diff options
author | Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be> | 2018-08-06 19:46:40 (GMT) |
---|---|---|
committer | Jouni Malinen <j@w1.fi> | 2018-12-17 13:50:12 (GMT) |
commit | a187bf0161b1cded2735fec6ee83610d6e21f084 (patch) | |
tree | 43d4f800e2abb1d7ba8a21d65d36fc2b46acdff0 /tests | |
parent | 99621dc16c941c86affaf66e7d4f3bb776598a7e (diff) | |
download | hostap-a187bf0161b1cded2735fec6ee83610d6e21f084.zip hostap-a187bf0161b1cded2735fec6ee83610d6e21f084.tar.gz hostap-a187bf0161b1cded2735fec6ee83610d6e21f084.tar.bz2 |
tests: OCI validation in the FILS handshake (OCV)
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/hwsim/test_fils.py | 61 |
1 files changed, 61 insertions, 0 deletions
diff --git a/tests/hwsim/test_fils.py b/tests/hwsim/test_fils.py index 1c89c15..7d8b5f4 100644 --- a/tests/hwsim/test_fils.py +++ b/tests/hwsim/test_fils.py @@ -181,6 +181,67 @@ def test_fils_sk_pmksa_caching(dev, apdev, params): time.sleep(0.1) hwsim_utils.test_connectivity(dev[0], hapd) +def test_fils_sk_pmksa_caching_ocv(dev, apdev, params): + """FILS SK and PMKSA caching with OCV""" + check_fils_capa(dev[0]) + check_erp_capa(dev[0]) + + start_erp_as(apdev[1], msk_dump=os.path.join(params['logdir'], "msk.lst")) + + bssid = apdev[0]['bssid'] + params = hostapd.wpa2_eap_params(ssid="fils") + params['wpa_key_mgmt'] = "FILS-SHA256" + params['auth_server_port'] = "18128" + params['erp_domain'] = 'example.com' + params['fils_realm'] = 'example.com' + params['ieee80211w'] = '1' + params['ocv'] = '1' + try: + hapd = hostapd.add_ap(apdev[0]['ifname'], params) + except Exception, e: + if "Failed to set hostapd parameter ocv" in str(e): + raise HwsimSkip("OCV not supported") + raise + + dev[0].scan_for_bss(bssid, freq=2412) + dev[0].request("ERP_FLUSH") + id = dev[0].connect("fils", key_mgmt="FILS-SHA256", + eap="PSK", identity="psk.user@example.com", + password_hex="0123456789abcdef0123456789abcdef", + erp="1", scan_freq="2412", ieee80211w="1", ocv="1") + pmksa = dev[0].get_pmksa(bssid) + if pmksa is None: + raise Exception("No PMKSA cache entry created") + + dev[0].request("DISCONNECT") + dev[0].wait_disconnected() + + dev[0].dump_monitor() + dev[0].select_network(id, freq=2412) + ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED", + "CTRL-EVENT-CONNECTED"], timeout=10) + if ev is None: + raise Exception("Connection using PMKSA caching timed out") + if "CTRL-EVENT-EAP-STARTED" in ev: + raise Exception("Unexpected EAP exchange") + hwsim_utils.test_connectivity(dev[0], hapd) + pmksa2 = dev[0].get_pmksa(bssid) + if pmksa2 is None: + raise Exception("No PMKSA cache entry found") + if pmksa['pmkid'] != pmksa2['pmkid']: + raise Exception("Unexpected PMKID change") + + # Verify EAPOL reauthentication after FILS authentication + hapd.request("EAPOL_REAUTH " + dev[0].own_addr()) + ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED"], timeout=5) + if ev is None: + raise Exception("EAP authentication did not start") + ev = dev[0].wait_event(["CTRL-EVENT-EAP-SUCCESS"], timeout=5) + if ev is None: + raise Exception("EAP authentication did not succeed") + time.sleep(0.1) + hwsim_utils.test_connectivity(dev[0], hapd) + def test_fils_sk_pmksa_caching_and_cache_id(dev, apdev): """FILS SK and PMKSA caching with Cache Identifier""" check_fils_capa(dev[0]) |