test_ap_pmf.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498
  1. # Protected management frames tests
  2. # Copyright (c) 2013, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. from remotehost import remote_compatible
  7. import time
  8. import logging
  9. logger = logging.getLogger()
  10. import hwsim_utils
  11. import hostapd
  12. from utils import alloc_fail, fail_test, wait_fail_trigger
  13. from wlantest import Wlantest
  14. from wpasupplicant import WpaSupplicant
  15. @remote_compatible
  16. def test_ap_pmf_required(dev, apdev):
  17. """WPA2-PSK AP with PMF required"""
  18. ssid = "test-pmf-required"
  19. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  20. params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
  21. params["ieee80211w"] = "2"
  22. hapd = hostapd.add_ap(apdev[0], params)
  23. Wlantest.setup(hapd)
  24. wt = Wlantest()
  25. wt.flush()
  26. wt.add_passphrase("12345678")
  27. key_mgmt = hapd.get_config()['key_mgmt']
  28. if key_mgmt.split(' ')[0] != "WPA-PSK-SHA256":
  29. raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
  30. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  31. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  32. scan_freq="2412")
  33. if "[WPA2-PSK-SHA256-CCMP]" not in dev[0].request("SCAN_RESULTS"):
  34. raise Exception("Scan results missing RSN element info")
  35. hwsim_utils.test_connectivity(dev[0], hapd)
  36. dev[1].connect(ssid, psk="12345678", ieee80211w="2",
  37. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  38. scan_freq="2412")
  39. hwsim_utils.test_connectivity(dev[1], hapd)
  40. hapd.request("SA_QUERY " + dev[0].p2p_interface_addr())
  41. hapd.request("SA_QUERY " + dev[1].p2p_interface_addr())
  42. wt.require_ap_pmf_mandatory(apdev[0]['bssid'])
  43. wt.require_sta_pmf(apdev[0]['bssid'], dev[0].p2p_interface_addr())
  44. wt.require_sta_pmf_mandatory(apdev[0]['bssid'], dev[1].p2p_interface_addr())
  45. time.sleep(0.1)
  46. if wt.get_sta_counter("valid_saqueryresp_tx", apdev[0]['bssid'],
  47. dev[0].p2p_interface_addr()) < 1:
  48. raise Exception("STA did not reply to SA Query")
  49. if wt.get_sta_counter("valid_saqueryresp_tx", apdev[0]['bssid'],
  50. dev[1].p2p_interface_addr()) < 1:
  51. raise Exception("STA did not reply to SA Query")
  52. @remote_compatible
  53. def test_ap_pmf_optional(dev, apdev):
  54. """WPA2-PSK AP with PMF optional"""
  55. ssid = "test-pmf-optional"
  56. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  57. params["wpa_key_mgmt"] = "WPA-PSK"
  58. params["ieee80211w"] = "1"
  59. hapd = hostapd.add_ap(apdev[0], params)
  60. Wlantest.setup(hapd)
  61. wt = Wlantest()
  62. wt.flush()
  63. wt.add_passphrase("12345678")
  64. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  65. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  66. scan_freq="2412")
  67. hwsim_utils.test_connectivity(dev[0], hapd)
  68. dev[1].connect(ssid, psk="12345678", ieee80211w="2",
  69. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  70. scan_freq="2412")
  71. hwsim_utils.test_connectivity(dev[1], hapd)
  72. wt.require_ap_pmf_optional(apdev[0]['bssid'])
  73. wt.require_sta_pmf(apdev[0]['bssid'], dev[0].p2p_interface_addr())
  74. wt.require_sta_pmf_mandatory(apdev[0]['bssid'], dev[1].p2p_interface_addr())
  75. @remote_compatible
  76. def test_ap_pmf_optional_2akm(dev, apdev):
  77. """WPA2-PSK AP with PMF optional (2 AKMs)"""
  78. ssid = "test-pmf-optional-2akm"
