test_pmksa_cache.py 44 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080
  1. # WPA2-Enterprise PMKSA caching tests
  2. # Copyright (c) 2013-2014, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import binascii
  7. import logging
  8. logger = logging.getLogger()
  9. import socket
  10. import struct
  11. import subprocess
  12. import time
  13. import hostapd
  14. import hwsim_utils
  15. from wpasupplicant import WpaSupplicant
  16. from utils import alloc_fail, HwsimSkip, wait_fail_trigger
  17. from test_ap_eap import eap_connect
  18. def test_pmksa_cache_on_roam_back(dev, apdev):
  19. """PMKSA cache to skip EAP on reassociation back to same AP"""
  20. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  21. hostapd.add_ap(apdev[0], params)
  22. bssid = apdev[0]['bssid']
  23. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  24. eap="GPSK", identity="gpsk user",
  25. password="abcdefghijklmnop0123456789abcdef",
  26. scan_freq="2412")
  27. pmksa = dev[0].get_pmksa(bssid)
  28. if pmksa is None:
  29. raise Exception("No PMKSA cache entry created")
  30. if pmksa['opportunistic'] != '0':
  31. raise Exception("Unexpected opportunistic PMKSA cache entry")
  32. hostapd.add_ap(apdev[1], params)
  33. bssid2 = apdev[1]['bssid']
  34. dev[0].dump_monitor()
  35. logger.info("Roam to AP2")
  36. # It can take some time for the second AP to become ready to reply to Probe
  37. # Request frames especially under heavy CPU load, so allow couple of rounds
  38. # of scanning to avoid reporting errors incorrectly just because of scans
  39. # not having seen the target AP.
  40. for i in range(0, 10):
  41. dev[0].scan(freq="2412")
  42. if dev[0].get_bss(bssid2) is not None:
  43. break
  44. logger.info("Scan again to find target AP")
  45. dev[0].request("ROAM " + bssid2)
  46. ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
  47. if ev is None:
  48. raise Exception("EAP success timed out")
  49. dev[0].wait_connected(timeout=10, error="Roaming timed out")
  50. pmksa2 = dev[0].get_pmksa(bssid2)
  51. if pmksa2 is None:
  52. raise Exception("No PMKSA cache entry found")
  53. if pmksa2['opportunistic'] != '0':
  54. raise Exception("Unexpected opportunistic PMKSA cache entry")
  55. dev[0].dump_monitor()
  56. logger.info("Roam back to AP1")
  57. dev[0].scan(freq="2412")
  58. dev[0].request("ROAM " + bssid)
  59. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  60. "CTRL-EVENT-CONNECTED"], timeout=10)
  61. if ev is None:
  62. raise Exception("Roaming with the AP timed out")
  63. if "CTRL-EVENT-EAP-STARTED" in ev:
  64. raise Exception("Unexpected EAP exchange")
  65. pmksa1b = dev[0].get_pmksa(bssid)
  66. if pmksa1b is None:
  67. raise Exception("No PMKSA cache entry found")
  68. if pmksa['pmkid'] != pmksa1b['pmkid']:
  69. raise Exception("Unexpected PMKID change for AP1")
  70. dev[0].dump_monitor()
  71. if "FAIL" in dev[0].request("PMKSA_FLUSH"):
  72. raise Exception("PMKSA_FLUSH failed")
  73. if dev[0].get_pmksa(bssid) is not None or dev[0].get_pmksa(bssid2) is not None:
  74. raise Exception("PMKSA_FLUSH did not remove PMKSA entries")
  75. dev[0].wait_disconnected(timeout=5)
  76. dev[0].wait_connected(timeout=15, error="Reconnection timed out")
  77. def test_pmksa_cache_and_reauth(dev, apdev):
  78. """PMKSA caching and EAPOL reauthentication"""
  79. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  80. hapd = hostapd.add_ap(apdev[0], params)
  81. bssid = apdev[0]['bssid']
  82. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  83. eap="GPSK", identity="gpsk user",
  84. password="abcdefghijklmnop0123456789abcdef",
  85. scan_freq="2412")
  86. hostapd.add_ap(apdev[1], params)
  87. bssid2 = apdev[1]['bssid']
  88. dev[0].dump_monitor()
  89. logger.info("Roam to AP2")
  90. # It can take some time for the second AP to become ready to reply to Probe
  91. # Request frames especially under heavy CPU load, so allow couple of rounds
  92. # of scanning to avoid reporting errors incorrectly just because of scans
  93. # not having seen the target AP.
  94. for i in range(0, 10):
  95. dev[0].scan(freq="2412")
  96. if dev[0].get_bss(bssid2) is not None:
  97. break
  98. logger.info("Scan again to find target AP")
  99. dev[0].request("ROAM " + bssid2)
  100. ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
  101. if ev is None:
  102. raise Exception("EAP success timed out")
  103. dev[0].wait_connected(timeout=10, error="Roaming timed out")
  104. dev[0].dump_monitor()
  105. logger.info("Roam back to AP1")
  106. dev[0].scan(freq="2412")
  107. dev[0].request("ROAM " + bssid)
  108. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  109. "CTRL-EVENT-CONNECTED"], timeout=10)
  110. if ev is None:
  111. raise Exception("Roaming with the AP timed out")
  112. if "CTRL-EVENT-EAP-STARTED" in ev:
  113. raise Exception("Unexpected EAP exchange")
  114. # Verify EAPOL reauthentication after PMKSA caching
  115. hapd.request("EAPOL_REAUTH " + dev[0].own_addr())
  116. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED"], timeout=5)
  117. if ev is None:
  118. raise Exception("EAP authentication did not start")
  119. ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=5)
  120. if ev is None:
  121. raise Exception("EAP authentication did not succeed")
  122. def test_pmksa_cache_opportunistic_only_on_sta(dev, apdev):
  123. """Opportunistic PMKSA caching enabled only on station"""
  124. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  125. hostapd.add_ap(apdev[0], params)
  126. bssid = apdev[0]['bssid']
  127. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  128. eap="GPSK", identity="gpsk user",
  129. password="abcdefghijklmnop0123456789abcdef", okc=True,
  130. scan_freq="2412")
  131. pmksa = dev[0].get_pmksa(bssid)
  132. if pmksa is None:
  133. raise Exception("No PMKSA cache entry created")
  134. if pmksa['opportunistic'] != '0':
  135. raise Exception("Unexpected opportunistic PMKSA cache entry")
  136. hostapd.add_ap(apdev[1], params)
  137. bssid2 = apdev[1]['bssid']
  138. dev[0].dump_monitor()
  139. logger.info("Roam to AP2")
  140. dev[0].scan(freq="2412")
