test_peerkey.py 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. # PeerKey tests
  2. # Copyright (c) 2013-2016, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. from remotehost import remote_compatible
  7. import logging
  8. logger = logging.getLogger()
  9. import os
  10. import time
  11. import hwsim_utils
  12. import hostapd
  13. from utils import skip_with_fips
  14. from wlantest import Wlantest
  15. from tshark import run_tshark
  16. @remote_compatible
  17. def test_peerkey(dev, apdev):
  18. """RSN AP and PeerKey between two STAs"""
  19. ssid = "test-peerkey"
  20. passphrase = "12345678"
  21. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  22. params['peerkey'] = "1"
  23. hostapd.add_ap(apdev[0], params)
  24. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  25. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  26. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  27. dev[0].request("STKSTART " + dev[1].p2p_interface_addr())
  28. time.sleep(0.5)
  29. # NOTE: Actual use of the direct link (DLS) is not supported in
  30. # mac80211_hwsim, so this operation fails at setting the keys after
  31. # successfully completed 4-way handshake. This test case does allow the
  32. # key negotiation part to be tested for coverage, though.
  33. def test_peerkey_sniffer_check(dev, apdev, params):
  34. """RSN AP and PeerKey between two STAs with sniffer check"""
  35. ssid = "test-peerkey"
  36. passphrase = "12345678"
  37. hparams = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  38. hparams['peerkey'] = "1"
  39. hapd = hostapd.add_ap(apdev[0], hparams)
  40. Wlantest.setup(hapd)
  41. wt = Wlantest()
  42. wt.flush()
  43. wt.add_passphrase("12345678")
  44. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  45. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  46. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  47. dev[0].request("STKSTART " + dev[1].p2p_interface_addr())
  48. time.sleep(1)
  49. # NOTE: Actual use of the direct link (DLS) is not supported in
  50. # mac80211_hwsim, so this operation fails at setting the keys after
  51. # successfully completed 4-way handshake. This test case does allow the
  52. # key negotiation part to be tested for coverage, though. Use sniffer to
  53. # verify that all the SMK and STK handshake messages were transmitted.
  54. bssid = hapd.own_addr()
  55. addr0 = dev[0].own_addr()
  56. addr1 = dev[1].own_addr()
  57. # Wireshark renamed the EAPOL-Key key_info field, so need to try both the
  58. # new and the old name to work with both versions.
  59. try_other = False
  60. try:
  61. out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
  62. "eapol.type == 3",
  63. display=["wlan.sa", "wlan.da",
  64. "wlan_rsna_eapol.keydes.key_info"])
  65. except Exception, e:
  66. if "Unknown tshark field" in str(e):
  67. try_other = True
  68. pass
  69. else:
  70. raise
  71. if try_other:
  72. out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
  73. "eapol.type == 3",
  74. display=["wlan.sa", "wlan.da",
  75. "eapol.keydes.key_info"],
  76. wait=False)
  77. smk = [ False, False, False, False, False ]
  78. stk = [ False, False, False, False ]
  79. for pkt in out.splitlines():
  80. sa, da, key_info = pkt.split('\t')
  81. key_info = int(key_info, 16)
  82. if sa == addr0 and da == bssid and key_info == 0x2b02:
  83. # Initiator -> AP: MIC+Secure+Request+SMK = SMK 1
  84. smk[0] = True
  85. elif sa == bssid and da == addr1 and key_info == 0x2382:
  86. # AP -> Responder: ACK+MIC+Secure+SMK = SMK 2
  87. smk[1] = True
  88. elif sa == addr1 and da == bssid and key_info == 0x2302:
  89. # Responder -> AP: MIC+Secure+SMK = SMK 3
  90. smk[2] = True
  91. elif sa == bssid and da == addr1 and key_info == 0x3342:
  92. # AP -> Responder: Install+MIC+Secure+EncrKeyData+SMK = SMK 4
  93. smk[3] = True
  94. elif sa == bssid and da == addr0 and key_info == 0x3302:
  95. # AP -> Initiator: MIC+Secure+EncrKeyData+SMK = SMK 5
  96. smk[4] = True
  97. elif sa == addr0 and da == addr1 and key_info == 0x008a:
  98. # Initiator -> Responder: Pairwise+ACK = STK 1
  99. stk[0] = True
  100. elif sa == addr1 and da == addr0 and key_info == 0x010a:
  101. # Responder -> Initiator: Pairwise+MIC = STK 2
  102. stk[1] = True
  103. elif sa == addr0 and da == addr1 and key_info == 0x038a:
  104. # Initiator -> Responder: Pairwise+ACK+MIC+Secure = STK 3
  105. stk[2] = True
  106. elif sa == addr1 and da == addr0 and key_info == 0x030a:
  107. # Responder -> Initiator: Pairwise+MIC+Secure = STK 4
  108. stk[3] = True
  109. logger.info("Seen SMK messages: " + str(smk))
  110. logger.info("Seen STK messages: " + str(stk))
  111. if False in smk:
  112. raise Exception("Missing SMK message: " + str(smk))
  113. if False in stk:
  114. raise Exception("Missing STK message: " + str(stk))
  115. def test_peerkey_unknown_peer(dev, apdev):
  116. """RSN AP and PeerKey attempt with unknown peer"""
  117. ssid = "test-peerkey"
  118. passphrase = "12345678"
  119. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  120. params['peerkey'] = "1"
  121. hostapd.add_ap(apdev[0], params)
  122. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  123. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  124. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  125. dev[0].request("STKSTART " + dev[2].p2p_interface_addr())
  126. time.sleep(0.5)
  127. @remote_compatible
  128. def test_peerkey_pairwise_mismatch(dev, apdev):
  129. """RSN TKIP+CCMP AP and PeerKey between two STAs using different ciphers"""
  130. skip_with_fips(dev[0])
  131. ssid = "test-peerkey"
  132. passphrase = "12345678"
  133. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  134. params['peerkey'] = "1"
  135. params['rsn_pairwise'] = "TKIP CCMP"
  136. hapd = hostapd.add_ap(apdev[0], params)
  137. Wlantest.setup(hapd)
  138. wt = Wlantest()
  139. wt.flush()
  140. wt.add_passphrase("12345678")
  141. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True,
  142. pairwise="CCMP")
  143. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True,
  144. pairwise="TKIP")
  145. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  146. dev[0].request("STKSTART " + dev[1].p2p_interface_addr())
  147. time.sleep(0.5)
  148. dev[1].request("STKSTART " + dev[0].p2p_interface_addr())
  149. time.sleep(0.5)