123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163 |
- import time
- import subprocess
- import logging
- logger = logging.getLogger()
- import hwsim_utils
- import hostapd
- def test_sae(dev, apdev):
- """SAE with default group"""
- params = hostapd.wpa2_params(ssid="test-sae",
- passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- key_mgmt = hapd.get_config()['key_mgmt']
- if key_mgmt.split(' ')[0] != "SAE":
- raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
- dev[0].request("SET sae_groups ")
- id = dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- if dev[0].get_status_field('sae_group') != '19':
- raise Exception("Expected default SAE group not used")
- bss = dev[0].get_bss(apdev[0]['bssid'])
- if 'flags' not in bss:
- raise Exception("Could not get BSS flags from BSS table")
- if "[WPA2-SAE-CCMP]" not in bss['flags']:
- raise Exception("Unexpected BSS flags: " + bss['flags'])
- def test_sae_pmksa_caching(dev, apdev):
- """SAE and PMKSA caching"""
- params = hostapd.wpa2_params(ssid="test-sae",
- passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET sae_groups ")
- dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- dev[0].request("DISCONNECT")
- dev[0].request("RECONNECT")
- dev[0].wait_connected(timeout=15, error="Reconnect timed out")
- if dev[0].get_status_field('sae_group') is not None:
- raise Exception("SAE group claimed to have been used")
- def test_sae_pmksa_caching_disabled(dev, apdev):
- """SAE and PMKSA caching disabled"""
- params = hostapd.wpa2_params(ssid="test-sae",
- passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- params['disable_pmksa_caching'] = '1'
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET sae_groups ")
- dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- dev[0].request("DISCONNECT")
- dev[0].request("RECONNECT")
- dev[0].wait_connected(timeout=15, error="Reconnect timed out")
- if dev[0].get_status_field('sae_group') != '19':
- raise Exception("Expected default SAE group not used")
- def test_sae_groups(dev, apdev):
- """SAE with all supported groups"""
-
-
-
-
- sae_groups = [ 19, 25, 26, 20, 21, 2, 5, 22, 23, 24 ]
- groups = [str(g) for g in sae_groups]
- params = hostapd.wpa2_params(ssid="test-sae-groups",
- passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- params['sae_groups'] = ' '.join(groups)
- hostapd.add_ap(apdev[0]['ifname'], params)
- for g in groups:
- logger.info("Testing SAE group " + g)
- dev[0].request("SET sae_groups " + g)
- id = dev[0].connect("test-sae-groups", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- if dev[0].get_status_field('sae_group') != g:
- raise Exception("Expected SAE group not used")
- dev[0].remove_network(id)
- def test_sae_group_nego(dev, apdev):
- """SAE group negotiation"""
- params = hostapd.wpa2_params(ssid="test-sae-group-nego",
- passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- params['sae_groups'] = '19'
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET sae_groups 25 26 20 19")
- dev[0].connect("test-sae-group-nego", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- if dev[0].get_status_field('sae_group') != '19':
- raise Exception("Expected SAE group not used")
- def test_sae_anti_clogging(dev, apdev):
- """SAE anti clogging"""
- params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- params['sae_anti_clogging_threshold'] = '1'
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET sae_groups ")
- dev[1].request("SET sae_groups ")
- id = {}
- for i in range(0, 2):
- dev[i].scan(freq="2412")
- id[i] = dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
- scan_freq="2412", only_add_network=True)
- for i in range(0, 2):
- dev[i].select_network(id[i])
- for i in range(0, 2):
- dev[i].wait_connected(timeout=10)
- def test_sae_forced_anti_clogging(dev, apdev):
- """SAE anti clogging (forced)"""
- params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE WPA-PSK'
- params['sae_anti_clogging_threshold'] = '0'
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[2].connect("test-sae", psk="12345678", scan_freq="2412")
- for i in range(0, 2):
- dev[i].request("SET sae_groups ")
- dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- def test_sae_mixed(dev, apdev):
- """Mixed SAE and non-SAE network"""
- params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE WPA-PSK'
- params['sae_anti_clogging_threshold'] = '0'
- hostapd.add_ap(apdev[0]['ifname'], params)
- dev[2].connect("test-sae", psk="12345678", scan_freq="2412")
- for i in range(0, 2):
- dev[i].request("SET sae_groups ")
- dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
- scan_freq="2412")
- def test_sae_missing_password(dev, apdev):
- """SAE and missing password"""
- params = hostapd.wpa2_params(ssid="test-sae",
- passphrase="12345678")
- params['wpa_key_mgmt'] = 'SAE'
- hapd = hostapd.add_ap(apdev[0]['ifname'], params)
- dev[0].request("SET sae_groups ")
- id = dev[0].connect("test-sae",
- raw_psk="46b4a73b8a951ad53ebd2e0afdb9c5483257edd4c21d12b7710759da70945858",
- key_mgmt="SAE", scan_freq="2412", wait_connect=False)
- ev = dev[0].wait_event(['CTRL-EVENT-SSID-TEMP-DISABLED'], timeout=10)
- if ev is None:
- raise Exception("Invalid network not temporarily disabled")
|