  141. dev[0].request("ROAM " + bssid2)
  142. ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
  143. if ev is None:
  144. raise Exception("EAP success timed out")
  145. dev[0].wait_connected(timeout=10, error="Roaming timed out")
  146. pmksa2 = dev[0].get_pmksa(bssid2)
  147. if pmksa2 is None:
  148. raise Exception("No PMKSA cache entry found")
  149. if pmksa2['opportunistic'] != '0':
  150. raise Exception("Unexpected opportunistic PMKSA cache entry")
  151. dev[0].dump_monitor()
  152. logger.info("Roam back to AP1")
  153. dev[0].scan(freq="2412")
  154. dev[0].request("ROAM " + bssid)
  155. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  156. "CTRL-EVENT-CONNECTED"], timeout=10)
  157. if ev is None:
  158. raise Exception("Roaming with the AP timed out")
  159. if "CTRL-EVENT-EAP-STARTED" in ev:
  160. raise Exception("Unexpected EAP exchange")
  161. pmksa1b = dev[0].get_pmksa(bssid)
  162. if pmksa1b is None:
  163. raise Exception("No PMKSA cache entry found")
  164. if pmksa['pmkid'] != pmksa1b['pmkid']:
  165. raise Exception("Unexpected PMKID change for AP1")
  166. def test_pmksa_cache_opportunistic(dev, apdev):
  167. """Opportunistic PMKSA caching"""
  168. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  169. params['okc'] = "1"
  170. hostapd.add_ap(apdev[0], params)
  171. bssid = apdev[0]['bssid']
  172. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  173. eap="GPSK", identity="gpsk user",
  174. password="abcdefghijklmnop0123456789abcdef", okc=True,
  175. scan_freq="2412")
  176. pmksa = dev[0].get_pmksa(bssid)
  177. if pmksa is None:
  178. raise Exception("No PMKSA cache entry created")
  179. if pmksa['opportunistic'] != '0':
  180. raise Exception("Unexpected opportunistic PMKSA cache entry")
  181. hostapd.add_ap(apdev[1], params)
  182. bssid2 = apdev[1]['bssid']
  183. dev[0].dump_monitor()
  184. logger.info("Roam to AP2")
  185. dev[0].scan(freq="2412")
  186. dev[0].request("ROAM " + bssid2)
  187. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  188. "CTRL-EVENT-CONNECTED"], timeout=10)
  189. if ev is None:
  190. raise Exception("Roaming with the AP timed out")
  191. if "CTRL-EVENT-EAP-STARTED" in ev:
  192. raise Exception("Unexpected EAP exchange")
  193. pmksa2 = dev[0].get_pmksa(bssid2)
  194. if pmksa2 is None:
  195. raise Exception("No PMKSA cache entry created")
  196. dev[0].dump_monitor()
  197. logger.info("Roam back to AP1")
  198. dev[0].scan(freq="2412")
  199. dev[0].request("ROAM " + bssid)
  200. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  201. "CTRL-EVENT-CONNECTED"], timeout=10)
  202. if ev is None:
  203. raise Exception("Roaming with the AP timed out")
  204. if "CTRL-EVENT-EAP-STARTED" in ev:
  205. raise Exception("Unexpected EAP exchange")
  206. pmksa1b = dev[0].get_pmksa(bssid)
  207. if pmksa1b is None:
  208. raise Exception("No PMKSA cache entry found")
  209. if pmksa['pmkid'] != pmksa1b['pmkid']:
  210. raise Exception("Unexpected PMKID change for AP1")
  211. def test_pmksa_cache_opportunistic_connect(dev, apdev):
  212. """Opportunistic PMKSA caching with connect API"""
  213. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  214. params['okc'] = "1"
  215. hostapd.add_ap(apdev[0], params)
  216. bssid = apdev[0]['bssid']
  217. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  218. wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
  219. wpas.connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  220. eap="GPSK", identity="gpsk user",
  221. password="abcdefghijklmnop0123456789abcdef", okc=True,
  222. scan_freq="2412")
  223. pmksa = wpas.get_pmksa(bssid)
  224. if pmksa is None:
  225. raise Exception("No PMKSA cache entry created")
  226. if pmksa['opportunistic'] != '0':
  227. raise Exception("Unexpected opportunistic PMKSA cache entry")
  228. hostapd.add_ap(apdev[1], params)
  229. bssid2 = apdev[1]['bssid']
  230. wpas.dump_monitor()
  231. logger.info("Roam to AP2")
  232. wpas.scan_for_bss(bssid2, freq="2412", force_scan=True)
  233. wpas.request("ROAM " + bssid2)
  234. ev = wpas.wait_event(["CTRL-EVENT-EAP-STARTED",
  235. "CTRL-EVENT-CONNECTED"], timeout=10)
  236. if ev is None:
  237. raise Exception("Roaming with the AP timed out")
  238. if "CTRL-EVENT-EAP-STARTED" in ev:
  239. raise Exception("Unexpected EAP exchange")
  240. pmksa2 = wpas.get_pmksa(bssid2)
  241. if pmksa2 is None:
  242. raise Exception("No PMKSA cache entry created")
  243. wpas.dump_monitor()
  244. logger.info("Roam back to AP1")
  245. wpas.scan(freq="2412")
  246. wpas.request("ROAM " + bssid)
  247. ev = wpas.wait_event(["CTRL-EVENT-EAP-STARTED",
  248. "CTRL-EVENT-CONNECTED"], timeout=10)
  249. if ev is None:
  250. raise Exception("Roaming with the AP timed out")
  251. if "CTRL-EVENT-EAP-STARTED" in ev:
  252. raise Exception("Unexpected EAP exchange")
  253. pmksa1b = wpas.get_pmksa(bssid)
  254. if pmksa1b is None:
  255. raise Exception("No PMKSA cache entry found")
  256. if pmksa['pmkid'] != pmksa1b['pmkid']:
  257. raise Exception("Unexpected PMKID change for AP1")
  258. def test_pmksa_cache_expiration(dev, apdev):
  259. """PMKSA cache entry expiration"""
  260. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  261. hapd = hostapd.add_ap(apdev[0], params)
  262. bssid = apdev[0]['bssid']
  263. dev[0].request("SET dot11RSNAConfigPMKLifetime 10")
  264. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  265. eap="GPSK", identity="gpsk user",
  266. password="abcdefghijklmnop0123456789abcdef",
  267. scan_freq="2412")
  268. pmksa = dev[0].get_pmksa(bssid)
  269. if pmksa is None:
  270. raise Exception("No PMKSA cache entry created")
  271. logger.info("Wait for PMKSA cache entry to expire")
  272. ev = dev[0].wait_event(["WPA: Key negotiation completed",
  273. "CTRL-EVENT-DISCONNECTED"], timeout=15)
  274. if ev is None:
  275. raise Exception("No EAP reauthentication seen")
  276. if "CTRL-EVENT-DISCONNECTED" in ev:
  277. raise Exception("Unexpected disconnection")
  278. pmksa2 = dev[0].get_pmksa(bssid)
  279. if pmksa['pmkid'] == pmksa2['pmkid']:
  280. raise Exception("PMKID did not change")
