tests: 4-way handshake and the first msg 4/4 getting lost
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
f51f54a007
commit
0f74bd41c5
1 changed files with 67 additions and 0 deletions
|
@ -1040,3 +1040,70 @@ def test_ap_wpa2_psk_ifdown(dev, apdev):
|
||||||
raise Exception("No INTERFACE-ENABLED event")
|
raise Exception("No INTERFACE-ENABLED event")
|
||||||
dev[0].wait_connected()
|
dev[0].wait_connected()
|
||||||
hwsim_utils.test_connectivity(dev[0], hapd)
|
hwsim_utils.test_connectivity(dev[0], hapd)
|
||||||
|
|
||||||
|
def test_ap_wpa2_psk_drop_first_msg_4(dev, apdev):
|
||||||
|
"""WPA2-PSK and first EAPOL-Key msg 4/4 dropped"""
|
||||||
|
bssid = apdev[0]['bssid']
|
||||||
|
ssid = "test-wpa2-psk"
|
||||||
|
passphrase = 'qwertyuiop'
|
||||||
|
psk = '602e323e077bc63bd80307ef4745b754b0ae0a925c2638ecd13a794b9527b9e6'
|
||||||
|
params = hostapd.wpa2_params(ssid=ssid)
|
||||||
|
params['wpa_psk'] = psk
|
||||||
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
||||||
|
hapd.request("SET ext_eapol_frame_io 1")
|
||||||
|
dev[0].request("SET ext_eapol_frame_io 1")
|
||||||
|
dev[0].connect(ssid, psk=passphrase, scan_freq="2412", wait_connect=False)
|
||||||
|
addr = dev[0].own_addr()
|
||||||
|
|
||||||
|
# EAPOL-Key msg 1/4
|
||||||
|
ev = hapd.wait_event(["EAPOL-TX"], timeout=15)
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("Timeout on EAPOL-TX from hostapd")
|
||||||
|
res = dev[0].request("EAPOL_RX " + bssid + " " + ev.split(' ')[2])
|
||||||
|
if "OK" not in res:
|
||||||
|
raise Exception("EAPOL_RX to wpa_supplicant failed")
|
||||||
|
|
||||||
|
# EAPOL-Key msg 2/4
|
||||||
|
ev = dev[0].wait_event(["EAPOL-TX"], timeout=15)
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("Timeout on EAPOL-TX from wpa_supplicant")
|
||||||
|
res = hapd.request("EAPOL_RX " + addr + " " + ev.split(' ')[2])
|
||||||
|
if "OK" not in res:
|
||||||
|
raise Exception("EAPOL_RX to hostapd failed")
|
||||||
|
|
||||||
|
# EAPOL-Key msg 3/4
|
||||||
|
ev = hapd.wait_event(["EAPOL-TX"], timeout=15)
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("Timeout on EAPOL-TX from hostapd")
|
||||||
|
res = dev[0].request("EAPOL_RX " + bssid + " " + ev.split(' ')[2])
|
||||||
|
if "OK" not in res:
|
||||||
|
raise Exception("EAPOL_RX to wpa_supplicant failed")
|
||||||
|
|
||||||
|
# EAPOL-Key msg 4/4
|
||||||
|
ev = dev[0].wait_event(["EAPOL-TX"], timeout=15)
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("Timeout on EAPOL-TX from wpa_supplicant")
|
||||||
|
logger.info("Drop the first EAPOL-Key msg 4/4")
|
||||||
|
|
||||||
|
# wpa_supplicant believes now that 4-way handshake succeeded; hostapd
|
||||||
|
# doesn't. Use normal EAPOL TX/RX to handle retries.
|
||||||
|
hapd.request("SET ext_eapol_frame_io 0")
|
||||||
|
dev[0].request("SET ext_eapol_frame_io 0")
|
||||||
|
dev[0].wait_connected()
|
||||||
|
|
||||||
|
ev = hapd.wait_event(["AP-STA-CONNECTED"], timeout=15)
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("Timeout on AP-STA-CONNECTED from hostapd")
|
||||||
|
|
||||||
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=0.1)
|
||||||
|
if ev is not None:
|
||||||
|
logger.info("Disconnection detected")
|
||||||
|
# The EAPOL-Key retries are supposed to allow the connection to be
|
||||||
|
# established without having to reassociate. However, this does not
|
||||||
|
# currently work since mac80211 ends up encrypting EAPOL-Key msg 4/4
|
||||||
|
# after the pairwise key has been configured and AP will drop those and
|
||||||
|
# disconnect the station after reaching retransmission limit. Connection
|
||||||
|
# is then established after reassociation. Once that behavior has been
|
||||||
|
# optimized to prevent EAPOL-Key frame encryption for retransmission
|
||||||
|
# case, this exception can be uncommented here.
|
||||||
|
#raise Exception("Unexpected disconnection")
|
||||||
|
|
Loading…
Reference in a new issue