2017-06-15 20:18:20 +02:00
|
|
|
# Test cases for Device Provisioning Protocol (DPP)
|
|
|
|
# Copyright (c) 2017, Qualcomm Atheros, Inc.
|
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
|
|
|
import time
|
|
|
|
|
|
|
|
import hostapd
|
2017-08-24 22:47:58 +02:00
|
|
|
import hwsim_utils
|
2017-06-15 20:18:20 +02:00
|
|
|
from utils import HwsimSkip
|
2017-08-24 22:31:46 +02:00
|
|
|
from wpasupplicant import WpaSupplicant
|
2017-06-15 20:18:20 +02:00
|
|
|
|
|
|
|
def check_dpp_capab(dev):
|
|
|
|
if "UNKNOWN COMMAND" in dev.request("DPP_BOOTSTRAP_GET_URI 0"):
|
|
|
|
raise HwsimSkip("DPP not supported")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_parsing(dev, apdev):
|
|
|
|
"""DPP QR Code parsing"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
id = []
|
|
|
|
|
|
|
|
tests = [ "DPP:C:81/1,115/36;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;",
|
|
|
|
"DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;",
|
|
|
|
"DPP:I:;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;" ]
|
|
|
|
for uri in tests:
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code")
|
|
|
|
id.append(int(res))
|
|
|
|
|
|
|
|
uri2 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id[-1])
|
|
|
|
if uri != uri2:
|
|
|
|
raise Exception("Returned URI does not match")
|
|
|
|
|
|
|
|
tests = [ "foo",
|
|
|
|
"DPP:",
|
|
|
|
"DPP:;;",
|
|
|
|
"DPP:C:1/2;M:;K;;",
|
|
|
|
"DPP:I:;M:01020304050;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;" ]
|
|
|
|
for t in tests:
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + t)
|
|
|
|
if "FAIL" not in res:
|
|
|
|
raise Exception("Accepted invalid QR Code: " + t)
|
|
|
|
|
|
|
|
logger.info("ID: " + str(id))
|
|
|
|
if id[0] == id[1] or id[0] == id[2] or id[1] == id[2]:
|
|
|
|
raise Exception("Duplicate ID returned")
|
|
|
|
|
|
|
|
if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_REMOVE 12345678"):
|
|
|
|
raise Exception("DPP_BOOTSTRAP_REMOVE accepted unexpectedly")
|
|
|
|
if "OK" not in dev[0].request("DPP_BOOTSTRAP_REMOVE %d" % id[1]):
|
|
|
|
raise Exception("DPP_BOOTSTRAP_REMOVE failed")
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode")
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % int(res))
|
|
|
|
logger.info("Generated URI: " + uri)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse self-generated QR Code URI")
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1,115/36 mac=010203040506 info=foo")
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % int(res))
|
|
|
|
logger.info("Generated URI: " + uri)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse self-generated QR Code URI")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_broadcast(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (broadcast)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1")
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d" % id1):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_unicast(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (unicast)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, None)
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_unicast_ap_enrollee(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (AP enrollee)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, None, netrole="ap")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_curve_prime256v1(dev, apdev):
|
|
|
|
"""DPP QR Code and curve prime256v1"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_curve_secp384r1(dev, apdev):
|
|
|
|
"""DPP QR Code and curve secp384r1"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_curve_secp521r1(dev, apdev):
|
|
|
|
"""DPP QR Code and curve secp521r1"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_curve_brainpoolP256r1(dev, apdev):
|
|
|
|
"""DPP QR Code and curve brainpoolP256r1"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP256r1")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_curve_brainpoolP384r1(dev, apdev):
|
|
|
|
"""DPP QR Code and curve brainpoolP384r1"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP384r1")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_curve_brainpoolP512r1(dev, apdev):
|
|
|
|
"""DPP QR Code and curve brainpoolP512r1"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP512r1")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_set_key(dev, apdev):
|
|
|
|
"""DPP QR Code and fixed bootstrapping key"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, None, key="30770201010420e5143ac74682cc6869a830e8f5301a5fa569130ac329b1d7dd6f2a7495dbcbe1a00a06082a8648ce3d030107a144034200045e13e167c33dbc7d85541e5509600aa8139bbb3e39e25898992c5d01be92039ee2850f17e71506ded0d6b25677441eae249f8e225c68dd15a6354dca54006383")
|
|
|
|
|
|
|
|
def run_dpp_qr_code_auth_unicast(dev, apdev, curve, netrole=None, key=None,
|
|
|
|
require_conf_success=False, init_extra=None,
|
|
|
|
require_conf_failure=False,
|
|
|
|
configurator=False, conf_curve=None):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
if configurator:
|
|
|
|
logger.info("Create configurator on dev1")
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
if conf_curve:
|
|
|
|
cmd += " curve=" + conf_curve
|
|
|
|
res = dev[1].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
if key:
|
|
|
|
cmd += " key=" + key
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if netrole:
|
|
|
|
cmd += " netrole=" + netrole
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d" % id1
|
|
|
|
if init_extra:
|
|
|
|
cmd += " " + init_extra
|
|
|
|
if configurator:
|
|
|
|
cmd += " configurator=%d" % conf_id
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
if require_conf_success:
|
|
|
|
if "DPP-CONF-FAILED" in ev:
|
|
|
|
raise Exception("DPP configuration failed")
|
|
|
|
if require_conf_failure:
|
|
|
|
if "DPP-CONF-SUCCESS" in ev:
|
|
|
|
raise Exception("DPP configuration succeeded unexpectedly")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_mutual(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (mutual)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 displays QR Code")
|
|
|
|
addr = dev[1].own_addr().replace(':', '')
|
|
|
|
res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1b = int(res)
|
|
|
|
uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
|
|
|
|
|
|
|
|
logger.info("dev0 scans QR Code")
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri1b)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id0b = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_mutual2(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (mutual2)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 displays QR Code")
|
|
|
|
addr = dev[1].own_addr().replace(':', '')
|
|
|
|
res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1b = int(res)
|
|
|
|
uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412 qr=mutual"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Pending response not reported")
|
|
|
|
ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("QR Code scan for mutual authentication not requested")
|
|
|
|
|
|
|
|
logger.info("dev0 scans QR Code")
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri1b)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id0b = int(res)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
2017-10-23 13:20:16 +02:00
|
|
|
def test_dpp_qr_code_auth_mutual_not_used(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (mutual not used)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 displays QR Code")
|
|
|
|
addr = dev[1].own_addr().replace(':', '')
|
|
|
|
res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1b = int(res)
|
|
|
|
uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
|
|
|
|
|
|
|
|
logger.info("dev0 does not scan QR Code")
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
2017-06-15 20:18:20 +02:00
|
|
|
def test_dpp_qr_code_auth_mutual_curve_mismatch(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (mutual/mismatch)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 displays QR Code")
|
|
|
|
addr = dev[1].own_addr().replace(':', '')
|
|
|
|
res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr + " curve=secp384r1")
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1b = int(res)
|
|
|
|
uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
|
|
|
|
|
|
|
|
logger.info("dev0 scans QR Code")
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri1b)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id0b = int(res)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b))
|
|
|
|
if "FAIL" not in res:
|
|
|
|
raise Exception("DPP_AUTH_INIT accepted unexpectedly")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_listen_continue(dev, apdev):
|
|
|
|
"""DPP QR Code and listen operation needing continuation"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
logger.info("Wait for listen to expire and get restarted")
|
|
|
|
time.sleep(5.5)
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d" % id1):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_initiator_enrollee(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (Initiator in Enrollee role)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
dev[0].request("SET gas_address3 1")
|
|
|
|
dev[1].request("SET gas_address3 1")
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=enrollee" % id1):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