  281. hwsim_utils.test_connectivity(dev[0], hapd)
  282. def test_pmksa_cache_expiration_disconnect(dev, apdev):
  283. """PMKSA cache entry expiration (disconnect)"""
  284. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  285. hapd = hostapd.add_ap(apdev[0], params)
  286. bssid = apdev[0]['bssid']
  287. dev[0].request("SET dot11RSNAConfigPMKLifetime 2")
  288. dev[0].request("SET dot11RSNAConfigPMKReauthThreshold 100")
  289. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  290. eap="GPSK", identity="gpsk user",
  291. password="abcdefghijklmnop0123456789abcdef",
  292. scan_freq="2412")
  293. pmksa = dev[0].get_pmksa(bssid)
  294. if pmksa is None:
  295. raise Exception("No PMKSA cache entry created")
  296. hapd.request("SET auth_server_shared_secret incorrect")
  297. logger.info("Wait for PMKSA cache entry to expire")
  298. ev = dev[0].wait_event(["WPA: Key negotiation completed",
  299. "CTRL-EVENT-DISCONNECTED"], timeout=15)
  300. if ev is None:
  301. raise Exception("No EAP reauthentication seen")
  302. if "CTRL-EVENT-DISCONNECTED" not in ev:
  303. raise Exception("Missing disconnection")
  304. hapd.request("SET auth_server_shared_secret radius")
  305. ev = dev[0].wait_event(["WPA: Key negotiation completed"], timeout=15)
  306. if ev is None:
  307. raise Exception("No EAP reauthentication seen")
  308. pmksa2 = dev[0].get_pmksa(bssid)
  309. if pmksa['pmkid'] == pmksa2['pmkid']:
  310. raise Exception("PMKID did not change")
  311. def test_pmksa_cache_and_cui(dev, apdev):
  312. """PMKSA cache and Chargeable-User-Identity"""
  313. params = hostapd.wpa2_eap_params(ssid="cui")
  314. params['radius_request_cui'] = '1'
  315. params['acct_server_addr'] = "127.0.0.1"
  316. params['acct_server_port'] = "1813"
  317. params['acct_server_shared_secret'] = "radius"
  318. hapd = hostapd.add_ap(apdev[0], params)
  319. bssid = apdev[0]['bssid']
  320. dev[0].connect("cui", proto="RSN", key_mgmt="WPA-EAP",
  321. eap="GPSK", identity="gpsk-cui",
  322. password="abcdefghijklmnop0123456789abcdef",
  323. scan_freq="2412")
  324. pmksa = dev[0].get_pmksa(bssid)
  325. if pmksa is None:
  326. raise Exception("No PMKSA cache entry created")
  327. ev = hapd.wait_event([ "AP-STA-CONNECTED" ], timeout=5)
  328. if ev is None:
  329. raise Exception("No connection event received from hostapd")
  330. dev[0].dump_monitor()
  331. logger.info("Disconnect and reconnect to the same AP")
  332. dev[0].request("DISCONNECT")
  333. dev[0].wait_disconnected()
  334. dev[0].request("RECONNECT")
  335. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  336. "CTRL-EVENT-CONNECTED"], timeout=10)
  337. if ev is None:
  338. raise Exception("Reconnect timed out")
  339. if "CTRL-EVENT-EAP-STARTED" in ev:
  340. raise Exception("Unexpected EAP exchange")
  341. pmksa1b = dev[0].get_pmksa(bssid)
  342. if pmksa1b is None:
  343. raise Exception("No PMKSA cache entry found")
  344. if pmksa['pmkid'] != pmksa1b['pmkid']:
  345. raise Exception("Unexpected PMKID change for AP1")
  346. dev[0].request("REAUTHENTICATE")
  347. ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
  348. if ev is None:
  349. raise Exception("EAP success timed out")
  350. for i in range(0, 20):
  351. state = dev[0].get_status_field("wpa_state")
  352. if state == "COMPLETED":
  353. break
  354. time.sleep(0.1)
  355. if state != "COMPLETED":
  356. raise Exception("Reauthentication did not complete")
  357. def generic_pmksa_cache_preauth(dev, apdev, extraparams, identity, databridge,
  358. force_disconnect=False):
  359. if not extraparams:
  360. extraparams = [{}, {}]
  361. try:
  362. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  363. params['bridge'] = 'ap-br0'
  364. for key, value in extraparams[0].iteritems():
  365. params[key] = value
  366. hapd = hostapd.add_ap(apdev[0], params)
  367. hapd.cmd_execute(['brctl', 'setfd', 'ap-br0', '0'])
  368. hapd.cmd_execute(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
  369. eap_connect(dev[0], hapd, "PAX", identity,
  370. password_hex="0123456789abcdef0123456789abcdef")
  371. # Verify connectivity in the correct VLAN
  372. hwsim_utils.test_connectivity_iface(dev[0], hapd, databridge)
  373. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  374. params['bridge'] = 'ap-br0'
  375. params['rsn_preauth'] = '1'
  376. params['rsn_preauth_interfaces'] = databridge
  377. for key, value in extraparams[1].iteritems():
  378. params[key] = value
  379. hostapd.add_ap(apdev[1], params)
  380. bssid1 = apdev[1]['bssid']
  381. dev[0].scan(freq="2412")
  382. success = False
  383. status_seen = False
  384. for i in range(0, 50):
  385. if not status_seen:
  386. status = dev[0].request("STATUS")
  387. if "Pre-authentication EAPOL state machines:" in status:
  388. status_seen = True
  389. time.sleep(0.1)
  390. pmksa = dev[0].get_pmksa(bssid1)
  391. if pmksa:
  392. success = True
  393. break
  394. if not success:
  395. raise Exception("No PMKSA cache entry created from pre-authentication")
  396. if not status_seen:
  397. raise Exception("Pre-authentication EAPOL status was not available")
  398. dev[0].scan(freq="2412")
  399. if "[WPA2-EAP-CCMP-preauth]" not in dev[0].request("SCAN_RESULTS"):
  400. raise Exception("Scan results missing RSN element info")
  401. dev[0].request("ROAM " + bssid1)
  402. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  403. "CTRL-EVENT-CONNECTED"], timeout=10)
  404. if ev is None:
  405. raise Exception("Roaming with the AP timed out")
  406. if "CTRL-EVENT-EAP-STARTED" in ev:
  407. raise Exception("Unexpected EAP exchange")
  408. pmksa2 = dev[0].get_pmksa(bssid1)
  409. if pmksa2 is None:
  410. raise Exception("No PMKSA cache entry")
  411. if pmksa['pmkid'] != pmksa2['pmkid']:
  412. raise Exception("Unexpected PMKID change")
  413. # Verify connectivity in the correct VLAN
  414. hwsim_utils.test_connectivity_iface(dev[0], hapd, databridge)
  415. if not force_disconnect:
  416. return
  417. # Disconnect the STA from both APs to avoid forceful ifdown by the
  418. # test script on a VLAN that this has an associated STA. That used to
  419. # trigger a mac80211 warning.
