d9c566b1b8
As a preparation for changing wpa_supplicant and hostapd implementation to use SAE H2E only. Signed-off-by: Ilan Peer <ilan.peer@intel.com>
850 lines
28 KiB
Python
850 lines
28 KiB
Python
# Test cases for PASN
|
|
# Copyright (C) 2019 Intel Corporation
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
from remotehost import remote_compatible
|
|
import binascii
|
|
import os
|
|
import time
|
|
import logging
|
|
logger = logging.getLogger()
|
|
import socket
|
|
import struct
|
|
import subprocess
|
|
import re
|
|
|
|
import hwsim_utils
|
|
import hostapd
|
|
from wpasupplicant import WpaSupplicant
|
|
from utils import *
|
|
from hwsim import HWSimRadio
|
|
from test_erp import start_erp_as
|
|
from test_ap_ft import run_roams, ft_params1, ft_params2
|
|
|
|
def check_pasn_capab(dev):
|
|
if "PASN" not in dev.get_capability("auth_alg"):
|
|
raise HwsimSkip("PASN not supported")
|
|
|
|
def pasn_ap_params(akmp="PASN", cipher="CCMP", group="19"):
|
|
params = {"ssid": "test-wpa2-pasn",
|
|
"wpa_passphrase": "12345678",
|
|
"wpa": "2",
|
|
"ieee80211w": "2",
|
|
"wpa_key_mgmt": "WPA-PSK " + akmp,
|
|
"rsn_pairwise": cipher,
|
|
"pasn_groups" : group}
|
|
|
|
return params
|
|
|
|
def start_pasn_ap(apdev, params):
|
|
try:
|
|
return hostapd.add_ap(apdev, params)
|
|
except Exception as e:
|
|
if "Failed to set hostapd parameter wpa_key_mgmt" in str(e) or \
|
|
"Failed to set hostapd parameter force_kdk_derivation" in str(e):
|
|
raise HwsimSkip("PASN not supported")
|
|
raise
|
|
|
|
def check_pasn_ptk(dev, hapd, cipher, fail_ptk=False, clear_keys=True):
|
|
sta_ptksa = dev.get_ptksa(hapd.own_addr(), cipher)
|
|
ap_ptksa = hapd.get_ptksa(dev.own_addr(), cipher)
|
|
|
|
if not (sta_ptksa and ap_ptksa):
|
|
if fail_ptk:
|
|
return
|
|
raise Exception("Could not get PTKSA entry")
|
|
|
|
logger.info("sta: TK: %s KDK: %s" % (sta_ptksa['tk'], sta_ptksa['kdk']))
|
|
logger.info("ap : TK: %s KDK: %s" % (ap_ptksa['tk'], ap_ptksa['kdk']))
|
|
|
|
if sta_ptksa['tk'] != ap_ptksa['tk'] or sta_ptksa['kdk'] != ap_ptksa['kdk']:
|
|
raise Exception("TK/KDK mismatch")
|
|
elif fail_ptk:
|
|
raise Exception("TK/KDK match although key derivation should have failed")
|
|
elif clear_keys:
|
|
cmd = "PASN_DEAUTH bssid=%s" % hapd.own_addr()
|
|
dev.request(cmd)
|
|
|
|
# Wait a little to let the AP process the deauth
|
|
time.sleep(0.2)
|
|
|
|
sta_ptksa = dev.get_ptksa(hapd.own_addr(), cipher)
|
|
ap_ptksa = hapd.get_ptksa(dev.own_addr(), cipher)
|
|
if sta_ptksa or ap_ptksa:
|
|
raise Exception("TK/KDK not deleted as expected")
|
|
|
|
def check_pasn_akmp_cipher(dev, hapd, akmp="PASN", cipher="CCMP",
|
|
group="19", status=0, fail=0, nid="",
|
|
fail_ptk=False):
|
|
dev.flush_scan_cache()
|
|
dev.scan(type="ONLY", freq=2412)
|
|
|
|
cmd = "PASN_START bssid=%s akmp=%s cipher=%s group=%s" % (hapd.own_addr(), akmp, cipher, group)
|
|
|
|
if nid != "":
|
|
cmd += " nid=%s" % nid
|
|
|
|
resp = dev.request(cmd)
|
|
|
|
if fail:
|
|
if "OK" in resp:
|
|
raise Exception("Unexpected success to start PASN authentication")
|
|
return
|
|
|
|
if "OK" not in resp:
|
|
raise Exception("Failed to start PASN authentication")
|
|
|
|
ev = dev.wait_event(["PASN-AUTH-STATUS"], 3)
|
|
if not ev:
|
|
raise Exception("PASN: PASN-AUTH-STATUS not seen")
|
|
|
|
if hapd.own_addr() + " akmp=" + akmp + ", status=" + str(status) not in ev:
|
|
raise Exception("PASN: unexpected status")
|
|
|
