# Test cases for Device Provisioning Protocol (DPP) # Copyright (c) 2017, Qualcomm Atheros, Inc. # Copyright (c) 2018-2019, The Linux Foundation # Copyright (c) 2021-2022, Qualcomm Innovation Center, Inc. # # This software may be distributed under the terms of the BSD license. # See README for more details. import base64 import binascii import hashlib import logging logger = logging.getLogger() import os import socket import struct import subprocess import time try: from socketserver import StreamRequestHandler, TCPServer except ImportError: from SocketServer import StreamRequestHandler, TCPServer import hostapd import hwsim_utils from hwsim import HWSimRadio from utils import * from wpasupplicant import WpaSupplicant from wlantest import WlantestCapture try: import OpenSSL openssl_imported = True except ImportError: openssl_imported = False def check_dpp_capab(dev, brainpool=False, min_ver=1): if "UNKNOWN COMMAND" in dev.request("DPP_BOOTSTRAP_GET_URI 0"): raise HwsimSkip("DPP not supported") if brainpool: tls = dev.request("GET tls_library") if (not tls.startswith("OpenSSL") or "run=BoringSSL" in tls) and not tls.startswith("wolfSSL"): raise HwsimSkip("Crypto library does not support Brainpool curves: " + tls) capa = dev.request("GET_CAPABILITY dpp") ver = 1 if capa.startswith("DPP="): ver = int(capa[4:]) if ver < min_ver: raise HwsimSkip("DPP version %d not supported" % min_ver) return ver def wait_dpp_fail(dev, expected=None): ev = dev.wait_event(["DPP-FAIL"], timeout=5) if ev is None: raise Exception("Failure not reported") if expected and expected not in ev: raise Exception("Unexpected result: " + ev) def test_dpp_qr_code_parsing(dev, apdev): """DPP QR Code parsing""" check_dpp_capab(dev[0]) id = [] tests = ["DPP:C:81/1,115/36;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:C:81/1,81/2,81/3,81/4,81/5,81/6,81/7,81/8,81/9,81/10,81/11,81/12,81/13,82/14,83/1,83/2,83/3,83/4,83/5,83/6,83/7,83/8,83/9,84/5,84/6,84/7,84/8,84/9,84/10,84/11,84/12,84/13,115/36;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:C:81/1,2,3,4,5,6,7,8,9,10,11,12,13,82/14,83/1,2,3,4,5,6,7,8,9,84/5,6,7,8,9,10,11,12,13,115/36;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:C:81/1,2,3;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:H:192.168.1.1;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:H:192.168.1.1:12345;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:H:fe80::1234:5678:9abc:def0;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:H:[fe80::1234:5678:9abc:def0]:12345;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:I:;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"] for uri in tests: id.append(dev[0].dpp_qr_code(uri)) uri2 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id[-1]) if uri != uri2: raise Exception("Returned URI does not match") tests = ["foo", "DPP:", "DPP:;;", "DPP:C:1/2;M:;K;;", "DPP:I:;M:01020304050;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:K:" + base64.b64encode(b"hello").decode() + ";;", "DPP:K:MEkwEwYHKoZIzj0CAQYIKoZIzj0DAQEDMgAEXiJuIWt1Q/CPCkuULechh37UsXPmbUANOeN5U9sOQROE4o/NEFeFEejROHYwwehF;;", "DPP:K:MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANNZaZA4T/kRDjnmpI1ACOJhAuTIIEk2KFOpS6XPpGF+EVr/ao3XemkE0/nzXmGaLzLqTUCJknSdxTnVPeWfCVsCAwEAAQ==;;", "DPP:K:MIIBCjCB0wYHKoZIzj0CATCBxwIBATAkBgcqhkjOPQEBAhkA/////////////////////v//////////MEsEGP////////////////////7//////////AQYZCEFGeWcgOcPp+mrciQwSf643uzBRrmxAxUAMEWub8hCL2TtV5Uo04Eg6uEhltUEMQQYjagOsDCQ9ny/IOtDoYgA9P8K/YL/EBIHGSuV/8jaeGMQEe1rJM3Vc/l3oR55SBECGQD///////////////+Z3vg2FGvJsbTSKDECAQEDMgAEXiJuIWt1Q/CPCkuULechh37UsXPmbUANOeN5U9sOQROE4o/NEFeFEejROHYwwehF;;", "DPP:I:foo\tbar;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;", "DPP:C:1;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:C:81/1a;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:C:1/2000,81/-1;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;", "DPP:C:-1/1;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;"] for t in tests: res = dev[0].request("DPP_QR_CODE " + t) if "FAIL" not in res: raise Exception("Accepted invalid QR Code: " + t) logger.info("ID: " + str(id)) if len(id) != len(set(id)): raise Exception("Duplicate ID returned") if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_REMOVE 12345678"): raise Exception("DPP_BOOTSTRAP_REMOVE accepted unexpectedly") if "OK" not in dev[0].request("DPP_BOOTSTRAP_REMOVE %d" % id[1]): raise Exception("DPP_BOOTSTRAP_REMOVE failed") id = dev[0].dpp_bootstrap_gen() uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) logger.info("Generated URI: " + uri) dev[0].dpp_qr_code(uri) id = dev[0].dpp_bootstrap_gen(chan="81/1,115/36", mac="010203040506", info="foo") uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) logger.info("Generated URI: " + uri) dev[0].dpp_qr_code(uri) def test_dpp_uri_version(dev, apdev): """DPP URI version information""" check_dpp_capab(dev[0], min_ver=2) id0 = dev[0].dpp_bootstrap_gen() uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("Generated URI: " + uri) id1 = dev[0].dpp_qr_code(uri) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id1) logger.info("Parsed URI info:\n" + info) capa = dev[0].request("GET_CAPABILITY dpp") ver = 1 if capa.startswith("DPP="): ver = int(capa[4:]) if "version=%d" % ver not in info.splitlines(): raise Exception("Unexpected version information (with indication)") dev[0].set("dpp_version_override", "1") id0 = dev[0].dpp_bootstrap_gen() uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("Generated URI: " + uri) id1 = dev[0].dpp_qr_code(uri) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id1) logger.info("Parsed URI info:\n" + info) if "version=0" not in info.splitlines(): raise Exception("Unexpected version information (without indication)") def test_dpp_uri_supported_curves(dev, apdev): """DPP URI supported curves""" check_dpp_capab(dev[0], min_ver=3) tests = [("P-256", "1"), ("P-384", "2"), ("P-521", "4"), ("BP-256", "8"), ("BP-384", "01"), ("BP-512", "02"), ("P-256:P-384:P-521", "7"), ("P-256:BP-512", "12"), ("P-256:P-384:BP-384", "31"), ("P-256:P-384:P-521:BP-256:BP-384:BP-512", "f3")] for t in tests: logger.info("Supported list: " + t[0]) id0 = dev[0].dpp_bootstrap_gen(supported_curves=t[0]) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("Generated URI: " + uri) if ";B:%s;" % t[1] not in uri: raise Exception("Supported curves(1) not indicated correctly: " + uri) id1 = dev[0].dpp_qr_code(uri) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id1) logger.info("Parsed URI info:\n" + info) if "supp_curves=" + t[0] not in info.splitlines(): raise Exception("supp_curves not indicated correctly in info") def test_dpp_uri_host(dev, apdev): """DPP URI host""" check_dpp_capab(dev[0], min_ver=3) tests = [("192.168.1.1", "192.168.1.1 8908"), ("192.168.1.1:12345", "192.168.1.1 12345"), ("fe80::1234:5678:9abc:def0", "fe80::1234:5678:9abc:def0 8908"), ("[fe80::1234:5678:9abc:def0]:12345", "fe80::1234:5678:9abc:def0 12345")] for t in tests: logger.info("host: " + t[0]) id0 = dev[0].dpp_bootstrap_gen(host=t[0]) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("Generated URI: " + uri) if ";H:%s;" % t[0] not in uri: raise Exception("host not indicated correctly: " + uri) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id0) logger.info("Parsed URI info:\n" + info) if "host=" + t[1] not in info.splitlines(): raise Exception("host not indicated correctly in info") def test_dpp_qr_code_parsing_fail(dev, apdev): """DPP QR Code parsing local failure""" check_dpp_capab(dev[0]) with alloc_fail(dev[0], 1, "dpp_parse_uri_info"): if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"): raise Exception("DPP_QR_CODE failure not reported") with alloc_fail(dev[0], 1, "dpp_parse_uri_pk"): if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"): raise Exception("DPP_QR_CODE failure not reported") with fail_test(dev[0], 1, "dpp_parse_uri_pk"): if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"): raise Exception("DPP_QR_CODE failure not reported") with alloc_fail(dev[0], 1, "dpp_parse_uri"): if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"): raise Exception("DPP_QR_CODE failure not reported") dpp_key_p256 = "30570201010420777fc55dc51e967c10ec051b91d860b5f1e6c934e48d5daffef98d032c64b170a00a06082a8648ce3d030107a124032200020c804188c7f85beb6e91070d2b3e5e39b90ca77b4d3c5251bc1844d6ca29dcad" dpp_key_p384 = "307402010104302f56fdd83b5345cacb630eb7c22fa5ad5daba37307c95191e2a75756d137003bd8b32dbcb00eb5650c1eb499ecfcaec0a00706052b81040022a13403320003615ec2141b5b77aebb6523f8a012755f9a34405a8398d2ceeeebca7f5ce868bf55056cba4c4ec62fad3ed26dd29e0f23" dpp_key_p521 = "308198020101044200c8010d5357204c252551aaf4e210343111e503fd1dc615b257058997c49b6b643c975226e93be8181cca3d83a7072defd161dfbdf433c19abe1f2ad51867a05761a00706052b81040023a1460344000301cdf3608b1305fe34a1f976095dcf001182b9973354efe156291a66830292f9babd8f412ad462958663e7a75d1d0610abdfc3dd95d40669f7ab3bc001668cfb3b7c" dpp_key_bp256 = "3058020101042057133a676fb60bf2a3e6797e19833c7b0f89dc192ab99ab5fa377ae23a157765a00b06092b2403030208010107a12403220002945d9bf7ce30c9c1ac0ff21ca62b984d5bb80ff69d2be8c9716ab39a10d2caf0" dpp_key_bp384 = "307802010104304902df9f3033a9b7128554c0851dc7127c3573eed150671dae74c0013e9896a9b1c22b6f7d43d8a2ebb7cd474dc55039a00b06092b240303020801010ba13403320003623cb5e68787f351faababf3425161571560add2e6f9a306fcbffb507735bf955bb46dd20ba246b0d5cadce73e5bd6a6" dpp_key_bp512 = "30819802010104405803494226eb7e50bf0e90633f37e7e35d33f5fa502165eeba721d927f9f846caf12e925701d18e123abaaaf4a7edb4fc4de21ce18bc10c4d12e8b3439f74e40a00b06092b240303020801010da144034200033b086ccd47486522d35dc16fbb2229642c2e9e87897d45abbf21f9fb52acb5a6272b31d1b227c3e53720769cc16b4cb181b26cd0d35fe463218aaedf3b6ec00a" def test_dpp_qr_code_curves(dev, apdev): """DPP QR Code and supported curves""" check_dpp_capab(dev[0]) tests = [("prime256v1", dpp_key_p256), ("secp384r1", dpp_key_p384), ("secp521r1", dpp_key_p521)] for curve, hex in tests: id = dev[0].dpp_bootstrap_gen(key=hex) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id) if "FAIL" in info: raise Exception("Failed to get info for " + curve) if "curve=" + curve not in info: raise Exception("Curve mismatch for " + curve) def test_dpp_qr_code_curves_brainpool(dev, apdev): """DPP QR Code and supported Brainpool curves""" check_dpp_capab(dev[0], brainpool=True) tests = [("brainpoolP256r1", dpp_key_bp256), ("brainpoolP384r1", dpp_key_bp384), ("brainpoolP512r1", dpp_key_bp512)] for curve, hex in tests: id = dev[0].dpp_bootstrap_gen(key=hex) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id) if "FAIL" in info: raise Exception("Failed to get info for " + curve) if "curve=" + curve not in info: raise Exception("Curve mismatch for " + curve) def test_dpp_qr_code_unsupported_curve(dev, apdev): """DPP QR Code and unsupported curve""" check_dpp_capab(dev[0]) id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode curve=unsupported") if "FAIL" not in id: raise Exception("Unsupported curve accepted") tests = ["30", "305f02010104187f723ed9e1b41979ec5cd02eb82696efc76b40e277661049a00a06082a8648ce3d030101a134033200043f292614dea97c43f500f069e79ae9fb48f8b07369180de5eec8fa2bc9eea5af7a46dc335f52f10cb1c0e9464201d41b"] for hex in tests: id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode key=" + hex) if "FAIL" not in id: raise Exception("Unsupported/invalid curve accepted") def test_dpp_qr_code_keygen_fail(dev, apdev): """DPP QR Code and keygen failure""" check_dpp_capab(dev[0]) with alloc_fail(dev[0], 1, "crypto_ec_key_get_subject_public_key;dpp_keygen"): if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode"): raise Exception("Failure not reported") with alloc_fail(dev[0], 1, "base64_gen_encode;dpp_keygen"): if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode"): raise Exception("Failure not reported") def test_dpp_qr_code_curve_select(dev, apdev): """DPP QR Code and curve selection""" check_dpp_capab(dev[0], brainpool=True) check_dpp_capab(dev[1], brainpool=True) bi = [] for key in [dpp_key_p256, dpp_key_p384, dpp_key_p521, dpp_key_bp256, dpp_key_bp384, dpp_key_bp512]: id = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True, key=key) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id) for i in info.splitlines(): if '=' in i: name, val = i.split('=') if name == "curve": curve = val break uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) bi.append((curve, uri)) for curve, uri in bi: logger.info("Curve: " + curve) logger.info("URI: " + uri) dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri) wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=True, stop_responder=True, stop_initiator=True) def test_dpp_qr_code_auth_broadcast(dev, apdev): """DPP QR Code and authentication exchange (broadcast)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0) wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_qr_code_auth_unicast(dev, apdev): """DPP QR Code and authentication exchange (unicast)""" run_dpp_qr_code_auth_unicast(dev, apdev, None) def test_dpp_qr_code_auth_unicast_ap_enrollee(dev, apdev): """DPP QR Code and authentication exchange (AP enrollee)""" run_dpp_qr_code_auth_unicast(dev, apdev, None, netrole="ap") def run_dpp_configurator_enrollee(dev, apdev, conf_curve=None): run_dpp_qr_code_auth_unicast(dev, apdev, None, netrole="configurator", configurator=True, conf_curve=conf_curve, conf="configurator") ev = dev[0].wait_event(["DPP-CONFIGURATOR-ID"], timeout=2) if ev is None: raise Exception("No Configurator instance added") def test_dpp_configurator_enrollee(dev, apdev): """DPP Configurator enrolling""" run_dpp_configurator_enrollee(dev, apdev) def test_dpp_configurator_enrollee_prime256v1(dev, apdev): """DPP Configurator enrolling (prime256v1)""" run_dpp_configurator_enrollee(dev, apdev, conf_curve="prime256v1") def test_dpp_configurator_enrollee_secp384r1(dev, apdev): """DPP Configurator enrolling (secp384r1)""" run_dpp_configurator_enrollee(dev, apdev, conf_curve="secp384r1") def test_dpp_configurator_enrollee_secp521r1(dev, apdev): """DPP Configurator enrolling (secp521r1)""" run_dpp_configurator_enrollee(dev, apdev, conf_curve="secp521r1") def test_dpp_configurator_enrollee_brainpoolP256r1(dev, apdev): """DPP Configurator enrolling (brainpoolP256r1)""" run_dpp_configurator_enrollee(dev, apdev, conf_curve="brainpoolP256r1") def test_dpp_configurator_enrollee_brainpoolP384r1(dev, apdev): """DPP Configurator enrolling (brainpoolP384r1)""" run_dpp_configurator_enrollee(dev, apdev, conf_curve="brainpoolP384r1") def test_dpp_configurator_enrollee_brainpoolP512r1(dev, apdev): """DPP Configurator enrolling (brainpoolP512r1)""" run_dpp_configurator_enrollee(dev, apdev, conf_curve="brainpoolP512r1") def test_dpp_configurator_enroll_conf(dev, apdev): """DPP Configurator enrolling followed by use of the new Configurator""" check_dpp_capab(dev[0], min_ver=2) try: dev[0].set("dpp_config_processing", "2") run_dpp_configurator_enroll_conf(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_configurator_enroll_conf(dev, apdev): run_dpp_qr_code_auth_unicast(dev, apdev, None, netrole="configurator", configurator=True, conf="configurator", qr="mutual", stop_responder=False) ev = dev[0].wait_event(["DPP-CONFIGURATOR-ID"], timeout=2) if ev is None: raise Exception("No Configurator instance added") dev[1].reset() dev[0].dump_monitor() ssid = "test-network" passphrase = "test-passphrase" dev[0].set("dpp_configurator_params", "conf=sta-psk ssid=%s pass=%s" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(passphrase.encode()).decode())) dev[0].dpp_listen(2412, role="configurator") id0 = dev[0].dpp_bootstrap_gen(chan="81/1") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[1].dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1]) def test_dpp_qr_code_curve_prime256v1(dev, apdev): """DPP QR Code and curve prime256v1""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1") def test_dpp_qr_code_curve_secp384r1(dev, apdev): """DPP QR Code and curve secp384r1""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1") def test_dpp_qr_code_curve_secp521r1(dev, apdev): """DPP QR Code and curve secp521r1""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1") def test_dpp_qr_code_curve_brainpoolP256r1(dev, apdev): """DPP QR Code and curve brainpoolP256r1""" run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP256r1") def test_dpp_qr_code_curve_brainpoolP384r1(dev, apdev): """DPP QR Code and curve brainpoolP384r1""" run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP384r1") def test_dpp_qr_code_curve_brainpoolP512r1(dev, apdev): """DPP QR Code and curve brainpoolP512r1""" run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP512r1") def test_dpp_qr_code_set_key(dev, apdev): """DPP QR Code and fixed bootstrapping key""" run_dpp_qr_code_auth_unicast(dev, apdev, None, key="30770201010420e5143ac74682cc6869a830e8f5301a5fa569130ac329b1d7dd6f2a7495dbcbe1a00a06082a8648ce3d030107a144034200045e13e167c33dbc7d85541e5509600aa8139bbb3e39e25898992c5d01be92039ee2850f17e71506ded0d6b25677441eae249f8e225c68dd15a6354dca54006383") def run_dpp_qr_code_auth_unicast(dev, apdev, curve, netrole=None, key=None, require_conf_success=False, init_extra=None, require_conf_failure=False, configurator=False, conf_curve=None, net_access_key_curve=None, conf=None, qr=None, stop_responder=True): min_ver = 3 if net_access_key_curve else 1 brainpool = (curve and "brainpool" in curve) or \ (conf_curve and "brainpool" in conf_curve) check_dpp_capab(dev[0], brainpool, min_ver=min_ver) check_dpp_capab(dev[1], brainpool, min_ver=min_ver) if configurator: conf_id = dev[1].dpp_configurator_add(curve=conf_curve, net_access_key_curve=net_access_key_curve) else: conf_id = None if qr == "mutual": logger.info("dev1 displays QR Code and dev0 scans it") id1 = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True, curve=curve) uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) id1c = dev[0].dpp_qr_code(uri1) else: id1 = None logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True, curve=curve, key=key) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412, netrole=netrole, qr=qr) dev[1].dpp_auth_init(uri=uri0, extra=init_extra, configurator=conf_id, conf=conf, own=id1) wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=not require_conf_success, allow_configurator_failure=not require_conf_success, require_configurator_failure=require_conf_failure, stop_responder=stop_responder) def test_dpp_qr_code_auth_mutual(dev, apdev): """DPP QR Code and authentication exchange (mutual)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 displays QR Code") id1b = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True) uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b) logger.info("dev0 scans QR Code") id0b = dev[0].dpp_qr_code(uri1b) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, own=id1b) ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5) if ev is None: raise Exception("DPP authentication direction not indicated (Initiator)") if "mutual=1" not in ev: raise Exception("Mutual authentication not used") wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_qr_code_auth_mutual2(dev, apdev): """DPP QR Code and authentication exchange (mutual2)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 displays QR Code") id1b = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True) uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412, qr="mutual") dev[1].dpp_auth_init(uri=uri0, own=id1b) ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5) if ev is None: raise Exception("Pending response not reported") ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5) if ev is None: raise Exception("QR Code scan for mutual authentication not requested") logger.info("dev0 scans QR Code") id0b = dev[0].dpp_qr_code(uri1b) ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5) if ev is None: raise Exception("DPP authentication direction not indicated (Initiator)") if "mutual=1" not in ev: raise Exception("Mutual authentication not used") wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_qr_code_auth_mutual_p_256(dev, apdev): """DPP