2017-08-23 14:55:46 +02:00
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration did not succeed (Configurator)")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration did not succeed (Enrollee)")
|
|
|
|
|
2017-06-15 20:18:20 +02:00
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
|
|
|
def test_dpp_qr_code_auth_incompatible_roles(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange (incompatible roles)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
if "OK" not in dev[0].request("DPP_LISTEN 2412 role=enrollee"):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=enrollee" % id1):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-NOT-COMPATIBLE"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP-NOT-COMPATIBLE event on initiator timed out")
|
|
|
|
ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP-NOT-COMPATIBLE event on responder timed out")
|
|
|
|
|
|
|
|
if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=configurator" % id1):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
|
2017-10-29 15:09:56 +01:00
|
|
|
def test_dpp_qr_code_auth_neg_chan(dev, apdev):
|
|
|
|
"""DPP QR Code and authentication exchange with requested different channel"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
logger.info("Create configurator on dev1")
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[1].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d configurator=%d conf=sta-dpp neg_freq=2462" % (id1, conf_id)
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-TX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Request not sent")
|
|
|
|
if "freq=2412 type=0" not in ev:
|
|
|
|
raise Exception("Unexpected TX data for Authentication Request: " + ev)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Request not received")
|
|
|
|
if "freq=2412 type=0" not in ev:
|
|
|
|
raise Exception("Unexpected RX data for Authentication Request: " + ev)
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-TX-STATUS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("TX status for DPP Authentication Request not reported")
|
|
|
|
if "freq=2412 result=SUCCESS" not in ev:
|
|
|
|
raise Exception("Unexpected TX status for Authentication Request: " + ev)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-TX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Response not sent")
|
|
|
|
if "freq=2462 type=1" not in ev:
|
|
|
|
raise Exception("Unexpected TX data for Authentication Response: " + ev)
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Response not received")
|
|
|
|
if "freq=2462 type=1" not in ev:
|
|
|
|
raise Exception("Unexpected RX data for Authentication Response: " + ev)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("TX status for DPP Authentication Response not reported")
|
|
|
|
if "freq=2462 result=SUCCESS" not in ev:
|
|
|
|
raise Exception("Unexpected TX status for Authentication Response: " + ev)
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-TX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Confirm not sent")
|
|
|
|
if "freq=2462 type=2" not in ev:
|
|
|
|
raise Exception("Unexpected TX data for Authentication Confirm: " + ev)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Confirm not received")
|
|
|
|
if "freq=2462 type=2" not in ev:
|
|
|
|
raise Exception("Unexpected RX data for Authentication Confirm: " + ev)
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-TX-STATUS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("TX status for DPP Authentication Confirm not reported")
|
|
|
|
if "freq=2462 result=SUCCESS" not in ev:
|
|
|
|
raise Exception("Unexpected TX status for Authentication Confirm: " + ev)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
if "DPP-CONF-FAILED" in ev:
|
|
|
|
raise Exception("DPP configuration failed")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
2017-06-15 20:18:20 +02:00
|
|
|
def test_dpp_config_legacy(dev, apdev):
|
|
|
|
"""DPP Config Object for legacy network using passphrase"""
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}'
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_legacy_psk_hex(dev, apdev):
|
|
|
|
"""DPP Config Object for legacy network using PSK"""
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"' + 32*"12" + '"}}'
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_fragmentation(dev, apdev):
|
|
|
|
"""DPP Config Object for legacy network requiring fragmentation"""
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' '
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_legacy_gen(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for legacy network"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
2017-06-22 14:57:53 +02:00
|
|
|
init_extra="conf=sta-psk pass=%s" % "passphrase".encode("hex"),
|
2017-06-15 20:18:20 +02:00
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_prime256v1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-256)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp384r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-384)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp521r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-521)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_prime256v1_prime256v1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-256 + P-256)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="prime256v1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_prime256v1_secp384r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-256 + P-384)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="secp384r1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_prime256v1_secp521r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-256 + P-521)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="secp521r1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp384r1_prime256v1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-384 + P-256)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="prime256v1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp384r1_secp384r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-384 + P-384)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="secp384r1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp384r1_secp521r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-384 + P-521)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="secp521r1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp521r1_prime256v1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-521 + P-256)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="prime256v1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp521r1_secp384r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-521 + P-384)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="secp384r1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_secp521r1_secp521r1(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network (P-521 + P-521)"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True,
|
|
|
|
conf_curve="secp521r1")
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_expiry(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network with expiry value"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp expiry=%d" % (time.time() + 1000),
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_gen_expired_key(dev, apdev):
|
|
|
|
"""Generate DPP Config Object for DPP network with expiry value"""
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp expiry=%d" % (time.time() - 10),
|
|
|
|
require_conf_failure=True,
|
|
|
|
configurator=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_override_prime256v1(dev, apdev):
|
|
|
|
"""DPP Config Object override (P-256)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiYVRGNEpFR0lQS1NaMFh2OXpkQ01qbS10bjVYcE1zWUlWWjl3eVNBejFnSSIsInkiOiJRR2NIV0FfNnJiVTlYRFhBenRvWC1NNVEzc3VUbk1hcUVoVUx0bjdTU1h3In19._sm6YswxMf6hJLVTyYoU1uYUeY2VVkUNjrzjSiEhY42StD_RWowStEE-9CRsdCvLmsTptZ72_g40vTFwdId20A","csign":{"kty":"EC","crv":"P-256","x":"W4-Y5N1Pkos3UWb9A5qme0KUYRtY3CVUpekx_MapZ9s","y":"Et-M4NSF4NGjvh2VCh4B1sJ9eSCZ4RNzP2DBdP137VE","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU"}}}'
|
|
|
|
dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_override_secp384r1(dev, apdev):
|
|
|
|
"""DPP Config Object override (P-384)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJabi1iMndjbjRLM2pGQklkYmhGZkpVTHJTXzdESS0yMWxFQi02R3gxNjl3IiwiYWxnIjoiRVMzODQifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0zODQiLCJ4IjoickdrSGg1UUZsOUtfWjdqYUZkVVhmbThoY1RTRjM1b25Xb1NIRXVsbVNzWW9oX1RXZGpoRjhiVGdiS0ZRN2tBViIsInkiOiJBbU1QVDA5VmFENWpGdzMwTUFKQlp2VkZXeGNlVVlKLXR5blQ0bVJ5N0xOZWxhZ0dEWHpfOExaRlpOU2FaNUdLIn19.Yn_F7m-bbOQ5PlaYQJ9-1qsuqYQ6V-rAv8nWw1COKiCYwwbt3WFBJ8DljY0dPrlg5CHJC4saXwkytpI-CpELW1yUdzYb4Lrun07d20Eo_g10ICyOl5sqQCAUElKMe_Xr","csign":{"kty":"EC","crv":"P-384","x":"dmTyXXiPV2Y8a01fujL-jo08gvzyby23XmzOtzjAiujKQZZgPJsbhfEKrZDlc6ey","y":"H5Z0av5c7bqInxYb2_OOJdNiMhVf3zlcULR0516ZZitOY4U31KhL4wl4KGV7g2XW","kid":"Zn-b2wcn4K3jFBIdbhFfJULrS_7DI-21lEB-6Gx169w"}}}'
|
|
|
|
dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
|
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_dpp_override_secp521r1(dev, apdev):
|
|
|
|