|
if status:
|
|
return
|
|
|
|
check_pasn_ptk(dev, hapd, cipher, fail_ptk)
|
|
|
|
@remote_compatible
|
|
def test_pasn_ccmp(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP", "19")
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_gcmp(dev, apdev):
|
|
"""PASN authentication with WPA2/GCMP AP"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "GCMP", "19")
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "GCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_ccmp_256(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP256 AP"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP-256", "19")
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP-256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_gcmp_256(dev, apdev):
|
|
"""PASN authentication with WPA2/GCMP-256 AP"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "GCMP-256", "19")
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "GCMP-256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_group_mismatch(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP with group mismatch"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP", "20")
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP", status=77)
|
|
|
|
@remote_compatible
|
|
def test_pasn_channel_mismatch(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP with channel mismatch"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP")
|
|
params['channel'] = "6"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP", fail=1)
|
|
|
|
@remote_compatible
|
|
def test_pasn_while_connected_same_channel(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP while connected same channel"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
ssid = "test-wpa2-psk"
|
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
|
params = hostapd.wpa2_params(ssid=ssid)
|
|
params['wpa_psk'] = psk
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
dev[0].connect(ssid, raw_psk=psk, scan_freq="2412")
|
|
|
|
params = pasn_ap_params("PASN", "CCMP")
|
|
hapd = start_pasn_ap(apdev[1], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_while_connected_same_ap(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP while connected to it"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk",
|
|
passphrase="12345678")
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
dev[0].connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP", fail=1)
|
|
|
|
@remote_compatible
|
|
def test_pasn_while_connected_diff_channel(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP while connected diff channel"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
with HWSimRadio(n_channels=2) as (radio, iface):
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add(iface)
|
|
|
|
if wpas.get_mcc() < 2:
|
|
raise HwsimSkip("PASN: New radio does not support MCC")
|
|
|
|
params = hostapd.wpa2_params(ssid="test-wpa2-psk",
|
|
passphrase="12345678")
|
|
params['channel'] = "6"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2437")
|
|
|
|
params = pasn_ap_params("PASN", "CCMP")
|
|
hapd2 = start_pasn_ap(apdev[1], params)
|
|
|
|
check_pasn_akmp_cipher(wpas, hapd2, "PASN", "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_sae_pmksa_cache(dev, apdev):
|
|
"""PASN authentication with SAE AP with PMKSA caching"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
params = hostapd.wpa2_params(ssid="test-sae",
|
|
passphrase="12345678")