  79. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  80. params["wpa_key_mgmt"] = "WPA-PSK WPA-PSK-SHA256"
  81. params["ieee80211w"] = "1"
  82. hapd = hostapd.add_ap(apdev[0], params)
  83. Wlantest.setup(hapd)
  84. wt = Wlantest()
  85. wt.flush()
  86. wt.add_passphrase("12345678")
  87. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  88. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  89. scan_freq="2412")
  90. hwsim_utils.test_connectivity(dev[0], hapd)
  91. dev[1].connect(ssid, psk="12345678", ieee80211w="2",
  92. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  93. scan_freq="2412")
  94. hwsim_utils.test_connectivity(dev[1], hapd)
  95. wt.require_ap_pmf_optional(apdev[0]['bssid'])
  96. wt.require_sta_pmf(apdev[0]['bssid'], dev[0].p2p_interface_addr())
  97. wt.require_sta_key_mgmt(apdev[0]['bssid'], dev[0].p2p_interface_addr(),
  98. "PSK-SHA256")
  99. wt.require_sta_pmf_mandatory(apdev[0]['bssid'], dev[1].p2p_interface_addr())
  100. wt.require_sta_key_mgmt(apdev[0]['bssid'], dev[1].p2p_interface_addr(),
  101. "PSK-SHA256")
  102. @remote_compatible
  103. def test_ap_pmf_negative(dev, apdev):
  104. """WPA2-PSK AP without PMF (negative test)"""
  105. ssid = "test-pmf-negative"
  106. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  107. hapd = hostapd.add_ap(apdev[0], params)
  108. Wlantest.setup(hapd)
  109. wt = Wlantest()
  110. wt.flush()
  111. wt.add_passphrase("12345678")
  112. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  113. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  114. scan_freq="2412")
  115. hwsim_utils.test_connectivity(dev[0], hapd)
  116. try:
  117. dev[1].connect(ssid, psk="12345678", ieee80211w="2",
  118. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  119. scan_freq="2412")
  120. hwsim_utils.test_connectivity(dev[1], hapd)
  121. raise Exception("PMF required STA connected to no PMF AP")
  122. except Exception, e:
  123. logger.debug("Ignore expected exception: " + str(e))
  124. wt.require_ap_no_pmf(apdev[0]['bssid'])
  125. @remote_compatible
  126. def test_ap_pmf_assoc_comeback(dev, apdev):
  127. """WPA2-PSK AP with PMF association comeback"""
  128. ssid = "assoc-comeback"
  129. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  130. params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
  131. params["ieee80211w"] = "2"
  132. hapd = hostapd.add_ap(apdev[0], params)
  133. Wlantest.setup(hapd)
  134. wt = Wlantest()
  135. wt.flush()
  136. wt.add_passphrase("12345678")
  137. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  138. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  139. scan_freq="2412")
  140. hapd.set("ext_mgmt_frame_handling", "1")
  141. dev[0].request("DISCONNECT")
  142. dev[0].wait_disconnected(timeout=10)
  143. hapd.set("ext_mgmt_frame_handling", "0")
  144. dev[0].request("REASSOCIATE")
  145. dev[0].wait_connected(timeout=10, error="Timeout on re-connection")
  146. if wt.get_sta_counter("assocresp_comeback", apdev[0]['bssid'],
  147. dev[0].p2p_interface_addr()) < 1:
  148. raise Exception("AP did not use association comeback request")
  149. @remote_compatible
  150. def test_ap_pmf_assoc_comeback2(dev, apdev):
  151. """WPA2-PSK AP with PMF association comeback (using DROP_SA)"""
  152. ssid = "assoc-comeback"
  153. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  154. params["wpa_key_mgmt"] = "WPA-PSK"
  155. params["ieee80211w"] = "1"
  156. hapd = hostapd.add_ap(apdev[0], params)
  157. Wlantest.setup(hapd)