"""DPP Config Object override (P-521)"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJMZkhKY3hnV2ZKcG1uS2IwenZRT0F2VDB2b0ZKc0JjZnBmYzgxY3Y5ZXFnIiwiYWxnIjoiRVM1MTIifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC01MjEiLCJ4IjoiQVJlUFBrMFNISkRRR2NWbnlmM3lfbTlaQllHNjFJeElIbDN1NkdwRHVhMkU1WVd4TE1BSUtMMnZuUGtlSGFVRXljRmZaZlpYZ2JlNkViUUxMVkRVUm1VUSIsInkiOiJBWUtaYlNwUkFFNjJVYm9YZ2c1ZWRBVENzbEpzTlpwcm9RR1dUcW9Md04weXkzQkVoT3ZRZmZrOWhaR2lKZ295TzFobXFRRVRrS0pXb2tIYTBCQUpLSGZtIn19.ACEZLyPk13cM_OFScpLoCElQ2t1sxq5z2d_W_3_QslTQQe5SFiH_o8ycL4632YLAH4RV0gZcMKKRMtZdHgBYHjkzASDqgY-_aYN2SBmpfl8hw0YdDlUJWX3DJf-ofqNAlTbnGmhpSg69cEAhFn41Xgvx2MdwYcPVncxxESVOtWl5zNLK","csign":{"kty":"EC","crv":"P-521","x":"ADiOI_YJOAipEXHB-SpGl4KqokX8m8h3BVYCc8dgiwssZ061-nIIY3O1SIO6Re4Jjfy53RPgzDG6jitOgOGLtzZs","y":"AZKggKaQi0ExutSpJAU3-lqDV03sBQLA9C7KabfWoAn8qD6Vk4jU0WAJdt-wBBTF9o1nVuiqS2OxMVYrxN4lOz79","kid":"LfHJcxgWfJpmnKb0zvQOAvT0voFJsBcfpfc81cv9eqg"}}}'
|
|
|
|
dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
|
|
|
|
require_conf_success=True)
|
|
|
|
|
|
|
|
def test_dpp_config_override_objects(dev, apdev):
|
|
|
|
"""Generate DPP Config Object and override objects)"""
|
|
|
|
check_dpp_capab(dev[1])
|
2017-10-10 00:34:49 +02:00
|
|
|
discovery = '{\n"ssid":"mywifi"\n}'
|
2017-06-15 20:18:20 +02:00
|
|
|
groups = '[\n {"groupId":"home","netRole":"sta"},\n {"groupId":"cottage","netRole":"sta"}\n]'
|
|
|
|
dev[1].set("dpp_discovery_override", discovery)
|
|
|
|
dev[1].set("dpp_groups_override", groups)
|
|
|
|
run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
|
|
|
|
init_extra="conf=sta-dpp",
|
|
|
|
require_conf_success=True,
|
|
|
|
configurator=True)
|
|
|
|
|
|
|
|
def test_dpp_gas_timeout(dev, apdev):
|
|
|
|
"""DPP and GAS server timeout for a query"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
logger.info("dev0 displays QR Code")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
logger.info("dev1 scans QR Code")
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
logger.info("dev1 initiates DPP Authentication")
|
|
|
|
dev[0].set("ext_mgmt_frame_handling", "1")
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
# Force GAS fragmentation
|
|
|
|
conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' '
|
|
|
|
dev[1].set("dpp_config_obj_override", conf)
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d" % id1
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
|
|
|
|
# DPP Authentication Request
|
|
|
|
msg = dev[0].mgmt_rx()
|
|
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
|
|
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
|
|
|
|
# DPP Authentication Confirmation
|
|
|
|
msg = dev[0].mgmt_rx()
|
|
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
|
|
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
|
|
|
|
# DPP Configuration Response (GAS Initial Response frame)
|
|
|
|
msg = dev[0].mgmt_rx()
|
|
|
|
if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
|
|
|
|
raise Exception("MGMT_RX_PROCESS failed")
|
|
|
|
|
|
|
|
# GAS Comeback Response frame
|
|
|
|
msg = dev[0].mgmt_rx()
|
|
|
|
# Do not continue to force timeout on GAS server
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("GAS result not reported (Enrollee)")
|
|
|
|
if "result=TIMEOUT" not in ev:
|
|
|
|
raise Exception("Unexpected GAS result (Enrollee): " + ev)
|
|
|
|
dev[0].set("ext_mgmt_frame_handling", "0")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=15)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration failure not reported (Configurator)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration failure not reported (Enrollee)")
|
|
|
|
|
|
|
|
def test_dpp_akm_sha256(dev, apdev):
|
|
|
|
"""DPP AKM (SHA256)"""
|
|
|
|
run_dpp_akm(dev, apdev, 32)
|
|
|
|
|
|
|
|
def test_dpp_akm_sha384(dev, apdev):
|
|
|
|
"""DPP AKM (SHA384)"""
|
|
|
|
run_dpp_akm(dev, apdev, 48)
|
|
|
|
|
|
|
|
def test_dpp_akm_sha512(dev, apdev):
|
|
|
|
"""DPP AKM (SHA512)"""
|
|
|
|
run_dpp_akm(dev, apdev, 64)
|
|
|
|
|
|
|
|
def run_dpp_akm(dev, apdev, pmk_len):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
params = { "ssid": "dpp",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "DPP",
|
2017-11-01 16:24:18 +01:00
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
|
"ieee80211w": "2" }
|
2017-06-15 20:18:20 +02:00
|
|
|
try:
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
except:
|
|
|
|
raise HwsimSkip("DPP not supported")
|
|
|
|
|
2017-11-01 16:24:18 +01:00
|
|
|
id = dev[0].connect("dpp", key_mgmt="DPP", ieee80211w="2", scan_freq="2412",
|
2017-06-15 20:18:20 +02:00
|
|
|
wait_connect=False)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-NETWORK-NOT-FOUND"], timeout=2)
|
|
|
|
if not ev:
|
|
|
|
raise Exception("Network mismatch not reported")
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
bssid = hapd.own_addr()
|
|
|
|
pmkid = 16*'11'
|
|
|
|
akmp = 2**23
|
|
|
|
pmk = pmk_len*'22'
|
|
|
|
cmd = "PMKSA_ADD %d %s %s %s 30240 43200 %d 0" % (id, bssid, pmkid, pmk, akmp)
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("PMKSA_ADD failed (wpa_supplicant)")
|
|
|
|
dev[0].select_network(id, freq="2412")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=2)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
if not ev:
|
|
|
|
raise Exception("Association attempt was not rejected")
|
|
|
|
if "status_code=53" not in ev:
|
|
|
|
raise Exception("Unexpected status code: " + ev)
|
|
|
|
|
|
|
|
addr = dev[0].own_addr()
|
|
|
|
cmd = "PMKSA_ADD %s %s %s 0 %d" % (addr, pmkid, pmk, akmp)
|
|
|
|
if "OK" not in hapd.request(cmd):
|
|
|
|
raise Exception("PMKSA_ADD failed (hostapd)")
|
|
|
|
|
|
|
|
dev[0].select_network(id, freq="2412")
|
|
|
|
dev[0].wait_connected()
|
2017-07-03 13:33:58 +02:00
|
|
|
val = dev[0].get_status_field("key_mgmt")
|
|
|
|
if val != "DPP":
|
|
|
|
raise Exception("Unexpected key_mgmt: " + val)
|
2017-06-15 20:18:20 +02:00
|
|
|
|
|
|
|
def test_dpp_network_introduction(dev, apdev):
|
|
|
|
"""DPP network introduction"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
csign = "3059301306072a8648ce3d020106082a8648ce3d03010703420004d02e5bd81a120762b5f0f2994777f5d40297238a6c294fd575cdf35fabec44c050a6421c401d98d659fd2ed13c961cc8287944dd3202f516977800d3ab2f39ee"
|
|
|
|
ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJzOEFrYjg5bTV4UGhoYk5UbTVmVVo0eVBzNU5VMkdxYXNRY3hXUWhtQVFRIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIwOHF4TlNYRzRWemdCV3BjVUdNSmc1czNvbElOVFJsRVQ1aERpNkRKY3ZjIiwieSI6IlVhaGFYQXpKRVpRQk1YaHRUQnlZZVlrOWtJYjk5UDA3UV9NcW9TVVZTVEkifX0.a5_nfMVr7Qe1SW0ZL3u6oQRm5NUCYUSfixDAJOUFN3XUfECBZ6E8fm8xjeSfdOytgRidTz0CTlIRjzPQo82dmQ"
|
|
|
|
ap_netaccesskey = "30770201010420f6531d17f29dfab655b7c9e923478d5a345164c489aadd44a3519c3e9dcc792da00a06082a8648ce3d030107a14403420004d3cab13525c6e15ce0056a5c506309839b37a2520d4d19444f98438ba0c972f751a85a5c0cc911940131786d4c1c9879893d9086fdf4fd3b43f32aa125154932"
|
|
|
|
sta_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJzOEFrYjg5bTV4UGhoYk5UbTVmVVo0eVBzNU5VMkdxYXNRY3hXUWhtQVFRIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiZWMzR3NqQ3lQMzVBUUZOQUJJdEltQnN4WXVyMGJZX1dES1lfSE9zUGdjNCIsInkiOiJTRS1HVllkdWVnTFhLMU1TQXZNMEx2QWdLREpTNWoyQVhCbE9PMTdUSTRBIn19.PDK9zsGlK-e1pEOmNxVeJfCS8pNeay6ckIS1TXCQsR64AR-9wFPCNVjqOxWvVKltehyMFqVAtOcv0IrjtMJFqQ"
|
|
|
|
sta_netaccesskey = "30770201010420bc33380c26fd2168b69cd8242ed1df07ba89aa4813f8d4e8523de6ca3f8dd28ba00a06082a8648ce3d030107a1440342000479cdc6b230b23f7e40405340048b48981b3162eaf46d8fd60ca63f1ceb0f81ce484f8655876e7a02d72b531202f3342ef020283252e63d805c194e3b5ed32380"
|
|
|
|
|
|
|
|
params = { "ssid": "dpp",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "DPP",
|
2017-11-01 16:24:18 +01:00
|
|
|
"ieee80211w": "2",
|
2017-06-15 20:18:20 +02:00
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
|
"dpp_connector": ap_connector,
|
|
|
|
"dpp_csign": csign,
|
|
|
|
"dpp_netaccesskey": ap_netaccesskey }
|
|
|
|
try:
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
except:
|
|
|
|
raise HwsimSkip("DPP not supported")
|
|
|
|
|
|
|
|
id = dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
|
2017-11-01 16:24:18 +01:00
|
|
|
ieee80211w="2",
|
2017-06-15 20:18:20 +02:00
|
|
|
dpp_csign=csign,
|
|
|
|
dpp_connector=sta_connector,
|
|
|
|
dpp_netaccesskey=sta_netaccesskey)
|
2017-07-03 13:33:58 +02:00
|
|
|
val = dev[0].get_status_field("key_mgmt")
|
|
|
|
if val != "DPP":
|
|
|
|
raise Exception("Unexpected key_mgmt: " + val)
|
2017-06-15 20:18:20 +02:00
|
|
|
|
|
|
|
def test_dpp_ap_config(dev, apdev):
|
|
|
|
"""DPP and AP configuration"""
|
|
|
|
run_dpp_ap_config(dev, apdev)
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p256_p256(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-256 + P-256)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-256")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p256_p384(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-256 + P-384)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-384")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p256_p521(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-256 + P-521)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-521")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p384_p256(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-384 + P-256)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-256")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p384_p384(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-384 + P-384)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-384")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p384_p521(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-384 + P-521)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-521")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p521_p256(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-521 + P-256)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-256")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p521_p384(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-521 + P-384)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-384")