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['sae_pwe'] = "2"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
try:
|
|
dev[0].set("sae_groups", "19")
|
|
dev[0].set("sae_pwe", "2")
|
|
dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412")
|
|
|
|
hapd.wait_sta()
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].wait_disconnected()
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP")
|
|
finally:
|
|
dev[0].set("sae_pwe", "0")
|
|
|
|
def check_pasn_fils_pmksa_cache(dev, apdev, params, key_mgmt):
|
|
check_fils_capa(dev[0])
|
|
check_erp_capa(dev[0])
|
|
check_pasn_capab(dev[0])
|
|
|
|
start_erp_as(msk_dump=os.path.join(params['logdir'], "msk.lst"))
|
|
|
|
bssid = apdev[0]['bssid']
|
|
params = hostapd.wpa2_eap_params(ssid="fils")
|
|
params['wpa_key_mgmt'] = key_mgmt + " PASN"
|
|
params['auth_server_port'] = "18128"
|
|
params['erp_domain'] = 'example.com'
|
|
params['fils_realm'] = 'example.com'
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
dev[0].scan_for_bss(bssid, freq=2412)
|
|
dev[0].request("ERP_FLUSH")
|
|
|
|
id = dev[0].connect("fils", key_mgmt=key_mgmt,
|
|
eap="PSK", identity="psk.user@example.com",
|
|
password_hex="0123456789abcdef0123456789abcdef",
|
|
erp="1", scan_freq="2412")
|
|
pmksa = dev[0].get_pmksa(bssid)
|
|
if pmksa is None:
|
|
raise Exception("No PMKSA cache entry created")
|
|
|
|
hapd.wait_sta()
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].wait_disconnected()
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, key_mgmt, "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha256_pmksa_cache(dev, apdev, params):
|
|
"""PASN authentication with FILS-SHA256 with PMKSA caching"""
|
|
check_pasn_fils_pmksa_cache(dev, apdev, params, "FILS-SHA256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha384_pmksa_cache(dev, apdev, params):
|
|
"""PASN authentication with FILS-SHA384 with PMKSA caching"""
|
|
check_pasn_fils_pmksa_cache(dev, apdev, params, "FILS-SHA384")
|
|
|
|
@remote_compatible
|
|
def test_pasn_sae_kdk(dev, apdev):
|
|
"""Station authentication with SAE AP with KDK derivation during connection"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
try:
|
|
params = hostapd.wpa2_params(ssid="test-sae",
|
|
passphrase="12345678")
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['sae_pwe'] = "2"
|
|
params['force_kdk_derivation'] = "1"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
dev[0].set("force_kdk_derivation", "1")
|
|
dev[0].set("sae_pwe", "2")
|
|
dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
|
|
scan_freq="2412")
|
|
|
|
check_pasn_ptk(dev[0], hapd, "CCMP", clear_keys=False)
|
|
finally:
|
|
dev[0].set("force_kdk_derivation", "0")
|
|
dev[0].set("sae_pwe", "0")
|
|
|
|
|
|
def check_pasn_fils_kdk(dev, apdev, params, key_mgmt):
|
|
check_fils_capa(dev[0])
|
|
check_erp_capa(dev[0])
|
|
check_pasn_capab(dev[0])
|
|
|
|
start_erp_as(msk_dump=os.path.join(params['logdir'], "msk.lst"))
|
|
|
|
try:
|
|
bssid = apdev[0]['bssid']
|
|
params = hostapd.wpa2_eap_params(ssid="fils")
|
|
params['wpa_key_mgmt'] = key_mgmt
|
|
params['auth_server_port'] = "18128"
|
|
params['erp_domain'] = 'example.com'
|
|
params['fils_realm'] = 'example.com'
|
|
params['disable_pmksa_caching'] = '1'
|
|
params['force_kdk_derivation'] = "1"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
dev[0].scan_for_bss(bssid, freq=2412)
|
|
dev[0].request("ERP_FLUSH")
|
|