  158. wt = Wlantest()
  159. wt.flush()
  160. wt.add_passphrase("12345678")
  161. dev[0].connect(ssid, psk="12345678", ieee80211w="2",
  162. key_mgmt="WPA-PSK", proto="WPA2", scan_freq="2412")
  163. if "OK" not in dev[0].request("DROP_SA"):
  164. raise Exception("DROP_SA failed")
  165. dev[0].request("REASSOCIATE")
  166. dev[0].wait_connected(timeout=10, error="Timeout on re-connection")
  167. if wt.get_sta_counter("reassocresp_comeback", apdev[0]['bssid'],
  168. dev[0].p2p_interface_addr()) < 1:
  169. raise Exception("AP did not use reassociation comeback request")
  170. def start_wpas_ap(ssid):
  171. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  172. wpas.interface_add("wlan5", drv_params="use_monitor=1")
  173. id = wpas.add_network()
  174. wpas.set_network(id, "mode", "2")
  175. wpas.set_network_quoted(id, "ssid", ssid)
  176. wpas.set_network(id, "proto", "WPA2")
  177. wpas.set_network(id, "key_mgmt", "WPA-PSK-SHA256")
  178. wpas.set_network(id, "ieee80211w", "2")
  179. wpas.set_network_quoted(id, "psk", "12345678")
  180. wpas.set_network(id, "pairwise", "CCMP")
  181. wpas.set_network(id, "group", "CCMP")
  182. wpas.set_network(id, "frequency", "2412")
  183. wpas.set_network(id, "scan_freq", "2412")
  184. wpas.connect_network(id)
  185. wpas.dump_monitor()
  186. return wpas
  187. def test_ap_pmf_sta_sa_query(dev, apdev):
  188. """WPA2-PSK AP with station using SA Query"""
  189. ssid = "assoc-comeback"
  190. addr = dev[0].own_addr()
  191. wpas = start_wpas_ap(ssid)
  192. bssid = wpas.own_addr()
  193. Wlantest.setup(wpas)
  194. wt = Wlantest()
  195. wt.flush()
  196. wt.add_passphrase("12345678")
  197. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  198. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  199. scan_freq="2412")
  200. wpas.dump_monitor()
  201. wpas.request("DEAUTHENTICATE " + addr + " test=0")
  202. wpas.dump_monitor()
  203. wpas.request("DISASSOCIATE " + addr + " test=0")
  204. wpas.dump_monitor()
  205. ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=1)
  206. if ev is not None:
  207. raise Exception("Unexpected disconnection")
  208. wpas.request("DEAUTHENTICATE " + addr + " reason=6 test=0")
  209. wpas.dump_monitor()
  210. wpas.request("DISASSOCIATE " + addr + " reason=7 test=0")
  211. wpas.dump_monitor()
  212. ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=1)
  213. if ev is not None:
  214. raise Exception("Unexpected disconnection")
  215. if wt.get_sta_counter("valid_saqueryreq_tx", bssid, addr) < 1:
  216. raise Exception("STA did not send SA Query")
  217. if wt.get_sta_counter("valid_saqueryresp_rx", bssid, addr) < 1:
  218. raise Exception("AP did not reply to SA Query")
  219. wpas.dump_monitor()
  220. def test_ap_pmf_sta_sa_query_no_response(dev, apdev):
  221. """WPA2-PSK AP with station using SA Query and getting no response"""
  222. ssid = "assoc-comeback"
  223. addr = dev[0].own_addr()
  224. wpas = start_wpas_ap(ssid)
  225. bssid = wpas.own_addr()
  226. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  227. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  228. scan_freq="2412")
  229. wpas.dump_monitor()
  230. wpas.request("DEAUTHENTICATE " + addr + " test=0")
  231. wpas.dump_monitor()
  232. wpas.request("DISASSOCIATE " + addr + " test=0")
  233. wpas.dump_monitor()
  234. ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=1)
  235. if ev is not None:
  236. raise Exception("Unexpected disconnection")