  420. dev[0].request("DISCONNECT")
  421. hapd.request("DISABLE")
  422. finally:
  423. hostapd.cmd_execute(apdev[0], ['ip', 'link', 'set', 'dev',
  424. 'ap-br0', 'down', '2>', '/dev/null'],
  425. shell=True)
  426. hostapd.cmd_execute(apdev[0], ['brctl', 'delbr', 'ap-br0',
  427. '2>', '/dev/null'], shell=True)
  428. def test_pmksa_cache_preauth(dev, apdev):
  429. """RSN pre-authentication to generate PMKSA cache entry"""
  430. generic_pmksa_cache_preauth(dev, apdev, None,
  431. "pax.user@example.com", "ap-br0")
  432. def test_pmksa_cache_preauth_per_sta_vif(dev, apdev):
  433. """RSN pre-authentication to generate PMKSA cache entry with per_sta_vif"""
  434. extraparams = [{}, {}]
  435. extraparams[0]['per_sta_vif'] = "1"
  436. extraparams[1]['per_sta_vif'] = "1"
  437. generic_pmksa_cache_preauth(dev, apdev, extraparams,
  438. "pax.user@example.com", "ap-br0")
  439. def test_pmksa_cache_preauth_vlan_enabled(dev, apdev):
  440. """RSN pre-authentication to generate PMKSA cache entry (dynamic_vlan optional but station without VLAN set)"""
  441. extraparams = [{}, {}]
  442. extraparams[0]['dynamic_vlan'] = '1'
  443. extraparams[1]['dynamic_vlan'] = '1'
  444. generic_pmksa_cache_preauth(dev, apdev, extraparams,
  445. "pax.user@example.com", "ap-br0")
  446. def test_pmksa_cache_preauth_vlan_enabled_per_sta_vif(dev, apdev):
  447. """RSN pre-authentication to generate PMKSA cache entry (dynamic_vlan optional but station without VLAN set, with per_sta_vif enabled)"""
  448. extraparams = [{}, {}]
  449. extraparams[0]['per_sta_vif'] = "1"
  450. extraparams[1]['per_sta_vif'] = "1"
  451. extraparams[0]['dynamic_vlan'] = '1'
  452. extraparams[1]['dynamic_vlan'] = '1'
  453. generic_pmksa_cache_preauth(dev, apdev, extraparams,
  454. "pax.user@example.com", "ap-br0")
  455. def test_pmksa_cache_preauth_vlan_used(dev, apdev):
  456. """RSN pre-authentication to generate PMKSA cache entry (station with VLAN set)"""
  457. run_pmksa_cache_preauth_vlan_used(dev, apdev, None, force_disconnect=True)
  458. def run_pmksa_cache_preauth_vlan_used(dev, apdev, extraparams=None,
  459. force_disconnect=False):
  460. try:
  461. subprocess.call(['brctl', 'addbr', 'brvlan1'])
  462. subprocess.call(['brctl', 'setfd', 'brvlan1', '0'])
  463. if not extraparams:
  464. extraparams = [{}, {}]
  465. extraparams[0]['dynamic_vlan'] = '1'
  466. extraparams[0]['vlan_file'] = 'hostapd.wlan3.vlan'
  467. extraparams[1]['dynamic_vlan'] = '1'
  468. extraparams[1]['vlan_file'] = 'hostapd.wlan4.vlan'
  469. generic_pmksa_cache_preauth(dev, apdev, extraparams,
  470. "vlan1", "brvlan1",
  471. force_disconnect=force_disconnect)
  472. finally:
  473. subprocess.call(['ip', 'link', 'set', 'dev', 'brvlan1', 'down'])
  474. subprocess.call(['ip', 'link', 'set', 'dev', 'wlan3.1', 'down'],
  475. stderr=open('/dev/null', 'w'))
  476. subprocess.call(['ip', 'link', 'set', 'dev', 'wlan4.1', 'down'],
  477. stderr=open('/dev/null', 'w'))
  478. subprocess.call(['brctl', 'delif', 'brvlan1', 'wlan3.1'],
  479. stderr=open('/dev/null', 'w'))
  480. subprocess.call(['brctl', 'delif', 'brvlan1', 'wlan4.1'],
  481. stderr=open('/dev/null', 'w'))
  482. subprocess.call(['brctl', 'delbr', 'brvlan1'])
  483. def test_pmksa_cache_preauth_vlan_used_per_sta_vif(dev, apdev):
  484. """RSN pre-authentication to generate PMKSA cache entry (station with VLAN set, per_sta_vif=1)"""
  485. extraparams = [{}, {}]
  486. extraparams[0]['per_sta_vif'] = "1"
  487. extraparams[1]['per_sta_vif'] = "1"
  488. run_pmksa_cache_preauth_vlan_used(dev, apdev, extraparams)
  489. def test_pmksa_cache_disabled(dev, apdev):
  490. """PMKSA cache disabling on AP"""
  491. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  492. params['disable_pmksa_caching'] = '1'
  493. hostapd.add_ap(apdev[0], params)
  494. bssid = apdev[0]['bssid']
  495. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  496. eap="GPSK", identity="gpsk user",
  497. password="abcdefghijklmnop0123456789abcdef",
  498. scan_freq="2412")
  499. hostapd.add_ap(apdev[1], params)
  500. bssid2 = apdev[1]['bssid']
  501. dev[0].dump_monitor()
  502. logger.info("Roam to AP2")
  503. dev[0].scan_for_bss(bssid2, freq="2412")
  504. dev[0].request("ROAM " + bssid2)
  505. ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
  506. if ev is None:
  507. raise Exception("EAP success timed out")
  508. dev[0].wait_connected(timeout=10, error="Roaming timed out")
  509. dev[0].dump_monitor()
  510. logger.info("Roam back to AP1")
  511. dev[0].scan(freq="2412")
  512. dev[0].request("ROAM " + bssid)
  513. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  514. "CTRL-EVENT-CONNECTED"], timeout=20)
  515. if ev is None:
  516. raise Exception("Roaming with the AP timed out")
  517. if "CTRL-EVENT-CONNECTED" in ev:
  518. raise Exception("EAP exchange missing")
  519. ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=20)
  520. if ev is None:
  521. raise Exception("Roaming with the AP timed out")
  522. def test_pmksa_cache_ap_expiration(dev, apdev):
  523. """PMKSA cache entry expiring on AP"""