QR Code and authentication exchange (mutual, autogen P-256)""" run_dpp_qr_code_auth_mutual(dev, apdev, "P-256") def test_dpp_qr_code_auth_mutual_p_384(dev, apdev): """DPP QR Code and authentication exchange (mutual, autogen P-384)""" run_dpp_qr_code_auth_mutual(dev, apdev, "P-384") def test_dpp_qr_code_auth_mutual_p_521(dev, apdev): """DPP QR Code and authentication exchange (mutual, autogen P-521)""" run_dpp_qr_code_auth_mutual(dev, apdev, "P-521") def test_dpp_qr_code_auth_mutual_bp_256(dev, apdev): """DPP QR Code and authentication exchange (mutual, autogen BP-256)""" run_dpp_qr_code_auth_mutual(dev, apdev, "BP-256") def test_dpp_qr_code_auth_mutual_bp_384(dev, apdev): """DPP QR Code and authentication exchange (mutual, autogen BP-384)""" run_dpp_qr_code_auth_mutual(dev, apdev, "BP-384") def test_dpp_qr_code_auth_mutual_bp_512(dev, apdev): """DPP QR Code and authentication exchange (mutual, autogen BP-512)""" run_dpp_qr_code_auth_mutual(dev, apdev, "BP-512") def run_dpp_qr_code_auth_mutual(dev, apdev, curve): check_dpp_capab(dev[0], curve and "BP-" in curve) check_dpp_capab(dev[1], curve and "BP-" in curve) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True, curve=curve) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412, qr="mutual") dev[1].dpp_auth_init(uri=uri0) ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5) if ev is None: raise Exception("Pending response not reported") uri = ev.split(' ')[1] ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5) if ev is None: raise Exception("QR Code scan for mutual authentication not requested") logger.info("dev0 scans QR Code") dev[0].dpp_qr_code(uri) ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5) if ev is None: raise Exception("DPP authentication direction not indicated (Initiator)") if "mutual=1" not in ev: raise Exception("Mutual authentication not used") wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_auth_resp_retries(dev, apdev): """DPP Authentication Response retries""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].set("dpp_resp_max_tries", "3") dev[0].set("dpp_resp_retry_time", "100") logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 displays QR Code") id1b = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True) uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412, qr="mutual") dev[1].dpp_auth_init(uri=uri0, own=id1b) ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5) if ev is None: raise Exception("Pending response not reported") ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5) if ev is None: raise Exception("QR Code scan for mutual authentication not requested") # Stop Initiator from listening to frames to force retransmission of the # DPP Authentication Response frame with Status=0 dev[1].request("DPP_STOP_LISTEN") dev[1].dump_monitor() dev[0].dump_monitor() logger.info("dev0 scans QR Code") id0b = dev[0].dpp_qr_code(uri1b) ev = dev[0].wait_event(["DPP-TX "], timeout=5) if ev is None or "type=1" not in ev: raise Exception("DPP Authentication Response not sent") ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=5) if ev is None: raise Exception("TX status for DPP Authentication Response not reported") if "result=no-ACK" not in ev: raise Exception("Unexpected TX status for Authentication Response: " + ev) ev = dev[0].wait_event(["DPP-TX "], timeout=15) if ev is None or "type=1" not in ev: raise Exception("DPP Authentication Response retransmission not sent") def test_dpp_qr_code_auth_mutual_not_used(dev, apdev): """DPP QR Code and authentication exchange (mutual not used)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 displays QR Code") id1b = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True) uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b) logger.info("dev0 does not scan QR Code") logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, own=id1b) ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5) if ev is None: raise Exception("DPP authentication direction not indicated (Initiator)") if "mutual=0" not in ev: raise Exception("Mutual authentication not used") wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_qr_code_auth_mutual_curve_mismatch(dev, apdev): """DPP QR Code and authentication exchange (mutual/mismatch)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 displays QR Code") id1b = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True, curve="secp384r1") uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b) logger.info("dev0 scans QR Code") id0b = dev[0].dpp_qr_code(uri1b) logger.info("dev1 scans QR Code") dev[1].dpp_auth_init(uri=uri0, own=id1b, expect_fail=True) def test_dpp_qr_code_auth_hostapd_mutual2(dev, apdev): """DPP QR Code and authentication exchange (hostapd mutual2)""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) logger.info("AP displays QR Code") id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri_h = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) logger.info("dev0 displays QR Code") id0b = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0b) logger.info("dev0 scans QR Code and initiates DPP Authentication") hapd.dpp_listen(2412, qr="mutual") dev[0].dpp_auth_init(uri=uri_h, own=id0b) ev = dev[0].wait_event(["DPP-RESPONSE-PENDING"], timeout=5) if ev is None: raise Exception("Pending response not reported") ev = hapd.wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5) if ev is None: raise Exception("QR Code scan for mutual authentication not requested") logger.info("AP scans QR Code") hapd.dpp_qr_code(uri0) wait_auth_success(hapd, dev[0], stop_responder=True) def test_dpp_qr_code_listen_continue(dev, apdev): """DPP QR Code and listen operation needing continuation""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) logger.info("Wait for listen to expire and get restarted") time.sleep(5.5) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[1].dpp_auth_init(uri=uri0) wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_qr_code_auth_initiator_enrollee(dev, apdev): """DPP QR Code and authentication exchange (Initiator in Enrollee role)""" try: run_dpp_qr_code_auth_initiator_enrollee(dev, apdev) finally: dev[0].set("gas_address3", "0") dev[1].set("gas_address3", "0") def run_dpp_qr_code_auth_initiator_enrollee(dev, apdev): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].request("SET gas_address3 1") dev[1].request("SET gas_address3 1") logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1], allow_enrollee_failure=True, stop_responder=True) def test_dpp_qr_code_auth_initiator_either_1(dev, apdev): """DPP QR Code and authentication exchange (Initiator in either role)""" run_dpp_qr_code_auth_initiator_either(dev, apdev, None, dev[1], dev[0]) def test_dpp_qr_code_auth_initiator_either_2(dev, apdev): """DPP QR Code and authentication exchange (Initiator in either role)""" run_dpp_qr_code_auth_initiator_either(dev, apdev, "enrollee", dev[1], dev[0]) def test_dpp_qr_code_auth_initiator_either_3(dev, apdev): """DPP QR Code and authentication exchange (Initiator in either role)""" run_dpp_qr_code_auth_initiator_either(dev, apdev, "configurator", dev[0], dev[1]) def run_dpp_qr_code_auth_initiator_either(dev, apdev, resp_role, conf_dev, enrollee_dev): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412, role=resp_role) dev[1].dpp_auth_init(uri=uri0, role="either") wait_auth_success(dev[0], dev[1], configurator=conf_dev, enrollee=enrollee_dev, allow_enrollee_failure=True, stop_responder=True) def run_init_incompatible_roles(dev, role="enrollee"): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code") id1 = dev[1].dpp_qr_code(uri0) logger.info("dev1 initiates DPP Authentication") dev[0].dpp_listen(2412, role=role) return id1 def test_dpp_qr_code_auth_incompatible_roles(dev, apdev): """DPP QR Code and authentication exchange (incompatible roles)""" id1 = run_init_incompatible_roles(dev) dev[1].dpp_auth_init(peer=id1, role="enrollee") ev = dev[1].wait_event(["DPP-NOT-COMPATIBLE"], timeout=5) if ev is None: raise Exception("DPP-NOT-COMPATIBLE event on initiator timed out") ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1) if ev is None: raise Exception("DPP-NOT-COMPATIBLE event on responder timed out") dev[1].dpp_auth_init(peer=id1, role="configurator") wait_auth_success(dev[0], dev[1], stop_responder=True) def test_dpp_qr_code_auth_incompatible_roles2(dev, apdev): """DPP QR Code and authentication exchange (incompatible roles 2)""" id1 = run_init_incompatible_roles(dev, role="configurator") dev[1].dpp_auth_init(peer=id1, role="configurator") ev = dev[1].wait_event(["DPP-NOT-COMPATIBLE"], timeout=5) if ev is None: raise Exception("DPP-NOT-COMPATIBLE event on initiator timed out") ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1) if ev is None: raise Exception("DPP-NOT-COMPATIBLE event on responder timed out") def test_dpp_qr_code_auth_incompatible_roles_failure(dev, apdev): """DPP QR Code and authentication exchange (incompatible roles failure)""" id1 = run_init_incompatible_roles(dev, role="configurator") with alloc_fail(dev[0], 1, "dpp_auth_build_resp_status"): dev[1].dpp_auth_init(peer=id1, role="configurator") ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1) if ev is None: raise Exception("DPP-NOT-COMPATIBLE event on responder timed out") def test_dpp_qr_code_auth_incompatible_roles_failure2(dev, apdev): """DPP QR Code and authentication exchange (incompatible roles failure 2)""" id1 = run_init_incompatible_roles(dev, role="configurator") with alloc_fail(dev[1], 1, "dpp_auth_resp_rx_status"): dev[1].dpp_auth_init(peer=id1, role="configurator") wait_fail_trigger(dev[1], "GET_ALLOC_FAIL") def test_dpp_qr_code_auth_incompatible_roles_failure3(dev, apdev): """DPP QR Code and authentication exchange (incompatible roles failure 3)""" id1 = run_init_incompatible_roles(dev, role="configurator") with fail_test(dev[1], 1, "dpp_auth_resp_rx_status"): dev[1].dpp_auth_init(peer=id1, role="configurator") wait_dpp_fail(dev[1], "AES-SIV decryption failed") def