  237. wpas.request("SET ext_mgmt_frame_handling 1")
  238. wpas.request("DEAUTHENTICATE " + addr + " reason=6 test=0")
  239. wpas.dump_monitor()
  240. wpas.request("DISASSOCIATE " + addr + " reason=7 test=0")
  241. wpas.dump_monitor()
  242. dev[0].wait_disconnected()
  243. wpas.dump_monitor()
  244. wpas.request("SET ext_mgmt_frame_handling 0")
  245. dev[0].wait_connected()
  246. wpas.dump_monitor()
  247. def test_ap_pmf_sta_unprot_deauth_burst(dev, apdev):
  248. """WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames"""
  249. ssid = "deauth-attack"
  250. addr = dev[0].own_addr()
  251. wpas = start_wpas_ap(ssid)
  252. bssid = wpas.own_addr()
  253. Wlantest.setup(wpas)
  254. wt = Wlantest()
  255. wt.flush()
  256. wt.add_passphrase("12345678")
  257. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  258. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  259. scan_freq="2412")
  260. for i in range(0, 10):
  261. wpas.request("DEAUTHENTICATE " + addr + " reason=6 test=0")
  262. wpas.request("DISASSOCIATE " + addr + " reason=7 test=0")
  263. ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=1)
  264. if ev is not None:
  265. raise Exception("Unexpected disconnection")
  266. num_req = wt.get_sta_counter("valid_saqueryreq_tx", bssid, addr)
  267. num_resp = wt.get_sta_counter("valid_saqueryresp_rx", bssid, addr)
  268. if num_req < 1:
  269. raise Exception("STA did not send SA Query")
  270. if num_resp < 1:
  271. raise Exception("AP did not reply to SA Query")
  272. if num_req > 1:
  273. raise Exception("STA initiated too many SA Query procedures (%d)" % num_req)
  274. time.sleep(10)
  275. for i in range(0, 5):
  276. wpas.request("DEAUTHENTICATE " + addr + " reason=6 test=0")
  277. wpas.request("DISASSOCIATE " + addr + " reason=7 test=0")
  278. ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=1)
  279. if ev is not None:
  280. raise Exception("Unexpected disconnection")
  281. num_req = wt.get_sta_counter("valid_saqueryreq_tx", bssid, addr)
  282. num_resp = wt.get_sta_counter("valid_saqueryresp_rx", bssid, addr)
  283. if num_req != 2 or num_resp != 2:
  284. raise Exception("Unexpected number of SA Query procedures (req=%d resp=%d)" % (num_req, num_resp))
  285. def test_ap_pmf_sta_sa_query_oom(dev, apdev):
  286. """WPA2-PSK AP with station using SA Query (OOM)"""
  287. ssid = "assoc-comeback"
  288. addr = dev[0].own_addr()
  289. wpas = start_wpas_ap(ssid)
  290. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  291. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  292. scan_freq="2412")
  293. with alloc_fail(dev[0], 1, "=sme_sa_query_timer"):
  294. wpas.request("DEAUTHENTICATE " + addr + " reason=6 test=0")
  295. wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
  296. dev[0].request("DISCONNECT")
  297. wpas.request("DISCONNECT")
  298. dev[0].wait_disconnected()
  299. def test_ap_pmf_sta_sa_query_local_failure(dev, apdev):
  300. """WPA2-PSK AP with station using SA Query (local failure)"""
  301. ssid = "assoc-comeback"
  302. addr = dev[0].own_addr()
  303. wpas = start_wpas_ap(ssid)
  304. dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  305. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  306. scan_freq="2412")
  307. with fail_test(dev[0], 1, "os_get_random;sme_sa_query_timer"):
  308. wpas.request("DEAUTHENTICATE " + addr + " reason=6 test=0")
  309. wait_fail_trigger(dev[0], "GET_FAIL")
  310. dev[0].request("DISCONNECT")
  311. wpas.request("DISCONNECT")