|
|
|
|
|
|
|
|
def test_dpp_ap_config_p521_p521(dev, apdev):
|
|
|
|
"""DPP and AP configuration (P-521 + P-521)"""
|
|
|
|
run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-521")
|
|
|
|
|
2017-07-04 16:49:29 +02:00
|
|
|
def update_hapd_config(hapd):
|
|
|
|
ev = hapd.wait_event(["DPP-CONFOBJ-SSID"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("SSID not reported (AP)")
|
|
|
|
ssid = ev.split(' ')[1]
|
|
|
|
|
|
|
|
ev = hapd.wait_event(["DPP-CONNECTOR"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connector not reported (AP)")
|
|
|
|
connector = ev.split(' ')[1]
|
|
|
|
|
|
|
|
ev = hapd.wait_event(["DPP-C-SIGN-KEY"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("C-sign-key not reported (AP)")
|
|
|
|
p = ev.split(' ')
|
|
|
|
csign = p[1]
|
|
|
|
|
|
|
|
ev = hapd.wait_event(["DPP-NET-ACCESS-KEY"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("netAccessKey not reported (AP)")
|
|
|
|
p = ev.split(' ')
|
|
|
|
net_access_key = p[1]
|
|
|
|
net_access_key_expiry = p[2] if len(p) > 2 else None
|
|
|
|
|
|
|
|
logger.info("Update AP configuration to use key_mgmt=DPP")
|
|
|
|
hapd.disable()
|
|
|
|
hapd.set("ssid", ssid)
|
|
|
|
hapd.set("wpa", "2")
|
|
|
|
hapd.set("wpa_key_mgmt", "DPP")
|
2017-11-01 16:24:18 +01:00
|
|
|
hapd.set("ieee80211w", "2")
|
2017-07-04 16:49:29 +02:00
|
|
|
hapd.set("rsn_pairwise", "CCMP")
|
|
|
|
hapd.set("dpp_connector", connector)
|
|
|
|
hapd.set("dpp_csign", csign)
|
|
|
|
hapd.set("dpp_netaccesskey", net_access_key)
|
|
|
|
if net_access_key_expiry:
|
|
|
|
hapd.set("dpp_netaccesskey_expiry", net_access_key_expiry)
|
|
|
|
hapd.enable()
|
|
|
|
|
2017-06-15 20:18:20 +02:00
|
|
|
def run_dpp_ap_config(dev, apdev, curve=None, conf_curve=None):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
addr = hapd.own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id_h = int(res)
|
|
|
|
uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
|
|
|
|
|
2017-10-10 00:19:22 +02:00
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
2017-06-15 20:18:20 +02:00
|
|
|
if conf_curve:
|
|
|
|
cmd += " curve=" + conf_curve
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=ap-dpp configurator=%d" % (id, conf_id)
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
if "DPP-CONF-FAILED" in ev:
|
|
|
|
raise Exception("DPP configuration failed")
|
|
|
|
|
2017-07-04 16:49:29 +02:00
|
|
|
update_hapd_config(hapd)
|
2017-06-15 20:18:20 +02:00
|
|
|
|
|
|
|
addr = dev[1].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri1)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id0b = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id0b, conf_id)
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[1].request("DPP_STOP_LISTEN")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-CONFOBJ-SSID"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("SSID not reported")
|
|
|
|
ssid = ev.split(' ')[1]
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-CONNECTOR"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Connector not reported")
|
|
|
|
connector = ev.split(' ')[1]
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-C-SIGN-KEY"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("C-sign-key not reported")
|
|
|
|
p = ev.split(' ')
|
|
|
|
csign = p[1]
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-NET-ACCESS-KEY"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("netAccessKey not reported")
|
|
|
|
p = ev.split(' ')
|
|
|
|
net_access_key = p[1]
|
|
|
|
net_access_key_expiry = p[2] if len(p) > 2 else None
|
|
|
|
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
2017-11-01 16:24:18 +01:00
|
|
|
id = dev[1].connect(ssid, key_mgmt="DPP", ieee80211w="2", scan_freq="2412",
|
2017-06-15 20:18:20 +02:00
|
|
|
only_add_network=True)
|
|
|
|
dev[1].set_network_quoted(id, "dpp_connector", connector)
|
|
|
|
dev[1].set_network(id, "dpp_csign", csign)
|
|
|
|
dev[1].set_network(id, "dpp_netaccesskey", net_access_key)
|
|
|
|
if net_access_key_expiry:
|
|
|
|
dev[1].set_network(id, "dpp_netaccess_expiry", net_access_key_expiry)
|
|
|
|
|
|
|
|
logger.info("Check data connection")
|
|
|
|
dev[1].select_network(id, freq="2412")
|
|
|
|
dev[1].wait_connected()
|
2017-06-21 17:01:34 +02:00
|
|
|
|
|
|
|
def test_dpp_auto_connect_1(dev, apdev):
|
|
|
|
"""DPP and auto connect (1)"""
|
|
|
|
try:
|
|
|
|
run_dpp_auto_connect(dev, apdev, 1)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
|
|
|
|
def test_dpp_auto_connect_2(dev, apdev):
|
|
|
|
"""DPP and auto connect (2)"""
|
|
|
|
try:
|
|
|
|
run_dpp_auto_connect(dev, apdev, 2)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
|
2017-08-24 22:31:46 +02:00
|
|
|
def test_dpp_auto_connect_2_connect_cmd(dev, apdev):
|
|
|
|
"""DPP and auto connect (2) using connect_cmd"""
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
|
|
|
|
dev_new = [ wpas, dev[1] ]
|
|
|
|
try:
|
|
|
|
run_dpp_auto_connect(dev_new, apdev, 2)
|
|
|
|
finally:
|
|
|
|
wpas.set("dpp_config_processing", "0")
|
|
|
|
|
2017-06-21 17:01:34 +02:00
|
|
|
def run_dpp_auto_connect(dev, apdev, processing):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
csign = "30770201010420768240a3fc89d6662d9782f120527fe7fb9edc6366ab0b9c7dde96125cfd250fa00a06082a8648ce3d030107a144034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708"
|
|
|
|
csign_pub = "3059301306072a8648ce3d020106082a8648ce3d030107034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708"
|
|
|
|
ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJwYWtZbXVzd1dCdWpSYTl5OEsweDViaTVrT3VNT3dzZHRlaml2UG55ZHZzIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIybU5vNXZuRkI5bEw3d1VWb1hJbGVPYzBNSEE1QXZKbnpwZXZULVVTYzVNIiwieSI6IlhzS3dqVHJlLTg5WWdpU3pKaG9CN1haeUttTU05OTl3V2ZaSVl0bi01Q3MifX0.XhjFpZgcSa7G2lHy0OCYTvaZFRo5Hyx6b7g7oYyusLC7C_73AJ4_BxEZQVYJXAtDuGvb3dXSkHEKxREP9Q6Qeg"
|
|
|
|
ap_netaccesskey = "30770201010420ceba752db2ad5200fa7bc565b9c05c69b7eb006751b0b329b0279de1c19ca67ca00a06082a8648ce3d030107a14403420004da6368e6f9c507d94bef0515a1722578e73430703902f267ce97af4fe51273935ec2b08d3adefbcf588224b3261a01ed76722a630cf7df7059f64862d9fee42b"
|
|
|
|
|
|
|
|
params = { "ssid": "test",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "DPP",
|
2017-11-01 16:24:18 +01:00
|
|
|
"ieee80211w": "2",
|
2017-06-21 17:01:34 +02:00
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
|
"dpp_connector": ap_connector,
|
|
|
|
"dpp_csign": csign_pub,
|
|
|
|
"dpp_netaccesskey": ap_netaccesskey }
|
|
|
|
try:
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
except:
|
|
|
|
raise HwsimSkip("DPP not supported")
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD key=" + csign
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("DPP_CONFIGURATOR_ADD failed")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
dev[0].set("dpp_config_processing", str(processing))
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id)
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network profile not generated")
|
|
|
|
id = ev.split(' ')[1]
|
|
|
|
|
|
|
|
if processing == 1:
|
|
|
|
dev[0].select_network(id, freq=2412)
|
|
|
|
|
|
|
|
dev[0].wait_connected()
|
2017-08-24 22:47:58 +02:00
|
|
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
2017-06-21 17:01:34 +02:00
|
|
|
|
|
|
|
def test_dpp_auto_connect_legacy(dev, apdev):
|
|
|
|
"""DPP and auto connect (legacy)"""
|
|
|
|
try:
|
|
|
|
run_dpp_auto_connect_legacy(dev, apdev)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
|
|
|
|
def run_dpp_auto_connect_legacy(dev, apdev):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
2017-06-22 14:12:43 +02:00
|
|
|
params = hostapd.wpa2_params(ssid="dpp-legacy",
|
|
|
|
passphrase="secret passphrase")
|
2017-06-21 17:01:34 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].set("dpp_config_processing", "2")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
2017-11-01 16:24:18 +01:00
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-psk ssid=%s pass=%s" % (id1, "dpp-legacy".encode("hex"), "secret passphrase".encode("hex"))
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network profile not generated")
|
|
|
|
id = ev.split(' ')[1]
|
|
|
|
|
|
|
|
dev[0].wait_connected()
|
|
|
|
|
|
|
|
def test_dpp_auto_connect_legacy_pmf_required(dev, apdev):
|
|
|
|
"""DPP and auto connect (legacy, PMF required)"""
|
|
|
|
try:
|
|
|
|
run_dpp_auto_connect_legacy_pmf_required(dev, apdev)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
|
|
|
|
def run_dpp_auto_connect_legacy_pmf_required(dev, apdev):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
params = hostapd.wpa2_params(ssid="dpp-legacy",