test_dpp_qr_code_auth_neg_chan(dev, apdev): """DPP QR Code and authentication exchange with requested different channel""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf_id = dev[1].dpp_configurator_add() logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, conf="sta-dpp", neg_freq=2462, configurator=conf_id) ev = dev[1].wait_event(["DPP-TX "], timeout=5) if ev is None: raise Exception("DPP Authentication Request not sent") if "freq=2412 type=0" not in ev: raise Exception("Unexpected TX data for Authentication Request: " + ev) ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None: raise Exception("DPP Authentication Request not received") if "freq=2412 type=0" not in ev: raise Exception("Unexpected RX data for Authentication Request: " + ev) ev = dev[1].wait_event(["DPP-TX-STATUS"], timeout=5) if ev is None: raise Exception("TX status for DPP Authentication Request not reported") if "freq=2412 result=SUCCESS" not in ev: raise Exception("Unexpected TX status for Authentication Request: " + ev) ev = dev[0].wait_event(["DPP-TX "], timeout=5) if ev is None: raise Exception("DPP Authentication Response not sent") if "freq=2462 type=1" not in ev: raise Exception("Unexpected TX data for Authentication Response: " + ev) ev = dev[1].wait_event(["DPP-RX"], timeout=5) if ev is None: raise Exception("DPP Authentication Response not received") if "freq=2462 type=1" not in ev: raise Exception("Unexpected RX data for Authentication Response: " + ev) ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=5) if ev is None: raise Exception("TX status for DPP Authentication Response not reported") if "freq=2462 result=SUCCESS" not in ev: raise Exception("Unexpected TX status for Authentication Response: " + ev) ev = dev[1].wait_event(["DPP-TX "], timeout=5) if ev is None: raise Exception("DPP Authentication Confirm not sent") if "freq=2462 type=2" not in ev: raise Exception("Unexpected TX data for Authentication Confirm: " + ev) ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None: raise Exception("DPP Authentication Confirm not received") if "freq=2462 type=2" not in ev: raise Exception("Unexpected RX data for Authentication Confirm: " + ev) ev = dev[1].wait_event(["DPP-TX-STATUS"], timeout=5) if ev is None: raise Exception("TX status for DPP Authentication Confirm not reported") if "freq=2462 result=SUCCESS" not in ev: raise Exception("Unexpected TX status for Authentication Confirm: " + ev) wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], stop_responder=True) def test_dpp_config_legacy(dev, apdev): """DPP Config Object for legacy network using passphrase""" check_dpp_capab(dev[1]) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", require_conf_success=True) def test_dpp_config_legacy_psk_hex(dev, apdev): """DPP Config Object for legacy network using PSK""" check_dpp_capab(dev[1]) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"' + 32*"12" + '"}}' dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", require_conf_success=True) def test_dpp_config_fragmentation(dev, apdev): """DPP Config Object for legacy network requiring fragmentation""" check_dpp_capab(dev[1]) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", require_conf_success=True) def test_dpp_config_legacy_gen(dev, apdev): """Generate DPP Config Object for legacy network""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-psk pass=%s" % binascii.hexlify(b"passphrase").decode(), require_conf_success=True) def test_dpp_config_legacy_gen_psk(dev, apdev): """Generate DPP Config Object for legacy network (PSK)""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-psk psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef", require_conf_success=True) def test_dpp_config_legacy_gen_two_conf(dev, apdev): """Generate DPP Config Object for legacy network (two config objects)""" check_dpp_capab(dev[0]) ssid1 = "test1" pass1 = "passphrase for psk" ssid2 = "test-2" pass2 = "password for sae" ssid1h = binascii.hexlify(ssid1.encode()).decode() pass1h = binascii.hexlify(pass1.encode()).decode() ssid2h = binascii.hexlify(ssid2.encode()).decode() pass2h = binascii.hexlify(pass2.encode()).decode() extra = "conf=sta-psk pass=%s ssid=%s @CONF-OBJ-SEP@ conf=sta-sae pass=%s ssid=%s" % (pass1h, ssid1h, pass2h, ssid2h) try: dev[0].set("dpp_config_processing", "1") run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra=extra, require_conf_success=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) ev = dev[0].wait_event(["DPP-CONFOBJ-AKM"], timeout=5) if ev is None or ev.split()[1] != "psk": raise Exception("Unexpected confobj 1 AKM: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-SSID"], timeout=5) if ev is None or ev.split()[1] != ssid1: raise Exception("Unexpected confobj 1 SSID: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-PASS"], timeout=5) if ev is None or ev.split()[1] != pass1h: raise Exception("Unexpected confobj 1 pass: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-AKM"], timeout=5) if ev is None or ev.split()[1] != "sae": raise Exception("Unexpected confobj 2 AKM: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-SSID"], timeout=5) if ev is None or ev.split()[1] != ssid2: raise Exception("Unexpected confobj 2 SSID: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-PASS"], timeout=5) if ev is None or ev.split()[1] != pass2h: raise Exception("Unexpected confobj 2 pass: " + str(ev)) val = dev[0].get_network(0, "ssid") if val != '"' + ssid1 + '"': raise Exception("Unexpected network 1 ssid: " + val) val = dev[0].get_network(0, "key_mgmt") if val != "WPA-PSK FT-PSK WPA-PSK-SHA256": raise Exception("Unexpected network 1 key_mgmt: " + val) val = dev[0].get_network(1, "ssid") if val != '"' + ssid2 + '"': raise Exception("Unexpected network 2 ssid: " + val) val = dev[0].get_network(1, "key_mgmt") if val != "SAE FT-SAE": raise Exception("Unexpected network 2 key_mgmt: " + val) def test_dpp_config_legacy_gen_two_conf_psk(dev, apdev): """Generate DPP Config Object for legacy network (two config objects, psk)""" check_dpp_capab(dev[0]) ssid1 = "test1" psk1 = "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef" ssid2 = "test-2" pass2 = "password for sae" ssid1h = binascii.hexlify(ssid1.encode()).decode() ssid2h = binascii.hexlify(ssid2.encode()).decode() pass2h = binascii.hexlify(pass2.encode()).decode() extra = "conf=sta-psk psk=%s ssid=%s @CONF-OBJ-SEP@ conf=sta-sae pass=%s ssid=%s" % (psk1, ssid1h, pass2h, ssid2h) try: dev[0].set("dpp_config_processing", "1") run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra=extra, require_conf_success=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) ev = dev[0].wait_event(["DPP-CONFOBJ-AKM"], timeout=5) if ev is None or ev.split()[1] != "psk": raise Exception("Unexpected confobj 1 AKM: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-SSID"], timeout=5) if ev is None or ev.split()[1] != ssid1: raise Exception("Unexpected confobj 1 SSID: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-PSK"], timeout=5) if ev is None or ev.split()[1] != psk1: raise Exception("Unexpected confobj 1 psk: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-AKM"], timeout=5) if ev is None or ev.split()[1] != "sae": raise Exception("Unexpected confobj 2 AKM: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-SSID"], timeout=5) if ev is None or ev.split()[1] != ssid2: raise Exception("Unexpected confobj 2 SSID: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-PASS"], timeout=5) if ev is None or ev.split()[1] != pass2h: raise Exception("Unexpected confobj 2 pass: " + str(ev)) val = dev[0].get_network(0, "ssid") if val != '"' + ssid1 + '"': raise Exception("Unexpected network 1 ssid: " + val) val = dev[0].get_network(0, "key_mgmt") if val != "WPA-PSK FT-PSK WPA-PSK-SHA256": raise Exception("Unexpected network 1 key_mgmt: " + val) val = dev[0].get_network(1, "ssid") if val != '"' + ssid2 + '"': raise Exception("Unexpected network 2 ssid: " + val) val = dev[0].get_network(1, "key_mgmt") if val != "SAE FT-SAE": raise Exception("Unexpected network 2 key_mgmt: " + val) def test_dpp_config_legacy_gen_sta_ap_conf(dev, apdev): """Generate DPP Config Object for legacy network (sta and ap config)""" ssid1 = "test-AP" pass1 = "password for AP sae" ssid2 = "test-STA" pass2 = "password for STA sae" ssid1h = binascii.hexlify(ssid1.encode()).decode() pass1h = binascii.hexlify(pass1.encode()).decode() ssid2h = binascii.hexlify(ssid2.encode()).decode() pass2h = binascii.hexlify(pass2.encode()).decode() extra = "conf=ap-sae pass=%s ssid=%s @CONF-OBJ-SEP@ conf=sta-sae pass=%s ssid=%s" % (pass1h, ssid1h, pass2h, ssid2h) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra=extra, require_conf_success=True) ev = dev[0].wait_event(["DPP-CONFOBJ-AKM"], timeout=5) if ev is None or ev.split()[1] != "sae": raise Exception("Unexpected confobj 2 AKM: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-SSID"], timeout=5) if ev is None or ev.split()[1] != ssid2: raise Exception("Unexpected confobj 2 SSID: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-PASS"], timeout=5) if ev is None or ev.split()[1] != pass2h: raise Exception("Unexpected confobj 2 pass: " + str(ev)) ev = dev[0].wait_event(["DPP-CONFOBJ-AKM"], timeout=1) if ev is not None: raise Exception("Unexpected second confobj") def test_dpp_config_dpp_gen_prime256v1(dev, apdev): """Generate DPP Config Object for DPP network (P-256)""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True) def test_dpp_config_dpp_gen_secp384r1(dev, apdev): """Generate DPP Config Object for DPP network (P-384)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True) def test_dpp_config_dpp_gen_secp521r1(dev, apdev): """Generate DPP Config Object for DPP network (P-521)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True) def test_dpp_config_dpp_gen_prime256v1_prime256v1(dev, apdev): """Generate DPP Config Object for DPP network (P-256 + P-256)""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="prime256v1") def test_dpp_config_dpp_gen_prime256v1_secp384r1(dev, apdev): """Generate DPP