dev[0].set("force_kdk_derivation", "1")
|
|
|
|
id = dev[0].connect("fils", key_mgmt=key_mgmt,
|
|
eap="PSK", identity="psk.user@example.com",
|
|
password_hex="0123456789abcdef0123456789abcdef",
|
|
erp="1", scan_freq="2412")
|
|
|
|
hapd.wait_sta()
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
check_pasn_ptk(dev[0], hapd, "CCMP", clear_keys=False)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].wait_disconnected()
|
|
|
|
dev[0].dump_monitor()
|
|
dev[0].select_network(id, freq=2412)
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
|
|
"EVENT-ASSOC-REJECT",
|
|
"CTRL-EVENT-CONNECTED"], timeout=10)
|
|
if ev is None:
|
|
raise Exception("Connection using FILS/ERP timed out")
|
|
if "CTRL-EVENT-EAP-STARTED" in ev:
|
|
raise Exception("Unexpected EAP exchange")
|
|
if "EVENT-ASSOC-REJECT" in ev:
|
|
raise Exception("Association failed")
|
|
|
|
hapd.wait_sta()
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
|
|
|
check_pasn_ptk(dev[0], hapd, "CCMP", clear_keys=False)
|
|
finally:
|
|
dev[0].set("force_kdk_derivation", "0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha256_kdk(dev, apdev, params):
|
|
"""Station authentication with FILS-SHA256 with KDK derivation during connection"""
|
|
check_pasn_fils_kdk(dev, apdev, params, "FILS-SHA256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha384_kdk(dev, apdev, params):
|
|
"""Station authentication with FILS-SHA384 with KDK derivation during connection"""
|
|
check_pasn_fils_kdk(dev, apdev, params, "FILS-SHA384")
|
|
|
|
@remote_compatible
|
|
def test_pasn_sae(dev, apdev):
|
|
"""PASN authentication with SAE AP with PMK derivation + PMKSA caching"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-sae",
|
|
passphrase="12345678")
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['sae_pwe'] = "2"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
try:
|
|
dev[0].set("sae_pwe", "2")
|
|
dev[0].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
|
|
scan_freq="2412", only_add_network=True)
|
|
|
|
# first test with a valid PSK
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", nid="0")
|
|
|
|
# And now with PMKSA caching
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP")
|
|
|
|
# And now with a wrong passphrase
|
|
if "FAIL" in dev[0].request("PMKSA_FLUSH"):
|
|
raise Exception("PMKSA_FLUSH failed")
|
|
|
|
dev[0].set_network_quoted(0, "psk", "12345678787")
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", status=1, nid="0")
|
|
finally:
|
|
dev[0].set("sae_pwe", "0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_sae_while_connected_same_channel(dev, apdev):
|
|
"""PASN SAE authentication while connected same channel"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-wpa2-psk",
|
|
passphrase="12345678")
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
try:
|
|
dev[0].set("sae_pwe", "2")
|
|
dev[0].connect("test-pasn-wpa2-psk", psk="12345678", scan_freq="2412")
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-sae",
|
|
passphrase="12345678")
|
|
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['sae_pwe'] = "2"
|
|
hapd = start_pasn_ap(apdev[1], params)
|
|
|
|
dev[0].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
|
|
scan_freq="2412", only_add_network=True)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", nid="1")
|
|
finally:
|
|
dev[0].set("sae_pwe", "0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_sae_while_connected_diff_channel(dev, apdev):