  524. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  525. hapd = hostapd.add_ap(apdev[0], params)
  526. bssid = apdev[0]['bssid']
  527. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  528. eap="GPSK", identity="gpsk-user-session-timeout",
  529. password="abcdefghijklmnop0123456789abcdef",
  530. scan_freq="2412")
  531. ev = hapd.wait_event([ "AP-STA-CONNECTED" ], timeout=5)
  532. if ev is None:
  533. raise Exception("No connection event received from hostapd")
  534. dev[0].request("DISCONNECT")
  535. time.sleep(5)
  536. dev[0].dump_monitor()
  537. dev[0].request("RECONNECT")
  538. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  539. "CTRL-EVENT-CONNECTED"], timeout=20)
  540. if ev is None:
  541. raise Exception("Roaming with the AP timed out")
  542. if "CTRL-EVENT-CONNECTED" in ev:
  543. raise Exception("EAP exchange missing")
  544. dev[0].wait_connected(timeout=20, error="Reconnect timed out")
  545. dev[0].dump_monitor()
  546. dev[0].wait_disconnected(timeout=20)
  547. dev[0].wait_connected(timeout=20, error="Reassociation timed out")
  548. def test_pmksa_cache_multiple_sta(dev, apdev):
  549. """PMKSA cache with multiple stations"""
  550. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  551. hostapd.add_ap(apdev[0], params)
  552. bssid = apdev[0]['bssid']
  553. for d in dev:
  554. d.flush_scan_cache()
  555. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  556. eap="GPSK", identity="gpsk-user-session-timeout",
  557. password="abcdefghijklmnop0123456789abcdef",
  558. scan_freq="2412")
  559. dev[1].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  560. eap="GPSK", identity="gpsk user",
  561. password="abcdefghijklmnop0123456789abcdef",
  562. scan_freq="2412")
  563. dev[2].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  564. eap="GPSK", identity="gpsk-user-session-timeout",
  565. password="abcdefghijklmnop0123456789abcdef",
  566. scan_freq="2412")
  567. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  568. wpas.interface_add("wlan5")
  569. wpas.flush_scan_cache()
  570. wpas.connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  571. eap="GPSK", identity="gpsk user",
  572. password="abcdefghijklmnop0123456789abcdef",
  573. scan_freq="2412")
  574. hostapd.add_ap(apdev[1], params)
  575. bssid2 = apdev[1]['bssid']
  576. logger.info("Roam to AP2")
  577. for sta in [ dev[1], dev[0], dev[2], wpas ]:
  578. sta.dump_monitor()
  579. sta.scan_for_bss(bssid2, freq="2412")
  580. if "OK" not in sta.request("ROAM " + bssid2):
  581. raise Exception("ROAM command failed (" + sta.ifname + ")")
  582. ev = sta.wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=10)
  583. if ev is None:
  584. raise Exception("EAP success timed out")
  585. sta.wait_connected(timeout=10, error="Roaming timed out")
  586. sta.dump_monitor()
  587. logger.info("Roam back to AP1")
  588. for sta in [ dev[1], wpas, dev[0], dev[2] ]:
  589. sta.dump_monitor()
  590. sta.scan(freq="2412")
  591. sta.dump_monitor()
  592. sta.request("ROAM " + bssid)
  593. sta.wait_connected(timeout=10, error="Roaming timed out")
  594. sta.dump_monitor()
  595. time.sleep(4)
  596. logger.info("Roam back to AP2")
  597. for sta in [ dev[1], wpas, dev[0], dev[2] ]:
  598. sta.dump_monitor()
  599. sta.scan(freq="2412")
  600. sta.dump_monitor()
  601. sta.request("ROAM " + bssid2)
  602. sta.wait_connected(timeout=10, error="Roaming timed out")
  603. sta.dump_monitor()
  604. def test_pmksa_cache_opportunistic_multiple_sta(dev, apdev):
  605. """Opportunistic PMKSA caching with multiple stations"""
  606. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  607. params['okc'] = "1"
  608. hostapd.add_ap(apdev[0], params)
  609. bssid = apdev[0]['bssid']
  610. for d in dev:
  611. d.flush_scan_cache()
  612. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  613. wpas.interface_add("wlan5")
  614. wpas.flush_scan_cache()
  615. for sta in [ dev[0], dev[1], dev[2], wpas ]:
  616. sta.connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  617. eap="GPSK", identity="gpsk user",
  618. password="abcdefghijklmnop0123456789abcdef", okc=True,
  619. scan_freq="2412")
  620. hostapd.add_ap(apdev[1], params)
  621. bssid2 = apdev[1]['bssid']
  622. logger.info("Roam to AP2")
  623. for sta in [ dev[2], dev[0], wpas, dev[1] ]:
  624. sta.dump_monitor()
  625. sta.scan_for_bss(bssid2, freq="2412")
  626. if "OK" not in sta.request("ROAM " + bssid2):
  627. raise Exception("ROAM command failed")
  628. ev = sta.wait_event(["CTRL-EVENT-EAP-STARTED",
  629. "CTRL-EVENT-CONNECTED"], timeout=10)
  630. if ev is None:
  631. raise Exception("Roaming with the AP timed out")
  632. if "CTRL-EVENT-EAP-STARTED" in ev:
  633. raise Exception("Unexpected EAP exchange")
  634. pmksa2 = sta.get_pmksa(bssid2)
  635. if pmksa2 is None:
  636. raise Exception("No PMKSA cache entry created")
  637. sta.dump_monitor()
  638. logger.info("Roam back to AP1")
  639. for sta in [ dev[0], dev[1], dev[2], wpas ]:
  640. sta.dump_monitor()
  641. sta.scan_for_bss(bssid, freq="2412")
  642. sta.request("ROAM " + bssid)