|
|
|
|
passphrase="secret passphrase")
|
|
|
|
params['wpa_key_mgmt'] = "WPA-PSK-SHA256"
|
|
|
|
params['ieee80211w'] = "2"
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].set("dpp_config_processing", "2")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
2017-06-21 17:01:34 +02:00
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
2017-06-22 14:57:53 +02:00
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-psk ssid=%s pass=%s" % (id1, "dpp-legacy".encode("hex"), "secret passphrase".encode("hex"))
|
2017-06-21 17:01:34 +02:00
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=2)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network profile not generated")
|
|
|
|
id = ev.split(' ')[1]
|
|
|
|
|
|
|
|
dev[0].wait_connected()
|
2017-07-02 11:36:25 +02:00
|
|
|
|
2017-07-02 11:36:36 +02:00
|
|
|
def test_dpp_qr_code_auth_responder_configurator(dev, apdev):
|
|
|
|
"""DPP QR Code and responder as the configurator"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
dev[0].set("dpp_configurator_params", " conf=sta-dpp configurator=%d" % conf_id);
|
|
|
|
cmd = "DPP_LISTEN 2412 role=configurator"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
2017-07-02 20:42:32 +02:00
|
|
|
def test_dpp_qr_code_hostapd_init(dev, apdev):
|
|
|
|
"""DPP QR Code and hostapd as initiator"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
|
|
|
|
"channel": "6" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/6 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
dev[0].set("dpp_configurator_params",
|
|
|
|
" conf=ap-dpp configurator=%d" % conf_id);
|
|
|
|
cmd = "DPP_LISTEN 2437 role=configurator"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
res = hapd.request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
|
|
|
|
if "OK" not in hapd.request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
2017-07-02 11:36:25 +02:00
|
|
|
def test_dpp_pkex(dev, apdev):
|
|
|
|
"""DPP and PKEX"""
|
|
|
|
run_dpp_pkex(dev, apdev)
|
|
|
|
|
|
|
|
def test_dpp_pkex_p256(dev, apdev):
|
|
|
|
"""DPP and PKEX (P-256)"""
|
|
|
|
run_dpp_pkex(dev, apdev, "P-256")
|
|
|
|
|
|
|
|
def test_dpp_pkex_p384(dev, apdev):
|
|
|
|
"""DPP and PKEX (P-384)"""
|
|
|
|
run_dpp_pkex(dev, apdev, "P-384")
|
|
|
|
|
|
|
|
def test_dpp_pkex_p521(dev, apdev):
|
|
|
|
"""DPP and PKEX (P-521)"""
|
|
|
|
run_dpp_pkex(dev, apdev, "P-521")
|
|
|
|
|
|
|
|
def test_dpp_pkex_bp256(dev, apdev):
|
|
|
|
"""DPP and PKEX (BP-256)"""
|
|
|
|
run_dpp_pkex(dev, apdev, "brainpoolP256r1")
|
|
|
|
|
|
|
|
def test_dpp_pkex_bp384(dev, apdev):
|
|
|
|
"""DPP and PKEX (BP-384)"""
|
|
|
|
run_dpp_pkex(dev, apdev, "brainpoolP384r1")
|
|
|
|
|
|
|
|
def test_dpp_pkex_bp512(dev, apdev):
|
|
|
|
"""DPP and PKEX (BP-512)"""
|
|
|
|
run_dpp_pkex(dev, apdev, "brainpoolP512r1")
|
|
|
|
|
|
|
|
def test_dpp_pkex_config(dev, apdev):
|
|
|
|
"""DPP and PKEX with initiator as the configurator"""
|
2017-07-05 20:25:06 +02:00
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
2017-07-02 11:36:25 +02:00
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[1].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
run_dpp_pkex(dev, apdev,
|
|
|
|
init_extra="conf=sta-dpp configurator=%d" % (conf_id),
|
|
|
|
check_config=True)
|
|
|
|
|
|
|
|
def run_dpp_pkex(dev, apdev, curve=None, init_extra="", check_config=False):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder)")
|
|
|
|
cmd = "DPP_LISTEN 2437"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 %s code=secret" % (id1, init_extra)
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator)")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
|
|
|
|
if check_config:
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
|
2017-11-02 11:22:29 +01:00
|
|
|
def test_dpp_pkex_code_mismatch(dev, apdev):
|
|
|
|
"""DPP and PKEX with mismatching code"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder)")
|
|
|
|
cmd = "DPP_LISTEN 2437"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=unknown" % id1
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Failure not reported")
|
|
|
|
if "possible PKEX code mismatch" not in ev:
|
|
|
|
raise Exception("Unexpected result: " + ev)
|
|
|
|
|
2017-11-03 16:15:08 +01:00
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator, retry)")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator, retry)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder, retry)")
|
|
|
|
|
2017-11-03 17:55:32 +01:00
|
|
|
def test_dpp_pkex_code_mismatch_limit(dev, apdev):
|
|
|
|
"""DPP and PKEX with mismatching code limit"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder)")
|
|
|
|
cmd = "DPP_LISTEN 2437"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
for i in range(5):
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[1].dump_monitor()
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=unknown" % id1
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Failure not reported")
|
|
|
|
if "possible PKEX code mismatch" not in ev:
|
|
|
|
raise Exception("Unexpected result: " + ev)
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-PKEX-T-LIMIT"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("PKEX t limit not reported")
|
|
|
|
|
2017-11-03 15:45:28 +01:00
|
|
|
def test_dpp_pkex_curve_mismatch(dev, apdev):
|
|
|
|
"""DPP and PKEX with mismatching curve"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex curve=P-256"
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex curve=P-384"
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder)")
|
|
|
|
cmd = "DPP_LISTEN 2437"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Failure not reported (dev 0)")
|
|
|
|
if "Mismatching PKEX curve: peer=20 own=19" not in ev:
|
|
|
|
raise Exception("Unexpected result: " + ev)
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Failure not reported (dev 1)")
|
|
|
|
if "Peer indicated mismatching PKEX group - proposed 19" not in ev:
|
|
|
|
raise Exception("Unexpected result: " + ev)
|
|
|
|
|
2017-07-02 11:36:25 +02:00
|
|
|
def test_dpp_pkex_config2(dev, apdev):
|
|
|
|
"""DPP and PKEX with responder as the configurator"""
|
2017-07-05 20:25:06 +02:00
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
|
2017-07-02 11:36:25 +02:00
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
dev[0].set("dpp_configurator_params",
|
|
|
|
" conf=sta-dpp configurator=%d" % conf_id);
|
|
|
|
run_dpp_pkex2(dev, apdev)
|
|
|
|
|
|
|
|
def run_dpp_pkex2(dev, apdev, curve=None, init_extra=""):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
if curve:
|
|
|
|
cmd += " curve=" + curve
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder)")
|
|
|
|
cmd = "DPP_LISTEN 2437 role=configurator"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 role=enrollee %s code=secret" % (id1, init_extra)
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator)")
|
|
|
|
|
|
|
|
ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
2017-07-02 21:10:41 +02:00
|
|
|
|
|
|
|
def test_dpp_pkex_hostapd_responder(dev, apdev):
|
|
|
|
"""DPP PKEX with hostapd as responder"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
|
|
|
|
"channel": "6" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info (hostapd)")
|
|
|
|
id_h = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id_h)
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder/hostapd)")
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info (wpa_supplicant)")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 conf=ap-dpp configurator=%d code=secret" % (id0, conf_id)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator/wpa_supplicant)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
def test_dpp_pkex_hostapd_initiator(dev, apdev):
|
|
|
|
"""DPP PKEX with hostapd as initiator"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
|
|
|
|
"channel": "6" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info (wpa_supplicant)")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
dev[0].set("dpp_configurator_params",
|
|
|
|
" conf=ap-dpp configurator=%d" % conf_id);
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder/wpa_supplicant)")
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2437 role=configurator"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info (hostapd)")
|
|
|
|
id_h = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 role=enrollee code=secret" % (id_h)
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator/hostapd)")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
2017-07-03 11:56:29 +02:00
|
|
|
|
|
|
|
def test_dpp_hostapd_configurator(dev, apdev):
|
|
|
|
"""DPP with hostapd as configurator/initiator"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
|
|
|
|
"channel": "1" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = hapd.request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = hapd.request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
2017-07-04 14:49:35 +02:00
|
|
|
res = hapd.request("DPP_BOOTSTRAP_INFO %d" % id0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("DPP_BOOTSTRAP_INFO failed")
|
|
|
|
if "type=QRCODE" not in res:
|
|
|
|
raise Exception("DPP_BOOTSTRAP_INFO did not report correct type")
|
|
|
|
if "mac_addr=" + dev[0].own_addr() not in res:
|
|
|
|
raise Exception("DPP_BOOTSTRAP_INFO did not report correct mac_addr")