|
|
"""PASN SAE authentication while connected diff channel"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
with HWSimRadio(n_channels=2) as (radio, iface):
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add(iface)
|
|
|
|
if wpas.get_mcc() < 2:
|
|
raise HwsimSkip("PASN: New radio does not support MCC")
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-wpa2-psk",
|
|
passphrase="12345678")
|
|
params['channel'] = "6"
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
try:
|
|
wpas.set("sae_pwe", "2")
|
|
wpas.connect("test-pasn-wpa2-psk", psk="12345678", scan_freq="2437")
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-sae",
|
|
passphrase="12345678")
|
|
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['sae_pwe'] = "2"
|
|
hapd = start_pasn_ap(apdev[1], params)
|
|
|
|
wpas.connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
|
|
scan_freq="2412", only_add_network=True)
|
|
|
|
check_pasn_akmp_cipher(wpas, hapd, "SAE", "CCMP", nid="1")
|
|
finally:
|
|
wpas.set("sae_pwe", "0")
|
|
|
|
def pasn_fils_setup(wpas, apdev, params, key_mgmt):
|
|
check_fils_capa(wpas)
|
|
check_erp_capa(wpas)
|
|
|
|
wpas.flush_scan_cache()
|
|
|
|
start_erp_as(msk_dump=os.path.join(params['logdir'], "msk.lst"))
|
|
|
|
bssid = apdev[0]['bssid']
|
|
params = hostapd.wpa2_eap_params(ssid="fils")
|
|
params['wpa_key_mgmt'] = key_mgmt + " PASN"
|
|
params['auth_server_port'] = "18128"
|
|
params['erp_domain'] = 'example.com'
|
|
params['fils_realm'] = 'example.com'
|
|
params['disable_pmksa_caching'] = '1'
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
|
id = wpas.connect("fils", key_mgmt=key_mgmt,
|
|
eap="PSK", identity="psk.user@example.com",
|
|
password_hex="0123456789abcdef0123456789abcdef",
|
|
erp="1", scan_freq="2412")
|
|
|
|
wpas.request("DISCONNECT")
|
|
wpas.wait_disconnected()
|
|
wpas.dump_monitor()
|
|
|
|
if "FAIL" in wpas.request("PMKSA_FLUSH"):
|
|
raise Exception("PMKSA_FLUSH failed")
|
|
|
|
return hapd
|
|
|
|
def check_pasn_fils(dev, apdev, params, key_mgmt):
|
|
check_pasn_capab(dev[0])
|
|
|
|
hapd = pasn_fils_setup(dev[0], apdev, params, key_mgmt);
|
|
check_pasn_akmp_cipher(dev[0], hapd, key_mgmt, "CCMP", nid="0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha256(dev, apdev, params):
|
|
"""PASN FILS authentication using SHA-256"""
|
|
check_pasn_fils(dev, apdev, params, "FILS-SHA256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha384(dev, apdev, params):
|
|
"""PASN FILS authentication using SHA-384"""
|
|
check_pasn_fils(dev, apdev, params, "FILS-SHA384")
|
|
|
|
def check_pasn_fils_connected_same_channel(dev, apdev, params, key_mgmt):
|
|
check_pasn_capab(dev[0])
|
|
|
|
hapd = pasn_fils_setup(dev[0], apdev, params, key_mgmt);
|
|
|
|
# Connect to another AP on the same channel
|
|
hapd1 = hostapd.add_ap(apdev[1], {"ssid": "open"})
|
|
dev[0].connect("open", key_mgmt="NONE", scan_freq="2412",
|
|
bg_scan_period="0")
|
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd1)
|
|
|
|
# And perform the PASN authentication with FILS
|
|
check_pasn_akmp_cipher(dev[0], hapd, key_mgmt, "CCMP", nid="0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha256_connected_same_channel(dev, apdev, params):
|
|
"""PASN FILS authentication using SHA-256 while connected same channel"""
|
|
check_pasn_fils_connected_same_channel(dev, apdev, params, "FILS-SHA256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha384_connected_same_channel(dev, apdev, params):