  312. dev[0].wait_disconnected()
  313. def test_ap_pmf_required_eap(dev, apdev):
  314. """WPA2-EAP AP with PMF required"""
  315. ssid = "test-pmf-required-eap"
  316. params = hostapd.wpa2_eap_params(ssid=ssid)
  317. params["wpa_key_mgmt"] = "WPA-EAP-SHA256"
  318. params["ieee80211w"] = "2"
  319. hapd = hostapd.add_ap(apdev[0], params)
  320. key_mgmt = hapd.get_config()['key_mgmt']
  321. if key_mgmt.split(' ')[0] != "WPA-EAP-SHA256":
  322. raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
  323. dev[0].connect("test-pmf-required-eap", key_mgmt="WPA-EAP-SHA256",
  324. ieee80211w="2", eap="PSK", identity="psk.user@example.com",
  325. password_hex="0123456789abcdef0123456789abcdef",
  326. scan_freq="2412")
  327. dev[1].connect("test-pmf-required-eap", key_mgmt="WPA-EAP WPA-EAP-SHA256",
  328. ieee80211w="1", eap="PSK", identity="psk.user@example.com",
  329. password_hex="0123456789abcdef0123456789abcdef",
  330. scan_freq="2412")
  331. def test_ap_pmf_optional_eap(dev, apdev):
  332. """WPA2EAP AP with PMF optional"""
  333. params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
  334. params["ieee80211w"] = "1"
  335. hapd = hostapd.add_ap(apdev[0], params)
  336. dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TTLS",
  337. identity="pap user", anonymous_identity="ttls",
  338. password="password",
  339. ca_cert="auth_serv/ca.pem", phase2="auth=PAP",
  340. ieee80211w="1", scan_freq="2412")
  341. dev[1].connect("test-wpa2-eap", key_mgmt="WPA-EAP WPA-EAP-SHA256",
  342. eap="TTLS", identity="pap user", anonymous_identity="ttls",
  343. password="password",
  344. ca_cert="auth_serv/ca.pem", phase2="auth=PAP",
  345. ieee80211w="2", scan_freq="2412")
  346. @remote_compatible
  347. def test_ap_pmf_required_sha1(dev, apdev):
  348. """WPA2-PSK AP with PMF required with SHA1 AKM"""
  349. ssid = "test-pmf-required-sha1"
  350. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  351. params["wpa_key_mgmt"] = "WPA-PSK"
  352. params["ieee80211w"] = "2"
  353. hapd = hostapd.add_ap(apdev[0], params)
  354. Wlantest.setup(hapd)
  355. wt = Wlantest()
  356. wt.flush()
  357. wt.add_passphrase("12345678")
  358. key_mgmt = hapd.get_config()['key_mgmt']
  359. if key_mgmt.split(' ')[0] != "WPA-PSK":
  360. raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
  361. dev[0].connect(ssid, psk="12345678", ieee80211w="2",
  362. key_mgmt="WPA-PSK", proto="WPA2", scan_freq="2412")
  363. if "[WPA2-PSK-CCMP]" not in dev[0].request("SCAN_RESULTS"):
  364. raise Exception("Scan results missing RSN element info")
  365. hwsim_utils.test_connectivity(dev[0], hapd)
  366. @remote_compatible
  367. def test_ap_pmf_toggle(dev, apdev):
  368. """WPA2-PSK AP with PMF optional and changing PMF on reassociation"""
  369. try:
  370. _test_ap_pmf_toggle(dev, apdev)
  371. finally:
  372. dev[0].request("SET reassoc_same_bss_optim 0")
  373. def _test_ap_pmf_toggle(dev, apdev):
  374. ssid = "test-pmf-optional"
  375. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  376. params["wpa_key_mgmt"] = "WPA-PSK"
  377. params["ieee80211w"] = "1"
  378. params["assoc_sa_query_max_timeout"] = "1"
  379. params["assoc_sa_query_retry_timeout"] = "1"
  380. hapd = hostapd.add_ap(apdev[0], params)
  381. Wlantest.setup(hapd)
  382. wt = Wlantest()
  383. wt.flush()
  384. wt.add_passphrase("12345678")
  385. bssid = apdev[0]['bssid']
  386. addr = dev[0].own_addr()
  387. dev[0].request("SET reassoc_same_bss_optim 1")
