ssid, passphrase=passphrase) + hapd0 = hostapd.add_ap(apdev[0], params) + params = ft_params2(ssid=ssid, passphrase=passphrase) + hapd1 = hostapd.add_ap(apdev[1], params) + + dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", + ieee80211w="1", scan_freq="2412") + if dev[0].get_status_field('bssid') == hapd0.own_addr(): + hapd1ap = hapd0 + hapd2ap = hapd1 + else: + hapd1ap = hapd1 + hapd2ap = hapd0 + + dev[0].scan_for_bss(hapd2ap.own_addr(), freq="2412") + hapd2ap.set("ext_mgmt_frame_handling", "1") + dev[0].request("ROAM " + hapd2ap.own_addr()) + + while True: + req = hapd2ap.mgmt_rx() + hapd2ap.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(req['frame'])) + if req['subtype'] == 11: + break + + while True: + req = hapd2ap.mgmt_rx() + if req['subtype'] == 2: + break + hapd2ap.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(req['frame'])) + + # IEEE 802.11 header + fixed fields before IEs + hdr = binascii.hexlify(req['frame'][0:34]) + ies = parse_ie(binascii.hexlify(req['frame'][34:])) + # First elements: SSID, Supported Rates, Extended Supported Rates + ies1 = ie_hex(ies, 0) + ie_hex(ies, 1) + ie_hex(ies, 50) + + rsne = ie_hex(ies, 48) + mde = ie_hex(ies, 54) + fte = ie_hex(ies, 55) + tests = [ ] + # RSN: Trying to use FT, but MDIE not included + tests += [ rsne ] + # RSN: Attempted to use unknown MDIE + tests += [ rsne + "3603000000" ] + # Invalid RSN pairwise cipher + tests += [ "30260100000fac040100000fac030100000fac040000010029208a42cd25c85aa571567dce10dae3" ] + # FT: No PMKID in RSNIE + tests += [ "30160100000fac040100000fac040100000fac0400000000" + ie_hex(ies, 54) ] + # FT: Invalid FTIE + tests += [ rsne + mde ] + # FT: RIC IE(s) in the frame, but not included in protected IE count + # FT: Failed to parse FT IEs + tests += [ rsne + mde + fte + "3900" ] + # FT: SNonce mismatch in FTIE + tests += [ rsne + mde + "37520000" + 16*"00" + 32*"00" + 32*"00" ] + # FT: ANonce mismatch in FTIE + tests += [ rsne + mde + fte[0:40] + 32*"00" + fte[104:] ] + # FT: No R0KH-ID subelem in FTIE + tests += [ rsne + mde + "3752" + fte[4:168] ] + # FT: R0KH-ID in FTIE did not match with the current R0KH-ID + tests += [ rsne + mde + "3755" + fte[4:168] + "0301ff" ] + # FT: No R1KH-ID subelem in FTIE + tests += [ rsne + mde + "375e" + fte[4:168] + "030a" + "nas1.w1.fi".encode("hex") ] + # FT: Unknown R1KH-ID used in ReassocReq + tests += [ rsne + mde + "3766" + fte[4:168] + "030a" + "nas1.w1.fi".encode("hex") + "0106000000000000" ] + # FT: PMKID in Reassoc Req did not match with the PMKR1Name derived from auth request + tests += [ rsne[:-32] + 16*"00" + mde + fte ] + # Invalid MIC in FTIE + tests += [ rsne + mde + fte[0:8] + 16*"00" + fte[40:] ] + for t in tests: + hapd2ap.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + hdr + ies1 + t) + +def test_ap_ft_reassoc_local_fail(dev, apdev): + """WPA2-PSK-FT AP Reassociation Request frame and local failure""" + ssid = "test-ft" + passphrase="12345678" + + params = ft_params1(ssid=ssid, passphrase=passphrase) + hapd0 = hostapd.add_ap(apdev[0], params) + params = ft_params2(ssid=ssid, passphrase=passphrase) + hapd1 = hostapd.add_ap(apdev[1], params) + + dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2", + ieee80211w="1", scan_freq="2412") + if dev[0].get_status_field('bssid') == hapd0.own_addr(): + hapd1ap = hapd0 + hapd2ap = hapd1 + else: + hapd1ap = hapd1 + hapd2ap = hapd0 + + dev[0].scan_for_bss(hapd2ap.own_addr(), freq="2412") + # FT: Failed to calculate MIC + with fail_test(hapd2ap, 1, "wpa_ft_validate_reassoc"): + dev[0].request("ROAM " + hapd2ap.own_addr()) + ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=10) + dev[0].request("DISCONNECT") + if ev is None: + raise Exception("Association reject not seen")