|
|
"""PASN FILS authentication using SHA-384 while connected same channel"""
|
|
check_pasn_fils_connected_same_channel(dev, apdev, params, "FILS-SHA384")
|
|
|
|
def check_pasn_fils_connected_diff_channel(dev, apdev, params, key_mgmt):
|
|
check_pasn_capab(dev[0])
|
|
|
|
with HWSimRadio(n_channels=2) as (radio, iface):
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
wpas.interface_add(iface)
|
|
if wpas.get_mcc() < 2:
|
|
raise Exception("New radio does not support MCC")
|
|
|
|
hapd = pasn_fils_setup(wpas, apdev, params, key_mgmt);
|
|
|
|
# Connect to another AP on a different channel
|
|
hapd1 = hostapd.add_ap(apdev[1], {"ssid": "open", "channel" : "6"})
|
|
wpas.connect("open", key_mgmt="NONE", scan_freq="2437",
|
|
bg_scan_period="0")
|
|
|
|
hwsim_utils.test_connectivity(wpas, hapd1)
|
|
|
|
# And perform the PASN authentication with FILS
|
|
check_pasn_akmp_cipher(wpas, hapd, key_mgmt, "CCMP", nid="0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha256_connected_diff_channel(dev, apdev, params):
|
|
"""PASN FILS authentication using SHA-256 while connected diff channel"""
|
|
check_pasn_fils_connected_diff_channel(dev, apdev, params, "FILS-SHA256")
|
|
|
|
@remote_compatible
|
|
def test_pasn_fils_sha384_connected_diff_channel(dev, apdev, params):
|
|
"""PASN FILS authentication using SHA-384 while connected diff channel"""
|
|
check_pasn_fils_connected_diff_channel(dev, apdev, params, "FILS-SHA384")
|
|
|
|
def test_pasn_ft_psk(dev, apdev):
|
|
"""PASN authentication with FT-PSK"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
ssid = "test-pasn-ft-psk"
|
|
passphrase = "12345678"
|
|
|
|
params = ft_params1(ssid=ssid, passphrase=passphrase)
|
|
params['wpa_key_mgmt'] += " PASN"
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
params = ft_params2(ssid=ssid, passphrase=passphrase)
|
|
params['wpa_key_mgmt'] += " PASN"
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase)
|
|
|
|
if dev[0].get_status_field('bssid') == apdev[0]['bssid']:
|
|
pasn_hapd = hapd1
|
|
else:
|
|
pasn_hapd = hapd0
|
|
|
|
check_pasn_akmp_cipher(dev[0], pasn_hapd, "FT-PSK", "CCMP")
|
|
|
|
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, only_one_way=1)
|
|
|
|
if dev[0].get_status_field('bssid') == apdev[0]['bssid']:
|
|
pasn_hapd = hapd1
|
|
else:
|
|
pasn_hapd = hapd0
|
|
|
|
check_pasn_akmp_cipher(dev[0], pasn_hapd, "FT-PSK", "CCMP")
|
|
|
|
def test_pasn_ft_eap(dev, apdev):
|
|
"""PASN authentication with FT-EAP"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
ssid = "test-pasn-ft-psk"
|
|
passphrase = "12345678"
|
|
identity = "gpsk user"
|
|
|
|
radius = hostapd.radius_params()
|
|
params = ft_params1(ssid=ssid, passphrase=passphrase)
|
|
params['wpa_key_mgmt'] = "FT-EAP PASN"
|
|
params["ieee8021x"] = "1"
|
|
params = dict(list(radius.items()) + list(params.items()))
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
|
|
params = ft_params2(ssid=ssid, passphrase=passphrase)
|
|
params['wpa_key_mgmt'] = "FT-EAP PASN"
|
|
params["ieee8021x"] = "1"
|
|
params = dict(list(radius.items()) + list(params.items()))
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, eap=True,
|
|
eap_identity=identity)
|
|
|
|
if dev[0].get_status_field('bssid') == apdev[0]['bssid']:
|
|
pasn_hapd = hapd1
|
|
else:
|
|
pasn_hapd = hapd0
|
|
|
|
check_pasn_akmp_cipher(dev[0], pasn_hapd, "FT-EAP", "CCMP")
