tests: EAP-IKEv2 local error cases
Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
5c8acf7d96
commit
4073ef22ae
1 changed files with 161 additions and 0 deletions
|
@ -4589,6 +4589,167 @@ def GenerateAuthenticatorResponse(password, nt_response, peer_challenge,
|
|||
resp = hashlib.sha1(data).digest()
|
||||
return resp
|
||||
|
||||
def test_eap_proto_ikev2_errors(dev, apdev):
|
||||
"""EAP-IKEv2 local error cases"""
|
||||
check_eap_capa(dev[0], "IKEV2")
|
||||
params = hostapd.wpa2_eap_params(ssid="eap-test")
|
||||
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
||||
|
||||
for i in range(1, 5):
|
||||
with alloc_fail(dev[0], i, "eap_ikev2_init"):
|
||||
dev[0].connect("eap-test", key_mgmt="WPA-EAP", scan_freq="2412",
|
||||
eap="IKEV2", identity="ikev2 user",
|
||||
password="ike password",
|
||||
wait_connect=False)
|
||||
ev = dev[0].wait_event(["EAP: Failed to initialize EAP method"],
|
||||
timeout=15)
|
||||
if ev is None:
|
||||
raise Exception("Timeout on EAP start")
|
||||
dev[0].request("REMOVE_NETWORK all")
|
||||
dev[0].wait_disconnected()
|
||||
|
||||
tests = [ (1, "ikev2_encr_encrypt"),
|
||||
(1, "ikev2_encr_decrypt"),
|
||||
(1, "ikev2_derive_auth_data"),
|
||||
(2, "ikev2_derive_auth_data"),
|
||||
(1, "=ikev2_decrypt_payload"),
|
||||
(1, "ikev2_encr_decrypt;ikev2_decrypt_payload"),
|
||||
(1, "ikev2_encr_encrypt;ikev2_build_encrypted"),
|
||||
(1, "ikev2_derive_sk_keys"),
|
||||
(2, "ikev2_derive_sk_keys"),
|
||||
(3, "ikev2_derive_sk_keys"),
|
||||
(4, "ikev2_derive_sk_keys"),
|
||||
(5, "ikev2_derive_sk_keys"),
|
||||
(6, "ikev2_derive_sk_keys"),
|
||||
(7, "ikev2_derive_sk_keys"),
|
||||
(8, "ikev2_derive_sk_keys"),
|
||||
(1, "eap_ikev2_derive_keymat;eap_ikev2_peer_keymat"),
|
||||
(1, "eap_msg_alloc;eap_ikev2_build_msg"),
|
||||
(1, "eap_ikev2_getKey"),
|
||||
(1, "eap_ikev2_get_emsk"),
|
||||
(1, "eap_ikev2_get_session_id"),
|
||||
(1, "=ikev2_derive_keys"),
|
||||
(2, "=ikev2_derive_keys"),
|
||||
(1, "wpabuf_alloc;ikev2_process_kei"),
|
||||
(1, "=ikev2_process_idi"),
|
||||
(1, "ikev2_derive_auth_data;ikev2_build_auth"),
|
||||
(1, "wpabuf_alloc;ikev2_build_sa_init"),
|
||||
(2, "wpabuf_alloc;ikev2_build_sa_init"),
|
||||
(3, "wpabuf_alloc;ikev2_build_sa_init"),
|
||||
(4, "wpabuf_alloc;ikev2_build_sa_init"),
|
||||
(5, "wpabuf_alloc;ikev2_build_sa_init"),
|
||||
(6, "wpabuf_alloc;ikev2_build_sa_init"),
|
||||
(1, "wpabuf_alloc;ikev2_build_sa_auth"),
|
||||
(2, "wpabuf_alloc;ikev2_build_sa_auth"),
|
||||
(1, "ikev2_build_auth;ikev2_build_sa_auth") ]
|
||||
for count, func in tests:
|
||||
with alloc_fail(dev[0], count, func):
|
||||
dev[0].connect("eap-test", key_mgmt="WPA-EAP", scan_freq="2412",
|
||||
eap="IKEV2", identity="ikev2 user",
|
||||
password="ike password", erp="1", wait_connect=False)
|
||||
ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD"],
|
||||
timeout=15)
|
||||
if ev is None:
|
||||
raise Exception("Timeout on EAP start")
|
||||
ok = False
|
||||
for j in range(10):
|
||||
state = dev[0].request('GET_ALLOC_FAIL')
|
||||
if state.startswith('0:'):
|
||||
ok = True
|
||||
break
|
||||
time.sleep(0.1)
|
||||
if not ok:
|
||||
raise Exception("No allocation failure seen for %d:%s" % (count, func))
|
||||
dev[0].request("REMOVE_NETWORK all")
|
||||
dev[0].wait_disconnected()
|
||||
|
||||
tests = [ (1, "wpabuf_alloc;ikev2_build_notify"),
|
||||
(2, "wpabuf_alloc;ikev2_build_notify"),
|
||||
(1, "ikev2_build_encrypted;ikev2_build_notify") ]
|
||||
for count, func in tests:
|
||||