  643. ev = sta.wait_event(["CTRL-EVENT-EAP-STARTED",
  644. "CTRL-EVENT-CONNECTED"], timeout=10)
  645. if ev is None:
  646. raise Exception("Roaming with the AP timed out")
  647. if "CTRL-EVENT-EAP-STARTED" in ev:
  648. raise Exception("Unexpected EAP exchange")
  649. def test_pmksa_cache_preauth_oom(dev, apdev):
  650. """RSN pre-authentication to generate PMKSA cache entry and OOM"""
  651. try:
  652. _test_pmksa_cache_preauth_oom(dev, apdev)
  653. finally:
  654. hostapd.cmd_execute(apdev[0], ['ip', 'link', 'set', 'dev', 'ap-br0',
  655. 'down'])
  656. hostapd.cmd_execute(apdev[0], ['brctl', 'delbr', 'ap-br0'])
  657. def _test_pmksa_cache_preauth_oom(dev, apdev):
  658. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  659. params['bridge'] = 'ap-br0'
  660. hapd = hostapd.add_ap(apdev[0], params)
  661. hostapd.cmd_execute(apdev[0], ['brctl', 'setfd', 'ap-br0', '0'])
  662. hostapd.cmd_execute(apdev[0], ['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
  663. eap_connect(dev[0], hapd, "PAX", "pax.user@example.com",
  664. password_hex="0123456789abcdef0123456789abcdef",
  665. bssid=apdev[0]['bssid'])
  666. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  667. params['bridge'] = 'ap-br0'
  668. params['rsn_preauth'] = '1'
  669. params['rsn_preauth_interfaces'] = 'ap-br0'
  670. hapd = hostapd.add_ap(apdev[1], params)
  671. bssid1 = apdev[1]['bssid']
  672. tests = [ (1, "rsn_preauth_receive"),
  673. (2, "rsn_preauth_receive"),
  674. (1, "rsn_preauth_send"),
  675. (1, "wpa_auth_pmksa_add_preauth;rsn_preauth_finished") ]
  676. for test in tests:
  677. hapd.request("DEAUTHENTICATE ff:ff:ff:ff:ff:ff")
  678. with alloc_fail(hapd, test[0], test[1]):
  679. dev[0].scan_for_bss(bssid1, freq="2412")
  680. if "OK" not in dev[0].request("PREAUTH " + bssid1):
  681. raise Exception("PREAUTH failed")
  682. success = False
  683. count = 0
  684. for i in range(50):
  685. time.sleep(0.1)
  686. pmksa = dev[0].get_pmksa(bssid1)
  687. if pmksa:
  688. success = True
  689. break
  690. state = hapd.request('GET_ALLOC_FAIL')
  691. if state.startswith('0:'):
  692. count += 1
  693. if count > 2:
  694. break
  695. logger.info("PMKSA cache success: " + str(success))
  696. dev[0].request("PMKSA_FLUSH")
  697. dev[0].wait_disconnected()
  698. dev[0].wait_connected()
  699. dev[0].dump_monitor()
  700. def test_pmksa_cache_size_limit(dev, apdev):
  701. """PMKSA cache size limit in wpa_supplicant"""
  702. try:
  703. _test_pmksa_cache_size_limit(dev, apdev)
  704. finally:
  705. try:
  706. hapd = hostapd.HostapdGlobal(apdev[0])
  707. hapd.flush()
  708. hapd.remove(apdev[0]['ifname'])
  709. except:
  710. pass
  711. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  712. bssid = apdev[0]['bssid']
  713. params['bssid'] = bssid
  714. hostapd.add_ap(apdev[0], params)
  715. def _test_pmksa_cache_size_limit(dev, apdev):
  716. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  717. id = dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  718. eap="GPSK", identity="gpsk user",
  719. password="abcdefghijklmnop0123456789abcdef",
  720. scan_freq="2412", only_add_network=True)
  721. for i in range(33):
  722. bssid = apdev[0]['bssid'][0:15] + "%02x" % i
  723. logger.info("Iteration with BSSID " + bssid)
  724. params['bssid'] = bssid
  725. hostapd.add_ap(apdev[0], params)
  726. dev[0].request("BSS_FLUSH 0")
  727. dev[0].scan_for_bss(bssid, freq=2412, only_new=True)
  728. dev[0].select_network(id)
  729. dev[0].wait_connected()
  730. dev[0].request("DISCONNECT")
  731. dev[0].wait_disconnected()
  732. dev[0].dump_monitor()
  733. entries = len(dev[0].request("PMKSA").splitlines()) - 1
  734. if i == 32:
  735. if entries != 32:
  736. raise Exception("Unexpected number of PMKSA entries after expected removal of the oldest entry")
  737. elif i + 1 != entries:
  738. raise Exception("Unexpected number of PMKSA entries")
  739. hapd = hostapd.HostapdGlobal(apdev[0])
  740. hapd.flush()
  741. hapd.remove(apdev[0]['ifname'])
  742. def test_pmksa_cache_preauth_timeout(dev, apdev):
  743. """RSN pre-authentication timing out"""
  744. try:
  745. _test_pmksa_cache_preauth_timeout(dev, apdev)
  746. finally:
  747. dev[0].request("SET dot11RSNAConfigSATimeout 60")
  748. def _test_pmksa_cache_preauth_timeout(dev, apdev):
  749. dev[0].request("SET dot11RSNAConfigSATimeout 1")
  750. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  751. hapd = hostapd.add_ap(apdev[0], params)
  752. eap_connect(dev[0], hapd, "PAX", "pax.user@example.com",
  753. password_hex="0123456789abcdef0123456789abcdef",
  754. bssid=apdev[0]['bssid'])
  755. if "OK" not in dev[0].request("PREAUTH f2:11:22:33:44:55"):
  756. raise Exception("PREAUTH failed")
  757. ev = dev[0].wait_event(["RSN: pre-authentication with"], timeout=5)
  758. if ev is None:
  759. raise Exception("No timeout event seen")
  760. if "timed out" not in ev:
  761. raise Exception("Unexpected event: " + ev)
  762. def test_pmksa_cache_preauth_wpas_oom(dev, apdev):
  763. """RSN pre-authentication OOM in wpa_supplicant"""