|
|
|
|
|
2017-07-03 11:56:29 +02:00
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d configurator=%d conf=sta-dpp" % (id1, conf_id)
|
|
|
|
if "OK" not in hapd.request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
|
|
|
|
def test_dpp_hostapd_configurator_responder(dev, apdev):
|
|
|
|
"""DPP with hostapd as configurator/responder"""
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
|
|
|
|
"channel": "1" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = hapd.request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
hapd.set("dpp_configurator_params",
|
|
|
|
" conf=sta-dpp configurator=%d" % conf_id);
|
|
|
|
|
|
|
|
addr = hapd.own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % (id1)
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
dev[0].request("DPP_STOP_LISTEN")
|
|
|
|
dev[0].dump_monitor()
|
2017-07-04 16:49:29 +02:00
|
|
|
|
|
|
|
def test_dpp_own_config(dev, apdev):
|
|
|
|
"""DPP configurator signing own connector"""
|
|
|
|
try:
|
|
|
|
run_dpp_own_config(dev, apdev)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
|
|
|
|
def test_dpp_own_config_curve_mismatch(dev, apdev):
|
|
|
|
"""DPP configurator signing own connector using mismatching curve"""
|
|
|
|
try:
|
|
|
|
run_dpp_own_config(dev, apdev, own_curve="BP-384", expect_failure=True)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
|
|
|
|
def run_dpp_own_config(dev, apdev, own_curve=None, expect_failure=False):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
addr = hapd.own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id_h = int(res)
|
|
|
|
uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[0].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=ap-dpp configurator=%d" % (id, conf_id)
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Responder)")
|
|
|
|
ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP authentication did not succeed (Initiator)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator)")
|
|
|
|
ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee)")
|
|
|
|
|
|
|
|
update_hapd_config(hapd)
|
|
|
|
|
|
|
|
dev[0].set("dpp_config_processing", "1")
|
|
|
|
cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d" % (conf_id)
|
|
|
|
if own_curve:
|
|
|
|
cmd += " curve=" + own_curve
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate own configuration")
|
|
|
|
|
|
|
|
ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network profile not generated")
|
|
|
|
id = ev.split(' ')[1]
|
|
|
|
dev[0].select_network(id, freq="2412")
|
|
|
|
if expect_failure:
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected connection");
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
else:
|
|
|
|
dev[0].wait_connected()
|
2017-10-22 12:49:57 +02:00
|
|
|
|
2017-10-29 11:44:01 +01:00
|
|
|
def test_dpp_intro_mismatch(dev, apdev):
|
|
|
|
"""DPP network introduction mismatch cases"""
|
|
|
|
try:
|
|
|
|
wpas = None
|
|
|
|
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
|
|
|
|
wpas.interface_add("wlan5")
|
|
|
|
check_dpp_capab(wpas)
|
|
|
|
run_dpp_intro_mismatch(dev, apdev, wpas)
|
|
|
|
finally:
|
|
|
|
dev[0].set("dpp_config_processing", "0")
|
|
|
|
dev[2].set("dpp_config_processing", "0")
|
|
|
|
if wpas:
|
|
|
|
wpas.set("dpp_config_processing", "0")
|
|
|
|
|
|
|
|
def run_dpp_intro_mismatch(dev, apdev, wpas):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
check_dpp_capab(dev[2])
|
|
|
|
|
|
|
|
logger.info("Start AP in unconfigured state")
|
|
|
|
hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
|
|
|
|
check_dpp_capab(hapd)
|
|
|
|
|
|
|
|
addr = hapd.own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = hapd.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id_h = int(res)
|
|
|
|
uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
|
|
|
|
|
|
|
|
logger.info("Provision AP with DPP configuration")
|
|
|
|
res = dev[1].request("DPP_CONFIGURATOR_ADD");
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id = int(res)
|
|
|
|
|
|
|
|
dev[1].set("dpp_groups_override", '[{"groupId":"a","netRole":"ap"}]')
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=ap-dpp configurator=%d" % (id, conf_id)
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
update_hapd_config(hapd)
|
|
|
|
|
|
|
|
logger.info("Provision STA0 with DPP Connector that has mismatching groupId")
|
|
|
|
dev[0].set("dpp_config_processing", "2")
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
dev[1].set("dpp_groups_override", '[{"groupId":"b","netRole":"sta"}]')
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id)
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator for STA0)")
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee STA0)")
|
|
|
|
|
|
|
|
logger.info("Provision STA2 with DPP Connector that has mismatching C-sign-key")
|
|
|
|
dev[2].set("dpp_config_processing", "2")
|
|
|
|
addr = dev[2].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[2].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id2 = int(res)
|
|
|
|
uri2 = dev[2].request("DPP_BOOTSTRAP_GET_URI %d" % id2)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri2)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[2].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_CONFIGURATOR_ADD");
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id_2 = int(res)
|
|
|
|
dev[1].set("dpp_groups_override", '')
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id_2)
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator for STA2)")
|
|
|
|
ev = dev[2].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee STA2)")
|
|
|
|
|
|
|
|
logger.info("Provision STA5 with DPP Connector that has mismatching netAccessKey EC group")
|
|
|
|
wpas.set("dpp_config_processing", "2")
|
|
|
|
addr = wpas.own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
cmd += " curve=P-521"
|
|
|
|
res = wpas.request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id5 = int(res)
|
|
|
|
uri5 = wpas.request("DPP_BOOTSTRAP_GET_URI %d" % id5)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri5)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in wpas.request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
dev[1].set("dpp_groups_override", '')
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id)
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Configurator for STA0)")
|
|
|
|
ev = wpas.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP configuration not completed (Enrollee STA5)")
|
|
|
|
|
|
|
|
logger.info("Verify network introduction results")
|
|
|
|
ev = dev[0].wait_event(["DPP-INTRO"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network introduction result not seen on STA0")
|
|
|
|
if "status=8" not in ev:
|
|
|
|
raise Exception("Unexpected network introduction result on STA0: " + ev)
|
|
|
|
|
|
|
|
ev = dev[2].wait_event(["DPP-INTRO"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network introduction result not seen on STA2")
|
|
|
|
if "status=8" not in ev:
|
|
|
|
raise Exception("Unexpected network introduction result on STA2: " + ev)
|
|
|
|
|
|
|
|
ev = wpas.wait_event(["DPP-INTRO"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP network introduction result not seen on STA5")
|
|
|
|
if "status=7" not in ev:
|
|
|
|
raise Exception("Unexpected network introduction result on STA5: " + ev)
|
|
|
|
|
2017-10-22 12:49:57 +02:00
|
|
|
def run_dpp_proto_init(dev, test_dev, test, mutual=False):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
dev[test_dev].set("dpp_test", str(test))
|
|
|
|
|
|
|
|
cmd = "DPP_CONFIGURATOR_ADD"
|
|
|
|
res = dev[1].request(cmd);
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to add configurator")
|
|
|
|
conf_id = int(res)
|
|
|
|
|
|
|
|
addr = dev[0].own_addr().replace(':', '')
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
|
|
|
|
|
|
|
|
res = dev[1].request("DPP_QR_CODE " + uri0)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
if mutual:
|
|
|
|
addr = dev[1].own_addr().replace(':', '')
|
|
|
|
res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1b = int(res)
|
|
|
|
uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
|
|
|
|
|
|
|
|
res = dev[0].request("DPP_QR_CODE " + uri1b)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to parse QR Code URI")
|
|
|
|
id0b = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_LISTEN 2412"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_AUTH_INIT peer=%d configurator=%d conf=sta-dpp" % (id1, conf_id)
|
|
|
|
if mutual:
|
|
|
|
cmd += " own=%d" % id1b
|
|
|
|
if "OK" not in dev[1].request(cmd):
|
|
|
|
raise Exception("Failed to initiate DPP Authentication")
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_auth_req(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in Auth Req"""
|
|
|
|
run_dpp_proto_init(dev, 1, 1)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Request not seen")
|
|
|
|
if "type=0" not in ev or "ignore=invalid-attributes" not in ev:
|
|
|
|
raise Exception("Unexpected RX info: " + ev)
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_auth_resp(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in Auth Resp"""
|
|
|
|
run_dpp_proto_init(dev, 0, 2)
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Response not seen")
|
|
|
|
if "type=1" not in ev or "ignore=invalid-attributes" not in ev:
|
|
|
|