with alloc_fail(dev[0], count, func):
|
||||
dev[0].connect("eap-test", key_mgmt="WPA-EAP", scan_freq="2412",
|
||||
eap="IKEV2", identity="ikev2 user",
|
||||
password="wrong password", erp="1",
|
||||
wait_connect=False)
|
||||
ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD"],
|
||||
timeout=15)
|
||||
if ev is None:
|
||||
raise Exception("Timeout on EAP start")
|
||||
ok = False
|
||||
for j in range(10):
|
||||
state = dev[0].request('GET_ALLOC_FAIL')
|
||||
if state.startswith('0:'):
|
||||
ok = True
|
||||
break
|
||||
time.sleep(0.1)
|
||||
if not ok:
|
||||
raise Exception("No allocation failure seen for %d:%s" % (count, func))
|
||||
dev[0].request("REMOVE_NETWORK all")
|
||||
dev[0].wait_disconnected()
|
||||
|
||||
tests = [ (1, "ikev2_integ_hash"),
|
||||
(1, "ikev2_integ_hash;ikev2_decrypt_payload"),
|
||||
(1, "os_get_random;ikev2_build_encrypted"),
|
||||
(1, "ikev2_prf_plus;ikev2_derive_sk_keys"),
|
||||
(1, "eap_ikev2_derive_keymat;eap_ikev2_peer_keymat"),
|
||||
(1, "os_get_random;ikev2_build_sa_init"),
|
||||
(2, "os_get_random;ikev2_build_sa_init"),
|
||||
(1, "ikev2_integ_hash;eap_ikev2_validate_icv"),
|
||||
(1, "hmac_sha1_vector;?ikev2_prf_hash;ikev2_derive_keys"),
|
||||
(1, "hmac_sha1_vector;?ikev2_prf_hash;ikev2_derive_auth_data"),
|
||||
(2, "hmac_sha1_vector;?ikev2_prf_hash;ikev2_derive_auth_data"),
|
||||
(3, "hmac_sha1_vector;?ikev2_prf_hash;ikev2_derive_auth_data") ]
|
||||
for count, func in tests:
|
||||
with fail_test(dev[0], count, func):
|
||||
dev[0].connect("eap-test", key_mgmt="WPA-EAP", scan_freq="2412",
|
||||
eap="IKEV2", identity="ikev2 user",
|
||||
password="ike password", wait_connect=False)
|
||||
ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD"],
|
||||
timeout=15)
|
||||
if ev is None:
|
||||
raise Exception("Timeout on EAP start")
|
||||
ok = False
|
||||
for j in range(10):
|
||||
state = dev[0].request('GET_FAIL')
|
||||
if state.startswith('0:'):
|
||||
ok = True
|
||||
break
|
||||
time.sleep(0.1)
|
||||
if not ok:
|
||||
raise Exception("No failure seen for %d:%s" % (count, func))
|
||||
dev[0].request("REMOVE_NETWORK all")
|
||||
dev[0].wait_disconnected()
|
||||
|
||||
params = { "ssid": "eap-test2", "wpa": "2", "wpa_key_mgmt": "WPA-EAP",
|
||||
"rsn_pairwise": "CCMP", "ieee8021x": "1",
|
||||
"eap_server": "1", "eap_user_file": "auth_serv/eap_user.conf",
|
||||
"fragment_size": "50" }
|
||||
hostapd.add_ap(apdev[1]['ifname'], params)
|
||||
|
||||
tests = [ (1, "eap_ikev2_build_frag_ack"),
|
||||
(1, "wpabuf_alloc;eap_ikev2_process_fragment") ]
|
||||
for count, func in tests:
|
||||
with alloc_fail(dev[0], count, func):
|
||||
dev[0].connect("eap-test2", key_mgmt="WPA-EAP", scan_freq="2412",
|
||||
eap="IKEV2", identity="ikev2 user",
|
||||
password="ike password", erp="1", wait_connect=False)
|
||||
ev = dev[0].wait_event(["CTRL-EVENT-EAP-PROPOSED-METHOD"],
|
||||
timeout=15)
|
||||
if ev is None:
|
||||
raise Exception("Timeout on EAP start")
|
||||
ok = False
|
||||
for j in range(10):
|
||||
state = dev[0].request('GET_ALLOC_FAIL')
|
||||
if state.startswith('0:'):
|
||||
ok = True
|
||||
break
|
||||
time.sleep(0.1)
|
||||
if not ok:
|
||||
raise Exception("No allocation failure seen for %d:%s" % (count, func))
|
||||
dev[0].request("REMOVE_NETWORK all")
|
||||
dev[0].wait_disconnected()
|
||||
|
||||
def test_eap_proto_mschapv2(dev, apdev):
|
||||
"""EAP-MSCHAPv2 protocol tests"""
|
||||
check_eap_capa(dev[0], "MSCHAPV2")
|
||||
|
|
Loading…
Reference in a new issue