  764. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  765. hapd = hostapd.add_ap(apdev[0], params)
  766. eap_connect(dev[0], hapd, "PAX", "pax.user@example.com",
  767. password_hex="0123456789abcdef0123456789abcdef",
  768. bssid=apdev[0]['bssid'])
  769. for i in range(1, 11):
  770. with alloc_fail(dev[0], i, "rsn_preauth_init"):
  771. res = dev[0].request("PREAUTH f2:11:22:33:44:55").strip()
  772. logger.info("Iteration %d - PREAUTH command results: %s" % (i, res))
  773. for j in range(10):
  774. state = dev[0].request('GET_ALLOC_FAIL')
  775. if state.startswith('0:'):
  776. break
  777. time.sleep(0.05)
  778. def test_pmksa_cache_ctrl(dev, apdev):
  779. """PMKSA cache control interface operations"""
  780. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  781. hapd = hostapd.add_ap(apdev[0], params)
  782. bssid = apdev[0]['bssid']
  783. addr = dev[0].own_addr()
  784. dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  785. eap="GPSK", identity="gpsk user",
  786. password="abcdefghijklmnop0123456789abcdef",
  787. scan_freq="2412")
  788. pmksa_sta = dev[0].get_pmksa(bssid)
  789. if pmksa_sta is None:
  790. raise Exception("No PMKSA cache entry created on STA")
  791. pmksa_ap = hapd.get_pmksa(addr)
  792. if pmksa_ap is None:
  793. raise Exception("No PMKSA cache entry created on AP")
  794. if pmksa_sta['pmkid'] != pmksa_ap['pmkid']:
  795. raise Exception("PMKID mismatch in PMKSA cache entries")
  796. if "OK" not in hapd.request("PMKSA_FLUSH"):
  797. raise Exception("PMKSA_FLUSH failed")
  798. pmksa_ap = hapd.get_pmksa(addr)
  799. if pmksa_ap is not None:
  800. raise Exception("PMKSA cache entry was not removed on AP")
  801. dev[0].request("DISCONNECT")
  802. dev[0].wait_disconnected()
  803. dev[0].request("RECONNECT")
  804. dev[0].wait_connected()
  805. pmksa_sta2 = dev[0].get_pmksa(bssid)
  806. if pmksa_sta2 is None:
  807. raise Exception("No PMKSA cache entry created on STA after reconnect")
  808. pmksa_ap2 = hapd.get_pmksa(addr)
  809. if pmksa_ap2 is None:
  810. raise Exception("No PMKSA cache entry created on AP after reconnect")
  811. if pmksa_sta2['pmkid'] != pmksa_ap2['pmkid']:
  812. raise Exception("PMKID mismatch in PMKSA cache entries after reconnect")
  813. if pmksa_sta2['pmkid'] == pmksa_sta['pmkid']:
  814. raise Exception("PMKID did not change after reconnect")
  815. def test_pmksa_cache_ctrl_events(dev, apdev):
  816. """PMKSA cache control interface events"""
  817. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  818. hapd = hostapd.add_ap(apdev[0], params)
  819. bssid = apdev[0]['bssid']
  820. id = dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  821. eap="GPSK", identity="gpsk user",
  822. password="abcdefghijklmnop0123456789abcdef",
  823. scan_freq="2412", wait_connect=False)
  824. ev = dev[0].wait_event(["PMKSA-CACHE-ADDED"], timeout=15)
  825. if ev is None:
  826. raise Exception("No PMKSA-CACHE-ADDED event")
  827. dev[0].wait_connected()
  828. items = ev.split(' ')
  829. if items[1] != bssid:
  830. raise Exception("BSSID mismatch: " + ev)
  831. if int(items[2]) != id:
  832. raise Exception("network_id mismatch: " + ev)
  833. dev[0].request("PMKSA_FLUSH")
  834. ev = dev[0].wait_event(["PMKSA-CACHE-REMOVED"], timeout=15)
  835. if ev is None:
  836. raise Exception("No PMKSA-CACHE-REMOVED event")
  837. dev[0].wait_disconnected()
  838. dev[0].request("DISCONNECT")
  839. items = ev.split(' ')
  840. if items[1] != bssid:
  841. raise Exception("BSSID mismatch: " + ev)
  842. if int(items[2]) != id:
  843. raise Exception("network_id mismatch: " + ev)
  844. def test_pmksa_cache_ctrl_ext(dev, apdev):
  845. """PMKSA cache control interface for external management"""
  846. params = hostapd.wpa2_eap_params(ssid="test-pmksa-cache")
  847. hapd = hostapd.add_ap(apdev[0], params)
  848. bssid = apdev[0]['bssid']
  849. id = dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  850. eap="GPSK", identity="gpsk user",
  851. password="abcdefghijklmnop0123456789abcdef",
  852. scan_freq="2412")
  853. res1 = dev[0].request("PMKSA_GET %d" % id)
  854. logger.info("PMKSA_GET: " + res1)
  855. if "UNKNOWN COMMAND" in res1:
  856. raise HwsimSkip("PMKSA_GET not supported in the build")
  857. if bssid not in res1:
  858. raise Exception("PMKSA cache entry missing")
  859. hostapd.add_ap(apdev[1], params)
  860. bssid2 = apdev[1]['bssid']
  861. dev[0].scan_for_bss(bssid2, freq=2412, force_scan=True)
  862. dev[0].request("ROAM " + bssid2)
  863. dev[0].wait_connected()
  864. res2 = dev[0].request("PMKSA_GET %d" % id)
  865. logger.info("PMKSA_GET: " + res2)
  866. if bssid not in res2:
  867. raise Exception("PMKSA cache entry 1 missing")
  868. if bssid2 not in res2:
  869. raise Exception("PMKSA cache entry 2 missing")
  870. dev[0].request("REMOVE_NETWORK all")
  871. dev[0].wait_disconnected()
  872. dev[0].request("PMKSA_FLUSH")
  873. id = dev[0].connect("test-pmksa-cache", proto="RSN", key_mgmt="WPA-EAP",
  874. eap="GPSK", identity="gpsk user",
  875. password="abcdefghijklmnop0123456789abcdef",
  876. scan_freq="2412", only_add_network=True)
