test_peerkey.py 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. # PeerKey tests
  2. # Copyright (c) 2013-2016, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. from remotehost import remote_compatible
  7. import logging
  8. logger = logging.getLogger()
  9. import os
  10. import time
  11. import hwsim_utils
  12. import hostapd
  13. from utils import skip_with_fips
  14. from wlantest import Wlantest
  15. from tshark import run_tshark
  16. @remote_compatible
  17. def test_peerkey(dev, apdev):
  18. """RSN AP and PeerKey between two STAs"""
  19. ssid = "test-peerkey"
  20. passphrase = "12345678"
  21. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  22. params['peerkey'] = "1"
  23. hostapd.add_ap(apdev[0], params)
  24. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  25. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  26. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  27. dev[0].request("STKSTART " + dev[1].p2p_interface_addr())
  28. time.sleep(0.5)
  29. # NOTE: Actual use of the direct link (DLS) is not supported in
  30. # mac80211_hwsim, so this operation fails at setting the keys after
  31. # successfully completed 4-way handshake. This test case does allow the
  32. # key negotiation part to be tested for coverage, though.
  33. def test_peerkey_sniffer_check(dev, apdev, params):
  34. """RSN AP and PeerKey between two STAs with sniffer check"""
  35. ssid = "test-peerkey"
  36. passphrase = "12345678"
  37. hparams = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  38. hparams['peerkey'] = "1"
  39. hapd = hostapd.add_ap(apdev[0], hparams)
  40. Wlantest.setup(hapd)
  41. wt = Wlantest()
  42. wt.flush()
  43. wt.add_passphrase("12345678")
  44. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  45. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  46. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  47. dev[0].request("STKSTART " + dev[1].p2p_interface_addr())
  48. time.sleep(1)
  49. # NOTE: Actual use of the direct link (DLS) is not supported in
  50. # mac80211_hwsim, so this operation fails at setting the keys after
  51. # successfully completed 4-way handshake. This test case does allow the
  52. # key negotiation part to be tested for coverage, though. Use sniffer to
  53. # verify that all the SMK and STK handshake messages were transmitted.
  54. bssid = hapd.own_addr()
  55. addr0 = dev[0].own_addr()
  56. addr1 = dev[1].own_addr()
  57. out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
  58. "eapol.type == 3",
  59. display=["wlan.sa", "wlan.da", "eapol.keydes.key_info"])
  60. smk = [ False, False, False, False, False ]
  61. stk = [ False, False, False, False ]
  62. for pkt in out.splitlines():
  63. sa, da, key_info = pkt.split('\t')
  64. key_info = int(key_info, 16)
  65. if sa == addr0 and da == bssid and key_info == 0x2b02:
  66. # Initiator -> AP: MIC+Secure+Request+SMK = SMK 1
  67. smk[0] = True
  68. elif sa == bssid and da == addr1 and key_info == 0x2382:
  69. # AP -> Responder: ACK+MIC+Secure+SMK = SMK 2
  70. smk[1] = True
  71. elif sa == addr1 and da == bssid and key_info == 0x2302:
  72. # Responder -> AP: MIC+Secure+SMK = SMK 3
  73. smk[2] = True
  74. elif sa == bssid and da == addr1 and key_info == 0x3342:
  75. # AP -> Responder: Install+MIC+Secure+EncrKeyData+SMK = SMK 4
  76. smk[3] = True
  77. elif sa == bssid and da == addr0 and key_info == 0x3302:
  78. # AP -> Initiator: MIC+Secure+EncrKeyData+SMK = SMK 5
  79. smk[4] = True
  80. elif sa == addr0 and da == addr1 and key_info == 0x008a:
  81. # Initiator -> Responder: Pairwise+ACK = STK 1
  82. stk[0] = True
  83. elif sa == addr1 and da == addr0 and key_info == 0x010a:
  84. # Responder -> Initiator: Pairwise+MIC = STK 2
  85. stk[1] = True
  86. elif sa == addr0 and da == addr1 and key_info == 0x038a:
  87. # Initiator -> Responder: Pairwise+ACK+MIC+Secure = STK 3
  88. stk[2] = True
  89. elif sa == addr1 and da == addr0 and key_info == 0x030a:
  90. # Responder -> Initiator: Pairwise+MIC+Secure = STK 4
  91. stk[3] = True
  92. logger.info("Seen SMK messages: " + str(smk))
  93. logger.info("Seen STK messages: " + str(stk))
  94. if False in smk:
  95. raise Exception("Missing SMK message: " + str(smk))
  96. if False in stk:
  97. raise Exception("Missing STK message: " + str(stk))
  98. def test_peerkey_unknown_peer(dev, apdev):
  99. """RSN AP and PeerKey attempt with unknown peer"""
  100. ssid = "test-peerkey"
  101. passphrase = "12345678"
  102. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  103. params['peerkey'] = "1"
  104. hostapd.add_ap(apdev[0], params)
  105. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  106. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True)
  107. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  108. dev[0].request("STKSTART " + dev[2].p2p_interface_addr())
  109. time.sleep(0.5)
  110. @remote_compatible
  111. def test_peerkey_pairwise_mismatch(dev, apdev):
  112. """RSN TKIP+CCMP AP and PeerKey between two STAs using different ciphers"""
  113. skip_with_fips(dev[0])
  114. ssid = "test-peerkey"
  115. passphrase = "12345678"
  116. params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
  117. params['peerkey'] = "1"
  118. params['rsn_pairwise'] = "TKIP CCMP"
  119. hapd = hostapd.add_ap(apdev[0], params)
  120. Wlantest.setup(hapd)
  121. wt = Wlantest()
  122. wt.flush()
  123. wt.add_passphrase("12345678")
  124. dev[0].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True,
  125. pairwise="CCMP")
  126. dev[1].connect(ssid, psk=passphrase, scan_freq="2412", peerkey=True,
  127. pairwise="TKIP")
  128. hwsim_utils.test_connectivity_sta(dev[0], dev[1])
  129. dev[0].request("STKSTART " + dev[1].p2p_interface_addr())
  130. time.sleep(0.5)
  131. dev[1].request("STKSTART " + dev[0].p2p_interface_addr())
  132. time.sleep(0.5)