raise Exception("Unexpected RX info: " + ev)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=1)
|
|
|
|
if ev is None or "type=0" not in ev:
|
|
|
|
raise Exception("DPP Authentication Request not seen")
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_auth_conf(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in Auth Conf"""
|
|
|
|
run_dpp_proto_init(dev, 1, 3)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None or "type=0" not in ev:
|
|
|
|
raise Exception("DPP Authentication Request not seen")
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Authentication Confirm not seen")
|
|
|
|
if "type=2" not in ev or "ignore=invalid-attributes" not in ev:
|
|
|
|
raise Exception("Unexpected RX info: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_conf_req(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in Conf Req"""
|
|
|
|
run_dpp_proto_init(dev, 0, 6)
|
|
|
|
ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Configuration failure not seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_conf_resp(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in Conf Resp"""
|
|
|
|
run_dpp_proto_init(dev, 1, 7)
|
|
|
|
ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP Configuration failure not seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_zero_i_capab(dev, apdev):
|
|
|
|
"""DPP protocol testing - zero I-capability in Auth Req"""
|
|
|
|
run_dpp_proto_init(dev, 1, 8)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Invalid role in I-capabilities 0x00" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_zero_r_capab(dev, apdev):
|
|
|
|
"""DPP protocol testing - zero R-capability in Auth Resp"""
|
|
|
|
run_dpp_proto_init(dev, 0, 9)
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Unexpected role in R-capabilities 0x00" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=1)
|
|
|
|
if ev is None or "type=0" not in ev:
|
|
|
|
raise Exception("DPP Authentication Request not seen")
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def run_dpp_proto_auth_req_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init(dev, 1, test)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_req_no_r_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-bootstrap key in Auth Req"""
|
|
|
|
run_dpp_proto_auth_req_missing(dev, 10, "Missing or invalid required Responder Bootstrapping Key Hash attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_req_no_i_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-bootstrap key in Auth Req"""
|
|
|
|
run_dpp_proto_auth_req_missing(dev, 11, "Missing or invalid required Initiator Bootstrapping Key Hash attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_req_no_i_proto_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-proto key in Auth Req"""
|
|
|
|
run_dpp_proto_auth_req_missing(dev, 12, "Missing required Initiator Protocol Key attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_req_no_i_nonce(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-nonce in Auth Req"""
|
|
|
|
run_dpp_proto_auth_req_missing(dev, 13, "Missing or invalid I-nonce")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_req_no_i_capab(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-capab in Auth Req"""
|
|
|
|
run_dpp_proto_auth_req_missing(dev, 14, "Missing or invalid I-capab")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_req_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in Auth Req"""
|
|
|
|
run_dpp_proto_auth_req_missing(dev, 15, "Missing or invalid required Wrapped Data attribute")
|
|
|
|
|
|
|
|
def run_dpp_proto_auth_resp_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init(dev, 0, test, mutual=True)
|
|
|
|
if reason is None:
|
|
|
|
time.sleep(0.1)
|
|
|
|
return
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=1)
|
|
|
|
if ev is None or "type=0" not in ev:
|
|
|
|
raise Exception("DPP Authentication Request not seen")
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_status(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Status in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 16, "Missing or invalid required DPP Status attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_r_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-bootstrap key in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 17, "Missing or invalid required Responder Bootstrapping Key Hash attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_i_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-bootstrap key in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 18, None)
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_r_proto_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-Proto Key in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 19, "Missing required Responder Protocol Key attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_r_nonce(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-nonce in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 20, "Missing or invalid R-nonce")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_i_nonce(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-nonce in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 21, "Missing or invalid I-nonce")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_r_capab(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-capab in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 22, "Missing or invalid R-capabilities")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_r_auth(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-auth in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 23, "Missing or invalid Secondary Wrapped Data")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in Auth Resp"""
|
|
|
|
run_dpp_proto_auth_resp_missing(dev, 24, "Missing or invalid required Wrapped Data attribute")
|
|
|
|
|
2017-10-28 11:21:00 +02:00
|
|
|
def test_dpp_proto_auth_resp_i_nonce_mismatch(dev, apdev):
|
|
|
|
"""DPP protocol testing - I-nonce mismatch in Auth Resp"""
|
|
|
|
run_dpp_proto_init(dev, 0, 30, mutual=True)
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "I-nonce mismatch" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=1)
|
|
|
|
if ev is None or "type=0" not in ev:
|
|
|
|
raise Exception("DPP Authentication Request not seen")
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
|
|
|
|
if ev is not None:
|
|
|
|
raise Exception("Unexpected DPP message seen")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_incompatible_r_capab(dev, apdev):
|
|
|
|
"""DPP protocol testing - Incompatible R-capab in Auth Resp"""
|
|
|
|
run_dpp_proto_init(dev, 0, 31, mutual=True)
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Unexpected role in R-capabilities 0x02" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Peer reported incompatible R-capab role" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_resp_r_auth_mismatch(dev, apdev):
|
|
|
|
"""DPP protocol testing - R-auth mismatch in Auth Resp"""
|
|
|
|
run_dpp_proto_init(dev, 0, 32, mutual=True)
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Mismatching Responder Authenticating Tag" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Peer reported authentication failure" not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
2017-10-23 12:35:03 +02:00
|
|
|
def run_dpp_proto_auth_conf_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init(dev, 1, test, mutual=True)
|
|
|
|
if reason is None:
|
|
|
|
time.sleep(0.1)
|
|
|
|
return
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_conf_no_status(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Status in Auth Conf"""
|
|
|
|
run_dpp_proto_auth_conf_missing(dev, 25, "Missing or invalid required DPP Status attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_conf_no_r_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-bootstrap key in Auth Conf"""
|
|
|
|
run_dpp_proto_auth_conf_missing(dev, 26, "Missing or invalid required Responder Bootstrapping Key Hash attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_conf_no_i_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-bootstrap key in Auth Conf"""
|
2017-10-23 13:20:16 +02:00
|
|
|
run_dpp_proto_auth_conf_missing(dev, 27, "Missing Initiator Bootstrapping Key Hash attribute")
|
2017-10-23 12:35:03 +02:00
|
|
|
|
|
|
|
def test_dpp_proto_auth_conf_no_i_auth(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-Auth in Auth Conf"""
|
|
|
|
run_dpp_proto_auth_conf_missing(dev, 28, "Missing or invalid Initiator Authenticating Tag")
|
|
|
|
|
|
|
|
def test_dpp_proto_auth_conf_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in Auth Conf"""
|
|
|
|
run_dpp_proto_auth_conf_missing(dev, 29, "Missing or invalid required Wrapped Data attribute")
|
|
|
|
|
2017-10-28 11:21:00 +02:00
|
|
|
def test_dpp_proto_auth_conf_i_auth_mismatch(dev, apdev):
|
|
|
|
"""DPP protocol testing - I-auth mismatch in Auth Conf"""
|
|
|
|
run_dpp_proto_init(dev, 1, 33, mutual=True)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if "Mismatching Initiator Authenticating Tag" not in ev:
|
|
|
|
raise Excception("Unexpected failure: " + ev)
|
|
|
|
|
2017-11-03 19:59:35 +01:00
|
|
|
def run_dpp_proto_conf_req_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init(dev, 0, test)
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_req_no_e_nonce(dev, apdev):