Config Object for DPP network (P-256 + P-384)""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp384r1") def test_dpp_config_dpp_gen_prime256v1_secp521r1(dev, apdev): """Generate DPP Config Object for DPP network (P-256 + P-521)""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp521r1") def test_dpp_config_dpp_gen_secp384r1_prime256v1(dev, apdev): """Generate DPP Config Object for DPP network (P-384 + P-256)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="prime256v1") def test_dpp_config_dpp_gen_secp384r1_secp384r1(dev, apdev): """Generate DPP Config Object for DPP network (P-384 + P-384)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp384r1") def test_dpp_config_dpp_gen_secp384r1_secp521r1(dev, apdev): """Generate DPP Config Object for DPP network (P-384 + P-521)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp521r1") def test_dpp_config_dpp_gen_secp521r1_prime256v1(dev, apdev): """Generate DPP Config Object for DPP network (P-521 + P-256)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="prime256v1") def test_dpp_config_dpp_gen_secp521r1_secp384r1(dev, apdev): """Generate DPP Config Object for DPP network (P-521 + P-384)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp384r1") def test_dpp_config_dpp_gen_secp521r1_secp521r1(dev, apdev): """Generate DPP Config Object for DPP network (P-521 + P-521)""" run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp521r1") def test_dpp_config_dpp_gen_prime256v1_secp384r1_secp384r1(dev, apdev): """Generate DPP Config Object for DPP network (P-256 + P-384 + P-384)""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True, conf_curve="secp384r1", net_access_key_curve="secp384r1") def test_dpp_config_dpp_gen_expiry(dev, apdev): """Generate DPP Config Object for DPP network with expiry value""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp expiry=%d" % (time.time() + 1000), require_conf_success=True, configurator=True) def test_dpp_config_dpp_gen_expired_key(dev, apdev): """Generate DPP Config Object for DPP network with expiry value""" run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp expiry=%d" % (time.time() - 10), require_conf_failure=True, configurator=True) def test_dpp_config_dpp_gen_3rd_party(dev, apdev): """Generate DPP Config Object for DPP network with 3rd party information""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) try: dev[0].set("dpp_extra_conf_req_name", "org.example") json = '{"c":1,"d":"test"}' dev[0].set("dpp_extra_conf_req_value", json) run_dpp_config_dpp_gen_3rd_party(dev, apdev) finally: dev[0].set("dpp_extra_conf_req_name", "", allow_fail=True) dev[0].set("dpp_extra_conf_req_value", "", allow_fail=True) def run_dpp_config_dpp_gen_3rd_party(dev, apdev): extra = "conf_extra_name=org.example conf_extra_value=" json = '{"a":1,"b":"test"}' extra += binascii.hexlify(json.encode()).decode() run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp " + extra, require_conf_success=True, configurator=True) def test_dpp_config_dpp_override_prime256v1(dev, apdev): """DPP Config Object override (P-256)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiYVRGNEpFR0lQS1NaMFh2OXpkQ01qbS10bjVYcE1zWUlWWjl3eVNBejFnSSIsInkiOiJRR2NIV0FfNnJiVTlYRFhBenRvWC1NNVEzc3VUbk1hcUVoVUx0bjdTU1h3In19._sm6YswxMf6hJLVTyYoU1uYUeY2VVkUNjrzjSiEhY42StD_RWowStEE-9CRsdCvLmsTptZ72_g40vTFwdId20A","csign":{"kty":"EC","crv":"P-256","x":"W4-Y5N1Pkos3UWb9A5qme0KUYRtY3CVUpekx_MapZ9s","y":"Et-M4NSF4NGjvh2VCh4B1sJ9eSCZ4RNzP2DBdP137VE","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU"}}}' dev[0].set("dpp_ignore_netaccesskey_mismatch", "1") dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", require_conf_success=True) def test_dpp_config_dpp_override_secp384r1(dev, apdev): """DPP Config Object override (P-384)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJabi1iMndjbjRLM2pGQklkYmhGZkpVTHJTXzdESS0yMWxFQi02R3gxNjl3IiwiYWxnIjoiRVMzODQifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0zODQiLCJ4IjoickdrSGg1UUZsOUtfWjdqYUZkVVhmbThoY1RTRjM1b25Xb1NIRXVsbVNzWW9oX1RXZGpoRjhiVGdiS0ZRN2tBViIsInkiOiJBbU1QVDA5VmFENWpGdzMwTUFKQlp2VkZXeGNlVVlKLXR5blQ0bVJ5N0xOZWxhZ0dEWHpfOExaRlpOU2FaNUdLIn19.Yn_F7m-bbOQ5PlaYQJ9-1qsuqYQ6V-rAv8nWw1COKiCYwwbt3WFBJ8DljY0dPrlg5CHJC4saXwkytpI-CpELW1yUdzYb4Lrun07d20Eo_g10ICyOl5sqQCAUElKMe_Xr","csign":{"kty":"EC","crv":"P-384","x":"dmTyXXiPV2Y8a01fujL-jo08gvzyby23XmzOtzjAiujKQZZgPJsbhfEKrZDlc6ey","y":"H5Z0av5c7bqInxYb2_OOJdNiMhVf3zlcULR0516ZZitOY4U31KhL4wl4KGV7g2XW","kid":"Zn-b2wcn4K3jFBIdbhFfJULrS_7DI-21lEB-6Gx169w"}}}' dev[0].set("dpp_ignore_netaccesskey_mismatch", "1") dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1", require_conf_success=True) def test_dpp_config_dpp_override_secp521r1(dev, apdev): """DPP Config Object override (P-521)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJMZkhKY3hnV2ZKcG1uS2IwenZRT0F2VDB2b0ZKc0JjZnBmYzgxY3Y5ZXFnIiwiYWxnIjoiRVM1MTIifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC01MjEiLCJ4IjoiQVJlUFBrMFNISkRRR2NWbnlmM3lfbTlaQllHNjFJeElIbDN1NkdwRHVhMkU1WVd4TE1BSUtMMnZuUGtlSGFVRXljRmZaZlpYZ2JlNkViUUxMVkRVUm1VUSIsInkiOiJBWUtaYlNwUkFFNjJVYm9YZ2c1ZWRBVENzbEpzTlpwcm9RR1dUcW9Md04weXkzQkVoT3ZRZmZrOWhaR2lKZ295TzFobXFRRVRrS0pXb2tIYTBCQUpLSGZtIn19.ACEZLyPk13cM_OFScpLoCElQ2t1sxq5z2d_W_3_QslTQQe5SFiH_o8ycL4632YLAH4RV0gZcMKKRMtZdHgBYHjkzASDqgY-_aYN2SBmpfl8hw0YdDlUJWX3DJf-ofqNAlTbnGmhpSg69cEAhFn41Xgvx2MdwYcPVncxxESVOtWl5zNLK","csign":{"kty":"EC","crv":"P-521","x":"ADiOI_YJOAipEXHB-SpGl4KqokX8m8h3BVYCc8dgiwssZ061-nIIY3O1SIO6Re4Jjfy53RPgzDG6jitOgOGLtzZs","y":"AZKggKaQi0ExutSpJAU3-lqDV03sBQLA9C7KabfWoAn8qD6Vk4jU0WAJdt-wBBTF9o1nVuiqS2OxMVYrxN4lOz79","kid":"LfHJcxgWfJpmnKb0zvQOAvT0voFJsBcfpfc81cv9eqg"}}}' dev[0].set("dpp_ignore_netaccesskey_mismatch", "1") dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1", require_conf_success=True) def test_dpp_config_override_objects(dev, apdev): """Generate DPP Config Object and override objects)""" check_dpp_capab(dev[1]) discovery = '{\n"ssid":"mywifi"\n}' groups = '[\n {"groupId":"home","netRole":"sta"},\n {"groupId":"cottage","netRole":"sta"}\n]' dev[1].set("dpp_discovery_override", discovery) dev[1].set("dpp_groups_override", groups) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", init_extra="conf=sta-dpp", require_conf_success=True, configurator=True) def build_conf_obj(kty="EC", crv="P-256", x="W4-Y5N1Pkos3UWb9A5qme0KUYRtY3CVUpekx_MapZ9s", y="Et-M4NSF4NGjvh2VCh4B1sJ9eSCZ4RNzP2DBdP137VE", kid="TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU", prot_hdr='{"typ":"dppCon","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"ES256"}', signed_connector=None, no_signed_connector=False, csign=True): conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{' conf += '"akm":"dpp",' if signed_connector: conn = signed_connector conf += '"signedConnector":"%s",' % conn elif not no_signed_connector: payload = '{"groups":[{"groupId":"*","netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}' sign = "_sm6YswxMf6hJLVTyYoU1uYUeY2VVkUNjrzjSiEhY42StD_RWowStEE-9CRsdCvLmsTptZ72_g40vTFwdId20A" conn = base64.urlsafe_b64encode(prot_hdr.encode()).decode().rstrip('=') + '.' conn += base64.urlsafe_b64encode(payload.encode()).decode().rstrip('=') + '.' conn += sign conf += '"signedConnector":"%s",' % conn if csign: conf += '"csign":{' if kty: conf += '"kty":"%s",' % kty if crv: conf += '"crv":"%s",' % crv if x: conf += '"x":"%s",' % x if y: conf += '"y":"%s",' % y if kid: conf += '"kid":"%s"' % kid conf = conf.rstrip(',') conf += '}' else: conf = conf.rstrip(',') conf += '}}' return conf def run_dpp_config_error(dev, apdev, conf, skip_net_access_key_mismatch=True, conf_failure=True): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) if skip_net_access_key_mismatch: dev[0].set("dpp_ignore_netaccesskey_mismatch", "1") dev[1].set("dpp_config_obj_override", conf) run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1", require_conf_success=not conf_failure, require_conf_failure=conf_failure) def test_dpp_config_jwk_error_no_kty(dev, apdev): """DPP Config Object JWK error - no kty""" run_dpp_config_error(dev, apdev, build_conf_obj(kty=None)) def test_dpp_config_jwk_error_unexpected_kty(dev, apdev): """DPP Config Object JWK error - unexpected kty""" run_dpp_config_error(dev, apdev, build_conf_obj(kty="unknown")) def test_dpp_config_jwk_error_no_crv(dev, apdev): """DPP Config Object JWK error - no crv""" run_dpp_config_error(dev, apdev, build_conf_obj(crv=None)) def test_dpp_config_jwk_error_unsupported_crv(dev, apdev): """DPP Config Object JWK error - unsupported curve""" run_dpp_config_error(dev, apdev, build_conf_obj(crv="unsupported")) def test_dpp_config_jwk_error_no_x(dev, apdev): """DPP Config Object JWK error - no x""" run_dpp_config_error(dev, apdev, build_conf_obj(x=None)) def test_dpp_config_jwk_error_invalid_x(dev, apdev): """DPP Config Object JWK error - invalid x""" run_dpp_config_error(dev, apdev, build_conf_obj(x="MTIz")) def test_dpp_config_jwk_error_no_y(dev, apdev): """DPP Config Object JWK error - no y""" run_dpp_config_error(dev, apdev, build_conf_obj(y=None)) def test_dpp_config_jwk_error_invalid_y(dev, apdev): """DPP Config Object JWK error - invalid y""" run_dpp_config_error(dev, apdev, build_conf_obj(y="MTIz")) def test_dpp_config_jwk_error_invalid_xy(dev, apdev): """DPP Config Object JWK error - invalid x,y""" conf = build_conf_obj(x="MDEyMzQ1Njc4OWFiY2RlZjAxMjM0NTY3ODlhYmNkZWY", y="MDEyMzQ1Njc4OWFiY2RlZjAxMjM0NTY3ODlhYmNkZWY") run_dpp_config_error(dev, apdev, conf) def test_dpp_config_jwk_error_no_kid(dev, apdev): """DPP Config Object JWK error - no kid""" # csign kid is optional field, so this results in success run_dpp_config_error(dev, apdev, build_conf_obj(kid=None), conf_failure=False) def test_dpp_config_jws_error_prot_hdr_not_an_object(dev, apdev): """DPP Config Object JWS error - protected header not an object""" run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr="1")) def test_dpp_config_jws_error_prot_hdr_no_typ(dev, apdev): """DPP Config Object JWS error - protected header - no typ""" prot_hdr = '{"kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"ES256"}' run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr)) def test_dpp_config_jws_error_prot_hdr_unsupported_typ(dev, apdev): """DPP Config Object JWS error - protected header - unsupported typ""" prot_hdr = '{"typ":"unsupported","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"ES256"}' run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr)) def test_dpp_config_jws_error_prot_hdr_no_alg(dev, apdev): """DPP Config Object JWS error - protected header - no alg""" prot_hdr = '{"typ":"dppCon","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU"}' run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr)) def test_dpp_config_jws_error_prot_hdr_unexpected_alg(dev, apdev): """DPP Config Object JWS error - protected header - unexpected alg""" prot_hdr = '{"typ":"dppCon","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"unexpected"}' run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr)) def test_dpp_config_jws_error_prot_hdr_no_kid(dev, apdev): """DPP Config Object JWS error - protected header - no kid""" prot_hdr = '{"typ":"dppCon","alg":"ES256"}' run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr)) def test_dpp_config_jws_error_prot_hdr_unexpected_kid(dev, apdev): """DPP Config Object JWS error - protected header - unexpected kid""" prot_hdr = '{"typ":"dppCon","kid":"MTIz","alg":"ES256"}' run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr)) def test_dpp_config_signed_connector_error_no_dot_1(dev, apdev): """DPP Config Object signedConnector error - no dot(1)""" conn = "MTIz" run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn)) def test_dpp_config_signed_connector_error_no_dot_2(dev, apdev): """DPP Config Object signedConnector error - no dot(2)""" conn = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.MTIz" run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn)) def test_dpp_config_signed_connector_error_unexpected_signature_len(dev, apdev): """DPP Config Object signedConnector error - unexpected signature length""" conn = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.MTIz.MTIz" run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn)) def test_dpp_config_signed_connector_error_invalid_signature_der(dev, apdev): """DPP Config Object signedConnector error - invalid signature DER""" conn = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.MTIz.MTI" run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn)) def test_dpp_config_no_csign(dev, apdev): """DPP Config Object error - no csign""" run_dpp_config_error(dev, apdev, build_conf_obj(csign=False)) def test_dpp_config_no_signed_connector(dev, apdev): """DPP Config Object error - no signedConnector""" run_dpp_config_error(dev, apdev, build_conf_obj(no_signed_connector=True)) def test_dpp_config_unexpected_signed_connector_char(dev, apdev): """DPP Config Object error - unexpected signedConnector character""" run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector='a\nb')) def test_dpp_config_root_not_an_object(dev, apdev): """DPP Config Object error - root not an object""" conf = "1" run_dpp_config_error(dev, apdev, conf) def test_dpp_config_no_wi_fi_tech(dev, apdev): """DPP Config Object error - no wi-fi_tech""" conf = "{}" run_dpp_config_error(dev, apdev, conf) def test_dpp_config_unsupported_wi_fi_tech(dev, apdev): """DPP Config Object error - unsupported wi-fi_tech""" conf = '{"wi-fi_tech":"unsupported"}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_no_discovery(dev, apdev): """DPP Config Object error - no discovery""" conf = '{"wi-fi_tech":"infra"}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_no_discovery_ssid(dev, apdev): """DPP Config Object error - no discovery::ssid""" conf = '{"wi-fi_tech":"infra","discovery":{}}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_too_long_discovery_ssid(dev, apdev): """DPP Config Object error - too long discovery::ssid""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"%s"}}' % (33*'A') run_dpp_config_error(dev, apdev, conf) def test_dpp_config_no_cred(dev, apdev): """DPP Config Object error - no cred""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"}}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_no_cred_akm(dev, apdev): """DPP Config Object error - no cred::akm""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{}}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_unsupported_cred_akm(dev, apdev): """DPP Config Object error - unsupported cred::akm""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"unsupported"}}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_no_pass(dev, apdev): """DPP Config Object legacy error - no pass/psk""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk"}}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_too_short_pass(dev, apdev): """DPP Config Object legacy error - too short pass/psk""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"1"}}' run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_too_long_pass(dev, apdev): """DPP Config Object legacy error - too long pass/psk""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"%s"}}' % (64*'A') run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_psk_with_sae(dev, apdev): """DPP Config Object legacy error - psk_hex with SAE""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"sae","psk_hex":"%s"}}' % (32*"12") run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_no_pass_for_sae(dev, apdev): """DPP Config Object legacy error - no pass for SAE""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk+sae","psk_hex":"%s"}}' % (32*"12") run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_invalid_psk(dev, apdev): """DPP Config Object legacy error - invalid psk_hex""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"%s"}}' % (32*"qa") run_dpp_config_error(dev, apdev, conf) def test_dpp_config_error_legacy_too_short_psk(dev, apdev): """DPP Config Object legacy error - too short psk_hex""" conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"%s"}}' % (31*"12") run_dpp_config_error(dev, apdev, conf) def get_der_int_32(val): a, b = struct.unpack('BB', val[0:2]) if a != 0x02: raise Exception("Invalid DER encoding of INTEGER") if b > len(val) - 2: raise Exception("Invalid length of INTEGER (truncated)") val = val[2:] if b == 32: r = val[0:32] elif b == 33: if val[0] != 0: raise Exception("Too large INTEGER (32)") r = val[1:33] elif b < 32: r = (32 - b) * b'\x00' + val[0:b] else: raise Exception("Invalid length of INTEGER (32): %d" % b) return r, val[b:] def ecdsa_sign(pkey, message, alg="sha256"): sign = OpenSSL.crypto.sign(pkey, message, alg) logger.debug("sign=" + binascii.hexlify(sign).decode()) a, b = struct.unpack('BB', sign[0:2]) if a != 0x30: raise Exception("Invalid DER encoding of ECDSA signature") if b != len(sign) - 2: raise Exception("Invalid length of ECDSA signature") sign = sign[2:] r, sign = get_der_int_32(sign) s, sign = get_der_int_32(sign) if len(sign) != 0: raise Exception("Extra data at the end of ECDSA signature") logger.info("r=" + binascii.hexlify(r).decode()) logger.info("s=" + binascii.hexlify(s).decode()) raw_sign = r + s return base64.urlsafe_b64encode(raw_sign).decode().rstrip('=') p256_priv_key = """-----BEGIN EC PRIVATE KEY----- MHcCAQEEIBVQij9ah629f1pu3tarDQGQvrzHgAkgYd1jHGiLxNajoAoGCCqGSM49 AwEHoUQDQgAEAC9d2/JirKu72F2qLuv5jEFMD1Cqu9EiyGk7cOzn/2DJ51p2mEoW n03N6XRvTC+G7WPol9Ng97NAM2sK57+F/Q== -----END EC PRIVATE KEY-----""" p256_pub_key_x = binascii.unhexlify("002f5ddbf262acabbbd85daa2eebf98c414c0f50aabbd122c8693b70ece7ff60") p256_pub_key_y = binascii.unhexlify("c9e75a76984a169f4dcde9746f4c2f86ed63e897d360f7b340336b0ae7bf85fd") def run_dpp_config_connector(dev, apdev, expiry=None, payload=None, skip_net_access_key_mismatch=True, conf_failure=True): if not openssl_imported: raise HwsimSkip("OpenSSL python method not available") pkey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM, p256_priv_key) x = base64.urlsafe_b64encode(p256_pub_key_x).decode().rstrip('=') y = base64.urlsafe_b64encode(p256_pub_key_y).decode().rstrip('=') pubkey = b'\x04' + p256_pub_key_x + p256_pub_key_y kid = base64.urlsafe_b64encode(hashlib.sha256(pubkey).digest()).decode().rstrip('=') prot_hdr = '{"typ":"dppCon","kid":"%s","alg":"ES256"}' % kid if not payload: payload = '{"groups":[{"groupId":"*","netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}' if expiry: payload += ',"expiry":"%s"' % expiry payload += '}' conn = base64.urlsafe_b64encode(prot_hdr.encode()).decode().rstrip('=') + '.' conn += base64.urlsafe_b64encode(payload.encode()).decode().rstrip('=') sign = ecdsa_sign(pkey, conn) conn += '.' + sign run_dpp_config_error(dev, apdev, build_conf_obj(x=x, y=y, signed_connector=conn), skip_net_access_key_mismatch=skip_net_access_key_mismatch, conf_failure=conf_failure) def test_dpp_config_connector_error_ext_sign(dev, apdev): """DPP Config Object connector error - external signature calculation""" run_dpp_config_connector(dev, apdev, conf_failure=False) def test_dpp_config_connector_error_too_short_timestamp(dev, apdev): """DPP Config Object connector error - too short timestamp""" run_dpp_config_connector(dev, apdev, expiry="1") def test_dpp_config_connector_error_invalid_timestamp(dev, apdev): """DPP Config Object connector error - invalid timestamp""" run_dpp_config_connector(dev, apdev, expiry=19*"1") def test_dpp_config_connector_error_invalid_timestamp_date(dev, apdev): """DPP Config Object connector error - invalid timestamp date""" run_dpp_config_connector(dev, apdev, expiry="9999-99-99T99:99:99Z") def test_dpp_config_connector_error_invalid_time_zone(dev, apdev): """DPP Config Object connector error - invalid time zone""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00*") def test_dpp_config_connector_error_invalid_time_zone_2(dev, apdev): """DPP Config Object connector error - invalid time zone 2""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00+") def test_dpp_config_connector_error_expired_1(dev, apdev): """DPP Config Object connector error - expired 