  877. res3 = dev[0].request("PMKSA_GET %d" % id)
  878. if res3 != '':
  879. raise Exception("Unexpected PMKSA cache entry remains: " + res3)
  880. res4 = dev[0].request("PMKSA_GET %d" % (id + 1234))
  881. if not res4.startswith('FAIL'):
  882. raise Exception("Unexpected PMKSA cache entry for unknown network: " + res4)
  883. for entry in res2.splitlines():
  884. if "OK" not in dev[0].request("PMKSA_ADD %d %s" % (id, entry)):
  885. raise Exception("Failed to add PMKSA entry")
  886. dev[0].select_network(id)
  887. ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
  888. "CTRL-EVENT-CONNECTED"], timeout=15)
  889. if ev is None:
  890. raise Exception("Connection with the AP timed out")
  891. if "CTRL-EVENT-EAP-STARTED" in ev:
  892. raise Exception("Unexpected EAP exchange after external PMKSA cache restore")
  893. def test_rsn_preauth_processing(dev, apdev):
  894. """RSN pre-authentication processing on AP"""
  895. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  896. params['rsn_preauth'] = '1'
  897. params['rsn_preauth_interfaces'] = "lo"
  898. hapd = hostapd.add_ap(apdev[0], params)
  899. bssid = hapd.own_addr()
  900. _bssid = binascii.unhexlify(bssid.replace(':', ''))
  901. eap_connect(dev[0], hapd, "PAX", "pax.user@example.com",
  902. password_hex="0123456789abcdef0123456789abcdef")
  903. addr = dev[0].own_addr()
  904. _addr = binascii.unhexlify(addr.replace(':', ''))
  905. sock = socket.socket(socket.AF_PACKET, socket.SOCK_RAW,
  906. socket.htons(0x88c7))
  907. sock.bind(("lo", socket.htons(0x88c7)))
  908. foreign = "\x02\x03\x04\x05\x06\x07"
  909. proto = "\x88\xc7"
  910. tests = []
  911. # RSN: too short pre-auth packet (len=14)
  912. tests += [ _bssid + foreign + proto ]
  913. # Not EAPOL-Start
  914. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 0, 0, 0) ]
  915. # RSN: pre-auth for foreign address 02:03:04:05:06:07
  916. tests += [ foreign + foreign + proto + struct.pack('>BBH', 0, 0, 0) ]
  917. # RSN: pre-auth for already association STA 02:00:00:00:00:00
  918. tests += [ _bssid + _addr + proto + struct.pack('>BBH', 0, 0, 0) ]
  919. # New STA
  920. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 0, 1, 1) ]
  921. # IEEE 802.1X: received EAPOL-Start from STA
  922. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 0, 1, 0) ]
  923. # frame too short for this IEEE 802.1X packet
  924. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 0, 1, 1) ]
  925. # EAPOL-Key - Dropped key data from unauthorized Supplicant
  926. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 2, 3, 0) ]
  927. # EAPOL-Encapsulated-ASF-Alert
  928. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 2, 4, 0) ]
  929. # unknown IEEE 802.1X packet type
  930. tests += [ _bssid + foreign + proto + struct.pack('>BBH', 2, 255, 0) ]
  931. for t in tests:
  932. sock.send(t)
  933. def test_rsn_preauth_local_errors(dev, apdev):
  934. """RSN pre-authentication and local errors on AP"""
  935. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  936. params['rsn_preauth'] = '1'
  937. params['rsn_preauth_interfaces'] = "lo"
  938. hapd = hostapd.add_ap(apdev[0], params)
  939. bssid = hapd.own_addr()
  940. _bssid = binascii.unhexlify(bssid.replace(':', ''))
  941. sock = socket.socket(socket.AF_PACKET, socket.SOCK_RAW,
  942. socket.htons(0x88c7))
  943. sock.bind(("lo", socket.htons(0x88c7)))
  944. foreign = "\x02\x03\x04\x05\x06\x07"
  945. foreign2 = "\x02\x03\x04\x05\x06\x08"
  946. proto = "\x88\xc7"
  947. with alloc_fail(hapd, 1, "ap_sta_add;rsn_preauth_receive"):
  948. sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0))
  949. wait_fail_trigger(hapd, "GET_ALLOC_FAIL")
  950. with alloc_fail(hapd, 1, "eapol_auth_alloc;rsn_preauth_receive"):
  951. sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0))
  952. wait_fail_trigger(hapd, "GET_ALLOC_FAIL")
  953. sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0))
  954. with alloc_fail(hapd, 1, "eap_server_sm_init;ieee802_1x_new_station;rsn_preauth_receive"):
  955. sock.send(_bssid + foreign2 + proto + struct.pack('>BBH', 2, 1, 0))
  956. wait_fail_trigger(hapd, "GET_ALLOC_FAIL")
  957. sock.send(_bssid + foreign2 + proto + struct.pack('>BBH', 2, 1, 0))
  958. hapd.request("DISABLE")
  959. tests = [ (1, "=rsn_preauth_iface_add"),
  960. (2, "=rsn_preauth_iface_add"),
  961. (1, "l2_packet_init;rsn_preauth_iface_add"),
  962. (1, "rsn_preauth_iface_init"),
  963. (1, "rsn_preauth_iface_init") ]
  964. for count,func in tests:
  965. with alloc_fail(hapd, count, func):
  966. if "FAIL" not in hapd.request("ENABLE"):
  967. raise Exception("ENABLE succeeded unexpectedly")
  968. hapd.set("rsn_preauth_interfaces", "lo lo lo does-not-exist lo ")
  969. if "FAIL" not in hapd.request("ENABLE"):
  970. raise Exception("ENABLE succeeded unexpectedly")
  971. hapd.set("rsn_preauth_interfaces", " lo lo ")
  972. if "OK" not in hapd.request("ENABLE"):
  973. raise Exception("ENABLE failed")
  974. sock.send(_bssid + foreign + proto + struct.pack('>BBH', 2, 1, 0))
  975. sock.send(_bssid + foreign2 + proto + struct.pack('>BBH', 2, 1, 0))