  388. id = dev[0].connect(ssid, psk="12345678", ieee80211w="1",
  389. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  390. scan_freq="2412")
  391. wt.require_ap_pmf_optional(bssid)
  392. wt.require_sta_pmf(bssid, addr)
  393. sta = hapd.get_sta(addr)
  394. if '[MFP]' not in sta['flags']:
  395. raise Exception("MFP flag not present for STA")
  396. dev[0].set_network(id, "ieee80211w", "0")
  397. dev[0].request("REASSOCIATE")
  398. dev[0].wait_connected()
  399. wt.require_sta_no_pmf(bssid, addr)
  400. sta = hapd.get_sta(addr)
  401. if '[MFP]' in sta['flags']:
  402. raise Exception("MFP flag unexpectedly present for STA")
  403. err, data = hapd.cmd_execute(['iw', 'dev', apdev[0]['ifname'], 'station',
  404. 'get', addr])
  405. if "yes" in [l for l in data.splitlines() if "MFP" in l][0]:
  406. raise Exception("Kernel STA entry had MFP enabled")
  407. dev[0].set_network(id, "ieee80211w", "1")
  408. dev[0].request("REASSOCIATE")
  409. dev[0].wait_connected()
  410. wt.require_sta_pmf(bssid, addr)
  411. sta = hapd.get_sta(addr)
  412. if '[MFP]' not in sta['flags']:
  413. raise Exception("MFP flag not present for STA")
  414. err, data = hapd.cmd_execute(['iw', 'dev', apdev[0]['ifname'], 'station',
  415. 'get', addr])
  416. if "yes" not in [l for l in data.splitlines() if "MFP" in l][0]:
  417. raise Exception("Kernel STA entry did not have MFP enabled")
  418. @remote_compatible
  419. def test_ap_pmf_required_sta_no_pmf(dev, apdev):
  420. """WPA2-PSK AP with PMF required and PMF disabled on STA"""
  421. ssid = "test-pmf-required"
  422. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  423. params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
  424. params["ieee80211w"] = "2"
  425. hapd = hostapd.add_ap(apdev[0], params)
  426. # Disable PMF on the station and try to connect
  427. dev[0].connect(ssid, psk="12345678", ieee80211w="0",
  428. key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
  429. scan_freq="2412", wait_connect=False)
  430. ev = dev[0].wait_event(["CTRL-EVENT-NETWORK-NOT-FOUND",
  431. "CTRL-EVENT-ASSOC-REJECT"], timeout=2)
  432. if ev is None:
  433. raise Exception("No connection result")
  434. if "CTRL-EVENT-ASSOC-REJECT" in ev:
  435. raise Exception("Tried to connect to PMF required AP without PMF enabled")
  436. dev[0].request("REMOVE_NETWORK all")
  437. def test_ap_pmf_inject_auth(dev, apdev):
  438. """WPA2-PSK AP with PMF and Authentication frame injection"""
  439. ssid = "test-pmf"
  440. params = hostapd.wpa2_params(ssid=ssid, passphrase="12345678")
  441. params["wpa_key_mgmt"] = "WPA-PSK-SHA256"
  442. params["ieee80211w"] = "2"
  443. hapd = hostapd.add_ap(apdev[0], params)
  444. dev[0].connect(ssid, psk="12345678", ieee80211w="2",
  445. key_mgmt="WPA-PSK-SHA256", proto="WPA2",
  446. scan_freq="2412")
  447. hwsim_utils.test_connectivity(dev[0], hapd)
  448. bssid = hapd.own_addr().replace(':', '')
  449. addr = dev[0].own_addr().replace(':', '')
  450. # Inject an unprotected Authentication frame claiming to be from the
  451. # associated STA.
  452. auth = "b0003a01" + bssid + addr + bssid + '1000000001000000'
  453. hapd.request("SET ext_mgmt_frame_handling 1")
  454. res = hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=%s" % auth)
  455. hapd.request("SET ext_mgmt_frame_handling 0")
  456. if "OK" not in res:
  457. raise Exception("MGMT_RX_PROCESS failed")
  458. # Verify that original association is still functional.
  459. hwsim_utils.test_connectivity(dev[0], hapd)