1""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00") def test_dpp_config_connector_error_expired_2(dev, apdev): """DPP Config Object connector error - expired 2""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00Z") def test_dpp_config_connector_error_expired_3(dev, apdev): """DPP Config Object connector error - expired 3""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00+01") def test_dpp_config_connector_error_expired_4(dev, apdev): """DPP Config Object connector error - expired 4""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00+01:02") def test_dpp_config_connector_error_expired_5(dev, apdev): """DPP Config Object connector error - expired 5""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00-01") def test_dpp_config_connector_error_expired_6(dev, apdev): """DPP Config Object connector error - expired 6""" run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00-01:02") def test_dpp_config_connector_error_no_groups(dev, apdev): """DPP Config Object connector error - no groups""" payload = '{"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}' run_dpp_config_connector(dev, apdev, payload=payload) def test_dpp_config_connector_error_empty_groups(dev, apdev): """DPP Config Object connector error - empty groups""" payload = '{"groups":[],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}' run_dpp_config_connector(dev, apdev, payload=payload) def test_dpp_config_connector_error_missing_group_id(dev, apdev): """DPP Config Object connector error - missing groupId""" payload = '{"groups":[{"netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}' run_dpp_config_connector(dev, apdev, payload=payload) def test_dpp_config_connector_error_missing_net_role(dev, apdev): """DPP Config Object connector error - missing netRole""" payload = '{"groups":[{"groupId":"*"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}' run_dpp_config_connector(dev, apdev, payload=payload) def test_dpp_config_connector_error_missing_net_access_key(dev, apdev): """DPP Config Object connector error - missing netAccessKey""" payload = '{"groups":[{"groupId":"*","netRole":"sta"}]}' run_dpp_config_connector(dev, apdev, payload=payload) def test_dpp_config_connector_error_net_access_key_mismatch(dev, apdev): """DPP Config Object connector error - netAccessKey mismatch""" payload = '{"groups":[{"groupId":"*","netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}' run_dpp_config_connector(dev, apdev, payload=payload, skip_net_access_key_mismatch=False) def test_dpp_gas_timeout(dev, apdev): """DPP and GAS server timeout for a query""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].set("ext_mgmt_frame_handling", "1") dev[0].dpp_listen(2412) # Force GAS fragmentation conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[1].set("dpp_config_obj_override", conf) dev[1].dpp_auth_init(uri=uri0) # DPP Authentication Request msg = dev[0].mgmt_rx() if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format( msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())): raise Exception("MGMT_RX_PROCESS failed") # DPP Authentication Confirmation msg = dev[0].mgmt_rx() if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format( msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())): raise Exception("MGMT_RX_PROCESS failed") wait_auth_success(dev[0], dev[1]) # DPP Configuration Response (GAS Initial Response frame) msg = dev[0].mgmt_rx() if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format( msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())): raise Exception("MGMT_RX_PROCESS failed") # GAS Comeback Response frame msg = dev[0].mgmt_rx() # Do not continue to force timeout on GAS server ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10) if ev is None: raise Exception("GAS result not reported (Enrollee)") if "result=TIMEOUT" not in ev: raise Exception("Unexpected GAS result (Enrollee): " + ev) dev[0].set("ext_mgmt_frame_handling", "0") ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=65) if ev is None: raise Exception("DPP configuration failure not reported (Configurator)") ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=1) if ev is None: raise Exception("DPP configuration failure not reported (Enrollee)") def test_dpp_akm_sha256(dev, apdev): """DPP AKM (SHA256)""" run_dpp_akm(dev, apdev, 32) def test_dpp_akm_sha384(dev, apdev): """DPP AKM (SHA384)""" run_dpp_akm(dev, apdev, 48) def test_dpp_akm_sha512(dev, apdev): """DPP AKM (SHA512)""" run_dpp_akm(dev, apdev, 64) def run_dpp_akm(dev, apdev, pmk_len): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = {"ssid": "dpp", "wpa": "2", "wpa_key_mgmt": "DPP", "rsn_pairwise": "CCMP", "ieee80211w": "2"} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") conf = hapd.request("GET_CONFIG") if "key_mgmt=DPP" not in conf.splitlines(): logger.info("GET_CONFIG:\n" + conf) raise Exception("GET_CONFIG did not report correct key_mgmt") id = dev[0].connect("dpp", key_mgmt="DPP", ieee80211w="2", scan_freq="2412", dpp_pfs="2", wait_connect=False) ev = dev[0].wait_event(["CTRL-EVENT-NETWORK-NOT-FOUND"], timeout=2) if not ev: raise Exception("Network mismatch not reported") dev[0].request("DISCONNECT") dev[0].dump_monitor() bssid = hapd.own_addr() pmkid = 16*'11' akmp = 2**23 pmk = pmk_len*'22' cmd = "PMKSA_ADD %d %s %s %s 30240 43200 %d 0" % (id, bssid, pmkid, pmk, akmp) if "OK" not in dev[0].request(cmd): raise Exception("PMKSA_ADD failed (wpa_supplicant)") dev[0].select_network(id, freq="2412") ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=2) dev[0].request("DISCONNECT") dev[0].dump_monitor() if not ev: raise Exception("Association attempt was not rejected") if "status_code=53" not in ev: raise Exception("Unexpected status code: " + ev) addr = dev[0].own_addr() cmd = "PMKSA_ADD %s %s %s 0 %d" % (addr, pmkid, pmk, akmp) if "OK" not in hapd.request(cmd): raise Exception("PMKSA_ADD failed (hostapd)") cmd = "PMKSA_ADD %d %s %s %s 30240 43200 %d 0" % (id, bssid, pmkid, pmk, akmp) if "OK" not in dev[0].request(cmd): raise Exception("PMKSA_ADD failed (wpa_supplicant)") dev[0].select_network(id, freq="2412") dev[0].wait_connected() val = dev[0].get_status_field("key_mgmt") if val != "DPP": raise Exception("Unexpected key_mgmt: " + val) params1_csign = "3059301306072a8648ce3d020106082a8648ce3d03010703420004d02e5bd81a120762b5f0f2994777f5d40297238a6c294fd575cdf35fabec44c050a6421c401d98d659fd2ed13c961cc8287944dd3202f516977800d3ab2f39ee" params1_ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJzOEFrYjg5bTV4UGhoYk5UbTVmVVo0eVBzNU5VMkdxYXNRY3hXUWhtQVFRIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIwOHF4TlNYRzRWemdCV3BjVUdNSmc1czNvbElOVFJsRVQ1aERpNkRKY3ZjIiwieSI6IlVhaGFYQXpKRVpRQk1YaHRUQnlZZVlrOWtJYjk5UDA3UV9NcW9TVVZTVEkifX0.a5_nfMVr7Qe1SW0ZL3u6oQRm5NUCYUSfixDAJOUFN3XUfECBZ6E8fm8xjeSfdOytgRidTz0CTlIRjzPQo82dmQ" params1_ap_netaccesskey = "30770201010420f6531d17f29dfab655b7c9e923478d5a345164c489aadd44a3519c3e9dcc792da00a06082a8648ce3d030107a14403420004d3cab13525c6e15ce0056a5c506309839b37a2520d4d19444f98438ba0c972f751a85a5c0cc911940131786d4c1c9879893d9086fdf4fd3b43f32aa125154932" params1_sta_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJzOEFrYjg5bTV4UGhoYk5UbTVmVVo0eVBzNU5VMkdxYXNRY3hXUWhtQVFRIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiZWMzR3NqQ3lQMzVBUUZOQUJJdEltQnN4WXVyMGJZX1dES1lfSE9zUGdjNCIsInkiOiJTRS1HVllkdWVnTFhLMU1TQXZNMEx2QWdLREpTNWoyQVhCbE9PMTdUSTRBIn19.PDK9zsGlK-e1pEOmNxVeJfCS8pNeay6ckIS1TXCQsR64AR-9wFPCNVjqOxWvVKltehyMFqVAtOcv0IrjtMJFqQ" params1_sta_netaccesskey = "30770201010420bc33380c26fd2168b69cd8242ed1df07ba89aa4813f8d4e8523de6ca3f8dd28ba00a06082a8648ce3d030107a1440342000479cdc6b230b23f7e40405340048b48981b3162eaf46d8fd60ca63f1ceb0f81ce484f8655876e7a02d72b531202f3342ef020283252e63d805c194e3b5ed32380" params1_sta_pk_hash = "38f1ba82b3b49ef1c9ab616e5e94a914c75af3a4d6e25b7f112741e530f3b8e6" def test_dpp_network_introduction(dev, apdev): """DPP network introduction""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = {"ssid": "dpp", "wpa": "2", "wpa_key_mgmt": "DPP", "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") id = dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey) val = dev[0].get_status_field("key_mgmt") if val != "DPP": raise Exception("Unexpected key_mgmt: " + val) ev = hapd.wait_sta(dev[0].own_addr()) if "dpp_pkhash=" + params1_sta_pk_hash not in ev: raise Exception("dpp_pkhash not reported correctly: " + ev) sta = hapd.get_sta(dev[0].own_addr()) if 'dpp_pkhash' not in sta: raise Exception("dpp_pkhash not included in STA info") if sta['dpp_pkhash'] != params1_sta_pk_hash: raise Exception("Incorrect dpp_pkhash in STA info: " + sta['dpp_pkhash']) def test_dpp_network_introduction_expired(dev, apdev): """DPP network introduction with expired netaccesskey""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = {"ssid": "dpp", "wpa": "2", "wpa_key_mgmt": "DPP", "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey, "dpp_netaccesskey_expiry": "1565530889"} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, wait_connect=False) ev = hapd.wait_event(["DPP-RX"], timeout=10) if ev is None: raise Exception("No DPP Peer Discovery Request seen") if "type=5" not in ev: raise Exception("Unexpected DPP message received: " + ev) ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1) dev[0].request("DISCONNECT") if ev: raise Exception("Connection reported") hapd.disable() hapd.set("dpp_netaccesskey_expiry", "2565530889") hapd.enable() dev[0].request("RECONNECT") dev[0].wait_connected() def test_dpp_network_introduction_clear_ap(dev, apdev): """DPP network introduction with PMKSA cleared on AP""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = {"ssid": "dpp", "wpa": "2", "wpa_key_mgmt": "DPP", "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") id = dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey) dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].request("RECONNECT") ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED", "DPP-INTRO"], timeout=10) if ev is None: raise Exception("Reconnection