|
|
|
|
"""DPP protocol testing - no E-nonce in Conf Req"""
|
|
|
|
run_dpp_proto_conf_req_missing(dev, 51,
|
|
|
|
"Missing or invalid Enrollee Nonce attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_req_no_config_attr_obj(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Config Attr Obj in Conf Req"""
|
|
|
|
run_dpp_proto_conf_req_missing(dev, 52,
|
|
|
|
"Missing or invalid Config Attributes attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_req_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in Conf Req"""
|
|
|
|
run_dpp_proto_conf_req_missing(dev, 53,
|
|
|
|
"Missing or invalid required Wrapped Data attribute")
|
|
|
|
|
|
|
|
def run_dpp_proto_conf_resp_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init(dev, 1, test)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_resp_no_e_nonce(dev, apdev):
|
|
|
|
"""DPP protocol testing - no E-nonce in Conf Resp"""
|
|
|
|
run_dpp_proto_conf_resp_missing(dev, 54,
|
|
|
|
"Missing or invalid Enrollee Nonce attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_resp_no_config_obj(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Config Object in Conf Resp"""
|
|
|
|
run_dpp_proto_conf_resp_missing(dev, 55,
|
|
|
|
"Missing required Configuration Object attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_resp_no_status(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Status in Conf Resp"""
|
|
|
|
run_dpp_proto_conf_resp_missing(dev, 56,
|
|
|
|
"Missing or invalid required DPP Status attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_resp_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in Conf Resp"""
|
|
|
|
run_dpp_proto_conf_resp_missing(dev, 57,
|
|
|
|
"Missing or invalid required Wrapped Data attribute")
|
|
|
|
|
2017-11-03 20:11:25 +01:00
|
|
|
def test_dpp_proto_conf_resp_invalid_status(dev, apdev):
|
|
|
|
"""DPP protocol testing - invalid Status in Conf Resp"""
|
|
|
|
run_dpp_proto_conf_resp_missing(dev, 58,
|
|
|
|
"Configurator rejected configuration")
|
|
|
|
|
|
|
|
def test_dpp_proto_conf_resp_e_nonce_mismatch(dev, apdev):
|
|
|
|
"""DPP protocol testing - E-nonce mismatch in Conf Resp"""
|
|
|
|
run_dpp_proto_conf_resp_missing(dev, 59,
|
|
|
|
"Enrollee Nonce mismatch")
|
|
|
|
|
2017-10-22 12:49:57 +02:00
|
|
|
def run_dpp_proto_init_pkex(dev, test_dev, test):
|
|
|
|
check_dpp_capab(dev[0])
|
|
|
|
check_dpp_capab(dev[1])
|
|
|
|
dev[test_dev].set("dpp_test", str(test))
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id0 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_BOOTSTRAP_GEN type=pkex"
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to generate bootstrapping info")
|
|
|
|
id1 = int(res)
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
|
|
|
|
res = dev[0].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (responder)")
|
|
|
|
cmd = "DPP_LISTEN 2437"
|
|
|
|
if "OK" not in dev[0].request(cmd):
|
|
|
|
raise Exception("Failed to start listen operation")
|
|
|
|
|
|
|
|
cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
|
|
|
|
res = dev[1].request(cmd)
|
|
|
|
if "FAIL" in res:
|
|
|
|
raise Exception("Failed to set PKEX data (initiator)")
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_pkex_cr_req(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in PKEX CR Req"""
|
|
|
|
run_dpp_proto_init_pkex(dev, 1, 4)
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None or "type=7" not in ev:
|
|
|
|
raise Exception("PKEX Exchange Request not seen")
|
|
|
|
ev = dev[0].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None or "type=9" not in ev:
|
|
|
|
raise Exception("PKEX Commit-Reveal Request not seen")
|
|
|
|
if "ignore=invalid-attributes" not in ev:
|
|
|
|
raise Exception("Unexpected RX info: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_after_wrapped_data_pkex_cr_resp(dev, apdev):
|
|
|
|
"""DPP protocol testing - attribute after Wrapped Data in PKEX CR Resp"""
|
|
|
|
run_dpp_proto_init_pkex(dev, 0, 5)
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None or "type=8" not in ev:
|
|
|
|
raise Exception("PKEX Exchange Response not seen")
|
|
|
|
ev = dev[1].wait_event(["DPP-RX"], timeout=5)
|
|
|
|
if ev is None or "type=10" not in ev:
|
|
|
|
raise Exception("PKEX Commit-Reveal Response not seen")
|
|
|
|
if "ignore=invalid-attributes" not in ev:
|
|
|
|
raise Exception("Unexpected RX info: " + ev)
|
2017-11-02 23:14:44 +01:00
|
|
|
|
|
|
|
def run_dpp_proto_pkex_req_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init_pkex(dev, 1, test)
|
|
|
|
ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
|
|
|
def run_dpp_proto_pkex_resp_missing(dev, test, reason):
|
|
|
|
run_dpp_proto_init_pkex(dev, 0, test)
|
|
|
|
ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DPP failure not seen")
|
|
|
|
if reason not in ev:
|
|
|
|
raise Exception("Unexpected failure: " + ev)
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_req_no_finite_cyclic_group(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Finite Cyclic Group in PKEX Exchange Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 34,
|
|
|
|
"Missing or invalid Finite Cyclic Group attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_req_no_encrypted_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Encrypted Key in PKEX Exchange Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 35,
|
|
|
|
"Missing Encrypted Key attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_resp_no_status(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Status in PKEX Exchange Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 36, "No DPP Status attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_resp_no_encrypted_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Encrypted Key in PKEX Exchange Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 37, "Missing Encrypted Key attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_req_no_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Bootstrap Key in PKEX Commit-Reveal Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 38,
|
|
|
|
"No valid peer bootstrapping key found")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_req_no_i_auth_tag(dev, apdev):
|
|
|
|
"""DPP protocol testing - no I-Auth Tag in PKEX Commit-Reveal Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 39, "No valid u (I-Auth tag) found")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_req_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in PKEX Commit-Reveal Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 40, "Missing or invalid required Wrapped Data attribute")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_resp_no_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Bootstrap Key in PKEX Commit-Reveal Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 41,
|
|
|
|
"No valid peer bootstrapping key found")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_resp_no_r_auth_tag(dev, apdev):
|
|
|
|
"""DPP protocol testing - no R-Auth Tag in PKEX Commit-Reveal Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 42, "No valid v (R-Auth tag) found")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_resp_no_wrapped_data(dev, apdev):
|
|
|
|
"""DPP protocol testing - no Wrapped Data in PKEX Commit-Reveal Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 43, "Missing or invalid required Wrapped Data attribute")
|
2017-11-02 23:49:35 +01:00
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_req_invalid_encrypted_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - invalid Encrypted Key in PKEX Exchange Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 44,
|
|
|
|
"Invalid Encrypted Key value")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_resp_invalid_encrypted_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - invalid Encrypted Key in PKEX Exchange Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 45,
|
|
|
|
"Invalid Encrypted Key value")
|
2017-11-03 18:41:24 +01:00
|
|
|
|
|
|
|
def test_dpp_proto_pkex_exchange_resp_invalid_status(dev, apdev):
|
|
|
|
"""DPP protocol testing - invalid Status in PKEX Exchange Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 46,
|
|
|
|
"PKEX failed (peer indicated failure)")
|
2017-11-03 18:58:41 +01:00
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_req_invalid_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - invalid Bootstrap Key in PKEX Commit-Reveal Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 47,
|
|
|
|
"Peer bootstrapping key is invalid")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_resp_invalid_bootstrap_key(dev, apdev):
|
|
|
|
"""DPP protocol testing - invalid Bootstrap Key in PKEX Commit-Reveal Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 48,
|
|
|
|
"Peer bootstrapping key is invalid")
|
2017-11-03 19:18:52 +01:00
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_req_i_auth_tag_mismatch(dev, apdev):
|
|
|
|
"""DPP protocol testing - I-auth tag mismatch in PKEX Commit-Reveal Request"""
|
|
|
|
run_dpp_proto_pkex_req_missing(dev, 49, "No valid u (I-Auth tag) found")
|
|
|
|
|
|
|
|
def test_dpp_proto_pkex_cr_resp_r_auth_tag_mismatch(dev, apdev):
|
|
|
|
"""DPP protocol testing - R-auth tag mismatch in PKEX Commit-Reveal Response"""
|
|
|
|
run_dpp_proto_pkex_resp_missing(dev, 50, "No valid v (R-Auth tag) found")
|