|
|
|
|
def test_pasn_ft_eap_sha384(dev, apdev):
|
|
"""PASN authentication with FT-EAP-SHA-384"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
ssid = "test-pasn-ft-psk"
|
|
passphrase = "12345678"
|
|
identity = "gpsk user"
|
|
|
|
radius = hostapd.radius_params()
|
|
params = ft_params1(ssid=ssid, passphrase=passphrase)
|
|
params["ieee80211w"] = "2"
|
|
params['wpa_key_mgmt'] = "FT-EAP-SHA384 PASN"
|
|
params["ieee8021x"] = "1"
|
|
params = dict(list(radius.items()) + list(params.items()))
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
|
|
params = ft_params2(ssid=ssid, passphrase=passphrase)
|
|
params["ieee80211w"] = "2"
|
|
params['wpa_key_mgmt'] = "FT-EAP-SHA384 PASN"
|
|
params["ieee8021x"] = "1"
|
|
params = dict(list(radius.items()) + list(params.items()))
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, eap=True,
|
|
sha384=True)
|
|
|
|
if dev[0].get_status_field('bssid') == apdev[0]['bssid']:
|
|
pasn_hapd = hapd1
|
|
else:
|
|
pasn_hapd = hapd0
|
|
|
|
check_pasn_akmp_cipher(dev[0], pasn_hapd, "FT-EAP-SHA384", "CCMP")
|
|
|
|
def test_pasn_sta_mic_error(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP with corrupted MIC on station"""
|
|
params = pasn_ap_params("PASN", "CCMP", "19")
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
try:
|
|
# When forcing MIC corruption, the exchange would be still successful
|
|
# on the station side, but the AP would fail the exchange and would not
|
|
# store the keys.
|
|
dev[0].set("pasn_corrupt_mic", "1")
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP", fail_ptk=True)
|
|
finally:
|
|
dev[0].set("pasn_corrupt_mic", "0")
|
|
|
|
# Now verify the successful case
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP")
|
|
|
|
def test_pasn_ap_mic_error(dev, apdev):
|
|
"""PASN authentication with WPA2/CCMP AP with corrupted MIC on AP"""
|
|
params = pasn_ap_params("PASN", "CCMP", "19")
|
|
hapd0 = hostapd.add_ap(apdev[0], params)
|
|
|
|
params['pasn_corrupt_mic'] = "1"
|
|
hapd1 = hostapd.add_ap(apdev[1], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd1, "PASN", "CCMP", status=1)
|
|
check_pasn_akmp_cipher(dev[0], hapd0, "PASN", "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_comeback(dev, apdev, params):
|
|
"""PASN authentication with comeback flow"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP", "19")
|
|
params['sae_anti_clogging_threshold'] = '0'
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
dev[0].scan(type="ONLY", freq=2412)
|
|
cmd = "PASN_START bssid=%s akmp=PASN cipher=CCMP group=19" % bssid
|
|
|
|
resp = dev[0].request(cmd)
|
|
if "OK" not in resp:
|
|
raise Exception("Failed to start PASN authentication")
|
|
|
|
ev = dev[0].wait_event(["PASN-AUTH-STATUS"], 3)
|
|
if not ev:
|
|
raise Exception("PASN: PASN-AUTH-STATUS not seen")
|
|
|
|
if bssid + " akmp=PASN, status=30 comeback_after=" not in ev:
|
|
raise Exception("PASN: unexpected status")
|
|
|
|
comeback = re.split("comeback=", ev)[1]
|
|
|
|
cmd = "PASN_START bssid=%s akmp=PASN cipher=CCMP group=19 comeback=%s" % \
|
|
(bssid, comeback)
|
|
|
|
resp = dev[0].request(cmd)
|
|
if "OK" not in resp:
|
|
raise Exception("Failed to start PASN authentication")
|
|
|
|
ev = dev[0].wait_event(["PASN-AUTH-STATUS"], 3)
|
|
if not ev:
|
|
raise Exception("PASN: PASN-AUTH-STATUS not seen")
|
|
|
|
if bssid + " akmp=PASN, status=0" not in ev:
|
|
