test_sae.py 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163
  1. # Test cases for SAE
  2. # Copyright (c) 2013, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import time
  7. import subprocess
  8. import logging
  9. logger = logging.getLogger()
  10. import hwsim_utils
  11. import hostapd
  12. def test_sae(dev, apdev):
  13. """SAE with default group"""
  14. params = hostapd.wpa2_params(ssid="test-sae",
  15. passphrase="12345678")
  16. params['wpa_key_mgmt'] = 'SAE'
  17. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  18. key_mgmt = hapd.get_config()['key_mgmt']
  19. if key_mgmt.split(' ')[0] != "SAE":
  20. raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
  21. dev[0].request("SET sae_groups ")
  22. id = dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
  23. scan_freq="2412")
  24. if dev[0].get_status_field('sae_group') != '19':
  25. raise Exception("Expected default SAE group not used")
  26. bss = dev[0].get_bss(apdev[0]['bssid'])
  27. if 'flags' not in bss:
  28. raise Exception("Could not get BSS flags from BSS table")
  29. if "[WPA2-SAE-CCMP]" not in bss['flags']:
  30. raise Exception("Unexpected BSS flags: " + bss['flags'])
  31. def test_sae_pmksa_caching(dev, apdev):
  32. """SAE and PMKSA caching"""
  33. params = hostapd.wpa2_params(ssid="test-sae",
  34. passphrase="12345678")
  35. params['wpa_key_mgmt'] = 'SAE'
  36. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  37. dev[0].request("SET sae_groups ")
  38. dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
  39. scan_freq="2412")
  40. dev[0].request("DISCONNECT")
  41. dev[0].request("RECONNECT")
  42. dev[0].wait_connected(timeout=15, error="Reconnect timed out")
  43. if dev[0].get_status_field('sae_group') is not None:
  44. raise Exception("SAE group claimed to have been used")
  45. def test_sae_pmksa_caching_disabled(dev, apdev):
  46. """SAE and PMKSA caching disabled"""
  47. params = hostapd.wpa2_params(ssid="test-sae",
  48. passphrase="12345678")
  49. params['wpa_key_mgmt'] = 'SAE'
  50. params['disable_pmksa_caching'] = '1'
  51. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  52. dev[0].request("SET sae_groups ")
  53. dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
  54. scan_freq="2412")
  55. dev[0].request("DISCONNECT")
  56. dev[0].request("RECONNECT")
  57. dev[0].wait_connected(timeout=15, error="Reconnect timed out")
  58. if dev[0].get_status_field('sae_group') != '19':
  59. raise Exception("Expected default SAE group not used")
  60. def test_sae_groups(dev, apdev):
  61. """SAE with all supported groups"""
  62. # This would be the full list of supported groups, but groups 14-16
  63. # (2048-4096 bit MODP) are a bit too slow on some VMs and can result in
  64. # hitting mac80211 authentication timeout, so skip them for now.
  65. #sae_groups = [ 19, 25, 26, 20, 21, 2, 5, 14, 15, 16, 22, 23, 24 ]
  66. sae_groups = [ 19, 25, 26, 20, 21, 2, 5, 22, 23, 24 ]
  67. groups = [str(g) for g in sae_groups]
  68. params = hostapd.wpa2_params(ssid="test-sae-groups",
  69. passphrase="12345678")
  70. params['wpa_key_mgmt'] = 'SAE'
  71. params['sae_groups'] = ' '.join(groups)
  72. hostapd.add_ap(apdev[0]['ifname'], params)
  73. for g in groups:
  74. logger.info("Testing SAE group " + g)
  75. dev[0].request("SET sae_groups " + g)
  76. id = dev[0].connect("test-sae-groups", psk="12345678", key_mgmt="SAE",
  77. scan_freq="2412")
  78. if dev[0].get_status_field('sae_group') != g:
  79. raise Exception("Expected SAE group not used")
  80. dev[0].remove_network(id)
  81. def test_sae_group_nego(dev, apdev):
  82. """SAE group negotiation"""
  83. params = hostapd.wpa2_params(ssid="test-sae-group-nego",
  84. passphrase="12345678")
  85. params['wpa_key_mgmt'] = 'SAE'
  86. params['sae_groups'] = '19'
  87. hostapd.add_ap(apdev[0]['ifname'], params)
  88. dev[0].request("SET sae_groups 25 26 20 19")
  89. dev[0].connect("test-sae-group-nego", psk="12345678", key_mgmt="SAE",
  90. scan_freq="2412")
  91. if dev[0].get_status_field('sae_group') != '19':
  92. raise Exception("Expected SAE group not used")
  93. def test_sae_anti_clogging(dev, apdev):
  94. """SAE anti clogging"""
  95. params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678")
  96. params['wpa_key_mgmt'] = 'SAE'
  97. params['sae_anti_clogging_threshold'] = '1'
  98. hostapd.add_ap(apdev[0]['ifname'], params)
  99. dev[0].request("SET sae_groups ")
  100. dev[1].request("SET sae_groups ")
  101. id = {}
  102. for i in range(0, 2):
  103. dev[i].scan(freq="2412")
  104. id[i] = dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
  105. scan_freq="2412", only_add_network=True)
  106. for i in range(0, 2):
  107. dev[i].select_network(id[i])
  108. for i in range(0, 2):
  109. dev[i].wait_connected(timeout=10)
  110. def test_sae_forced_anti_clogging(dev, apdev):
  111. """SAE anti clogging (forced)"""
  112. params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678")
  113. params['wpa_key_mgmt'] = 'SAE WPA-PSK'
  114. params['sae_anti_clogging_threshold'] = '0'
  115. hostapd.add_ap(apdev[0]['ifname'], params)
  116. dev[2].connect("test-sae", psk="12345678", scan_freq="2412")
  117. for i in range(0, 2):
  118. dev[i].request("SET sae_groups ")
  119. dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
  120. scan_freq="2412")
  121. def test_sae_mixed(dev, apdev):
  122. """Mixed SAE and non-SAE network"""
  123. params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678")
  124. params['wpa_key_mgmt'] = 'SAE WPA-PSK'
  125. params['sae_anti_clogging_threshold'] = '0'
  126. hostapd.add_ap(apdev[0]['ifname'], params)
  127. dev[2].connect("test-sae", psk="12345678", scan_freq="2412")
  128. for i in range(0, 2):
  129. dev[i].request("SET sae_groups ")
  130. dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
  131. scan_freq="2412")
  132. def test_sae_missing_password(dev, apdev):
  133. """SAE and missing password"""
  134. params = hostapd.wpa2_params(ssid="test-sae",
  135. passphrase="12345678")
  136. params['wpa_key_mgmt'] = 'SAE'
  137. hapd = hostapd.add_ap(apdev[0]['ifname'], params)
  138. dev[0].request("SET sae_groups ")
  139. id = dev[0].connect("test-sae",
  140. raw_psk="46b4a73b8a951ad53ebd2e0afdb9c5483257edd4c21d12b7710759da70945858",
  141. key_mgmt="SAE", scan_freq="2412", wait_connect=False)
  142. ev = dev[0].wait_event(['CTRL-EVENT-SSID-TEMP-DISABLED'], timeout=10)
  143. if ev is None:
  144. raise Exception("Invalid network not temporarily disabled")