raise Exception("PASN: unexpected status with comeback token")
|
|
|
|
check_pasn_ptk(dev[0], hapd, "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_comeback_after_0(dev, apdev, params):
|
|
"""PASN authentication with comeback flow with comeback after set to 0"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP", "19")
|
|
params['anti_clogging_threshold'] = '0'
|
|
params['pasn_comeback_after'] = '0'
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
check_pasn_akmp_cipher(dev[0], hapd, "PASN", "CCMP")
|
|
|
|
@remote_compatible
|
|
def test_pasn_comeback_after_0_sae(dev, apdev):
|
|
"""PASN authentication with SAE, with comeback flow where comeback after is set to 0"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-sae",
|
|
passphrase="12345678")
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['anti_clogging_threshold'] = '0'
|
|
params['pasn_comeback_after'] = '0'
|
|
params['sae_pwe'] = "2"
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
|
|
try:
|
|
dev[0].set("sae_pwe", "2")
|
|
dev[0].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
|
|
scan_freq="2412", only_add_network=True)
|
|
|
|
# first test with a valid PSK
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", nid="0")
|
|
|
|
# And now with PMKSA caching
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP")
|
|
|
|
# And now with a wrong passphrase
|
|
if "FAIL" in dev[0].request("PMKSA_FLUSH"):
|
|
raise Exception("PMKSA_FLUSH failed")
|
|
|
|
dev[0].set_network_quoted(0, "psk", "12345678787")
|
|
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", status=1, nid="0")
|
|
finally:
|
|
dev[0].set("sae_pwe", "0")
|
|
|
|
@remote_compatible
|
|
def test_pasn_comeback_multi(dev, apdev):
|
|
"""PASN authentication with SAE, with multiple stations with comeback"""
|
|
check_pasn_capab(dev[0])
|
|
check_sae_capab(dev[0])
|
|
|
|
params = hostapd.wpa2_params(ssid="test-pasn-sae",
|
|
passphrase="12345678")
|
|
params['wpa_key_mgmt'] = 'SAE PASN'
|
|
params['anti_clogging_threshold'] = '1'
|
|
params['pasn_comeback_after'] = '0'
|
|
hapd = start_pasn_ap(apdev[0], params)
|
|
bssid = hapd.own_addr()
|
|
|
|
id = {}
|
|
for i in range(0, 2):
|
|
dev[i].flush_scan_cache()
|
|
dev[i].scan(type="ONLY", freq=2412)
|
|
id[i] = dev[i].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
|
|
scan_freq="2412", only_add_network=True)
|
|
|
|
for i in range(0, 2):
|
|
cmd = "PASN_START bssid=%s akmp=PASN cipher=CCMP group=19, nid=%s" % (bssid, id[i])
|
|
resp = dev[i].request(cmd)
|
|
|
|
if "OK" not in resp:
|
|
raise Exception("Failed to start pasn authentication")
|
|
|
|
for i in range(0, 2):
|
|
ev = dev[i].wait_event(["PASN-AUTH-STATUS"], 3)
|
|
if not ev:
|
|
raise Exception("PASN: PASN-AUTH-STATUS not seen")
|
|
|
|
if bssid + " akmp=PASN, status=0" not in ev:
|
|
raise Exception("PASN: unexpected status")
|
|
|
|
check_pasn_ptk(dev[i], hapd, "CCMP")
|
|
|
|
def test_pasn_kdk_derivation(dev, apdev):
|
|
"""PASN authentication with forced KDK derivation"""
|
|
check_pasn_capab(dev[0])
|
|
|
|
params = pasn_ap_params("PASN", "CCMP", "19")
|
|
hapd0 = start_pasn_ap(apdev[0], params)
|
|
|
|
params['force_kdk_derivation'] = "1"
|
|
hapd1 = start_pasn_ap(apdev[1], params)
|
|
|
|
try:
|
|
check_pasn_akmp_cipher(dev[0], hapd0, "PASN", "CCMP")
|
|
dev[0].set("force_kdk_derivation", "1")
|
|
check_pasn_akmp_cipher(dev[0], hapd1, "PASN", "CCMP")
|
|
finally:
|
|
dev[0].set("force_kdk_derivation", "0")
|