timed out") if "DPP-INTRO" in ev: raise Exception("Unexpected network introduction on reconnection") dev[0].request("DISCONNECT") dev[0].wait_disconnected() hapd.request("PMKSA_FLUSH") dev[0].request("RECONNECT") ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED", "DPP-INTRO"], timeout=10) if ev is None: raise Exception("Reconnection timed out") if "DPP-INTRO" not in ev: raise Exception("No network introduction on reconnection(2)") def test_dpp_and_sae_akm(dev, apdev): """DPP and SAE AKMs""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) check_sae_capab(dev[1]) params = {"ssid": "dpp+sae", "wpa": "2", "wpa_key_mgmt": "DPP SAE", "ieee80211w": "2", "rsn_pairwise": "CCMP", "sae_password": "sae-password", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") id = dev[0].connect("dpp+sae", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey) val = dev[0].get_status_field("key_mgmt") if val != "DPP": raise Exception("Unexpected key_mgmt for DPP: " + val) dev[1].request("SET sae_groups ") id = dev[1].connect("dpp+sae", key_mgmt="SAE", scan_freq="2412", ieee80211w="2", psk="sae-password") val = dev[1].get_status_field("key_mgmt") if val != "SAE": raise Exception("Unexpected key_mgmt for SAE: " + val) def test_dpp_ap_config(dev, apdev): """DPP and AP configuration""" run_dpp_ap_config(dev, apdev) def test_dpp_ap_config_p256_p256(dev, apdev): """DPP and AP configuration (P-256 + P-256)""" run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-256") def test_dpp_ap_config_p256_p384(dev, apdev): """DPP and AP configuration (P-256 + P-384)""" run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-384") def test_dpp_ap_config_p256_p521(dev, apdev): """DPP and AP configuration (P-256 + P-521)""" run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-521") def test_dpp_ap_config_p384_p256(dev, apdev): """DPP and AP configuration (P-384 + P-256)""" run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-256") def test_dpp_ap_config_p384_p384(dev, apdev): """DPP and AP configuration (P-384 + P-384)""" run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-384") def test_dpp_ap_config_p384_p521(dev, apdev): """DPP and AP configuration (P-384 + P-521)""" run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-521") def test_dpp_ap_config_p521_p256(dev, apdev): """DPP and AP configuration (P-521 + P-256)""" run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-256") def test_dpp_ap_config_p521_p384(dev, apdev): """DPP and AP configuration (P-521 + P-384)""" run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-384") def test_dpp_ap_config_p521_p521(dev, apdev): """DPP and AP configuration (P-521 + P-521)""" run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-521") def test_dpp_ap_config_bp256_bp256(dev, apdev): """DPP and AP configuration (BP-256 + BP-256)""" run_dpp_ap_config(dev, apdev, curve="BP-256", conf_curve="BP-256") def test_dpp_ap_config_bp384_bp384(dev, apdev): """DPP and AP configuration (BP-384 + BP-384)""" run_dpp_ap_config(dev, apdev, curve="BP-384", conf_curve="BP-384") def test_dpp_ap_config_bp512_bp512(dev, apdev): """DPP and AP configuration (BP-512 + BP-512)""" run_dpp_ap_config(dev, apdev, curve="BP-512", conf_curve="BP-512") def test_dpp_ap_config_p256_bp256(dev, apdev): """DPP and AP configuration (P-256 + BP-256)""" run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="BP-256") def test_dpp_ap_config_bp256_p256(dev, apdev): """DPP and AP configuration (BP-256 + P-256)""" run_dpp_ap_config(dev, apdev, curve="BP-256", conf_curve="P-256") def test_dpp_ap_config_p521_bp512(dev, apdev): """DPP and AP configuration (P-521 + BP-512)""" run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="BP-512") def test_dpp_ap_config_bp512_p521(dev, apdev): """DPP and AP configuration (BP-512 + P-521)""" run_dpp_ap_config(dev, apdev, curve="BP-512", conf_curve="P-521") def test_dpp_ap_config_reconfig_configurator(dev, apdev): """DPP and AP configuration with Configurator reconfiguration""" run_dpp_ap_config(dev, apdev, reconf_configurator=True) def test_dpp_ap_config_sae(dev, apdev): """DPP and AP configuration for SAE""" run_dpp_ap_config(dev, apdev, sae=True) def update_hapd_config(hapd): ev = hapd.wait_event(["DPP-CONFOBJ-AKM"], timeout=1) if ev is None: raise Exception("AKM not reported (AP)") akm = ev.split(' ')[1] ev = hapd.wait_event(["DPP-CONFOBJ-SSID"], timeout=1) if ev is None: raise Exception("SSID not reported (AP)") ssid = ev.split(' ')[1] ev = hapd.wait_event(["DPP-CONNECTOR"], timeout=1) if ev is None: raise Exception("Connector not reported (AP)") connector = ev.split(' ')[1] if akm == "sae": ev = hapd.wait_event(["DPP-CONFOBJ-PASS"], timeout=1) if ev is None: raise Exception("Password not reported (AP)") password = ev.split(' ')[1] ev = hapd.wait_event(["DPP-C-SIGN-KEY"], timeout=1) if ev is None: raise Exception("C-sign-key not reported (AP)") p = ev.split(' ') csign = p[1] ev = hapd.wait_event(["DPP-NET-ACCESS-KEY"], timeout=1) if ev is None: raise Exception("netAccessKey not reported (AP)") p = ev.split(' ') net_access_key = p[1] net_access_key_expiry = p[2] if len(p) > 2 else None logger.info("Update AP configuration") hapd.disable() hapd.set("ssid", ssid) hapd.set("utf8_ssid", "1") hapd.set("wpa", "2") if akm == "sae": hapd.set("wpa_key_mgmt", "SAE") hapd.set("sae_password", binascii.unhexlify(password).decode()) else: hapd.set("wpa_key_mgmt", "DPP") hapd.set("ieee80211w", "2") hapd.set("rsn_pairwise", "CCMP") hapd.set("dpp_connector", connector) hapd.set("dpp_csign", csign) hapd.set("dpp_netaccesskey", net_access_key) if net_access_key_expiry: hapd.set("dpp_netaccesskey_expiry", net_access_key_expiry) hapd.enable() def run_dpp_ap_config(dev, apdev, curve=None, conf_curve=None, reconf_configurator=False, sae=False): if sae: check_sae_capab(dev[0]) check_sae_capab(dev[1]) dev[0].set("sae_groups", "") dev[1].set("sae_groups", "") brainpool = (curve and "BP-" in curve) or \ (conf_curve and "BP-" in conf_curve) check_dpp_capab(dev[0], brainpool) check_dpp_capab(dev[1], brainpool) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True, curve=curve) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) conf_id = dev[0].dpp_configurator_add(curve=conf_curve) if reconf_configurator: csign = dev[0].request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id) if "FAIL" in csign or len(csign) == 0: raise Exception("DPP_CONFIGURATOR_GET_KEY failed") if sae: dev[0].dpp_auth_init(uri=uri, conf="ap-sae", configurator=conf_id, passphrase="secret SAE password") else: dev[0].dpp_auth_init(uri=uri, conf="ap-dpp", configurator=conf_id) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd) update_hapd_config(hapd) id1 = dev[1].dpp_bootstrap_gen(chan="81/1", mac=True, curve=curve) uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) if reconf_configurator: dev[0].dpp_configurator_remove(conf_id) conf_id = dev[0].dpp_configurator_add(curve=conf_curve, key=csign) dev[1].dpp_listen(2412) if sae: dev[0].dpp_auth_init(uri=uri1, conf="sta-sae", configurator=conf_id, passphrase="secret SAE password") else: dev[0].dpp_auth_init(uri=uri1, conf="sta-dpp", configurator=conf_id) res = wait_auth_success(dev[1], dev[0], configurator=dev[0], enrollee=dev[1], stop_responder=True) sta_pk_hash = res['initiator-auth-success-pkhash'] ev = dev[1].wait_event(["DPP-CONFOBJ-SSID"], timeout=1) if ev is None: raise Exception("SSID not reported") ssid = ev.split(' ')[1] ev = dev[1].wait_event(["DPP-CONNECTOR"], timeout=1) if ev is None: raise Exception("Connector not reported") connector = ev.split(' ')[1] ev = dev[1].wait_event(["DPP-C-SIGN-KEY"], timeout=1) if ev is None: raise Exception("C-sign-key not reported") p = ev.split(' ') csign = p[1] ev = dev[1].wait_event(["DPP-NET-ACCESS-KEY"], timeout=1) if ev is None: raise Exception("netAccessKey not reported") p = ev.split(' ') net_access_key = p[1] net_access_key_expiry = p[2] if len(p) > 2 else None dev[1].dump_monitor() if sae: id = dev[1].connect(ssid, key_mgmt="SAE", ieee80211w="2", scan_freq="2412", sae_password="secret SAE password", only_add_network=True) else: id = dev[1].connect(ssid, key_mgmt="DPP", ieee80211w="2", scan_freq="2412", only_add_network=True) dev[1].set_network_quoted(id, "dpp_connector", connector) dev[1].set_network(id, "dpp_csign", csign) dev[1].set_network(id, "dpp_netaccesskey", net_access_key) if net_access_key_expiry: dev[1].set_network(id, "dpp_netaccess_expiry", net_access_key_expiry) logger.info("Check data connection") dev[1].select_network(id, freq="2412") dev[1].wait_connected() if not sae: ev = hapd.wait_sta(dev[1].own_addr()) if "dpp_pkhash=" + sta_pk_hash not in ev: raise Exception("dpp_pkhash not reported correctly: " + ev) sta = hapd.get_sta(dev[1].own_addr()) if 'dpp_pkhash' not in sta: raise Exception("dpp_pkhash not included in STA info") if sta['dpp_pkhash'] != sta_pk_hash: raise Exception("Incorrect dpp_pkhash in STA info: " + sta['dpp_pkhash']) dev[1].request("DISCONNECT") dev[1].wait_disconnected() dev[1].request("RECONNECT") dev[1].wait_connected() ev = hapd.wait_sta(dev[1].own_addr()) if "dpp_pkhash=" + sta_pk_hash not in ev: raise Exception("dpp_pkhash not reported correctly(2): " + ev) sta = hapd.get_sta(dev[1].own_addr()) if 'dpp_pkhash' not in sta: raise Exception("dpp_pkhash not included in STA info(2)") if sta['dpp_pkhash'] != sta_pk_hash: raise Exception("Incorrect dpp_pkhash in STA info(2): " + sta['dpp_pkhash']) def test_dpp_auto_connect_1(dev, apdev): """DPP and auto connect (1)""" try: run_dpp_auto_connect(dev, apdev, 1) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_2(dev, apdev): """DPP and auto connect (2)""" try: run_dpp_auto_connect(dev, apdev, 2) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_2_connect_cmd(dev, apdev): """DPP and auto connect (2) using connect_cmd""" wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") dev_new = [wpas, dev[1]] try: run_dpp_auto_connect(dev_new, apdev, 2) finally: wpas.set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_2_sta_ver1(dev, apdev): """DPP and auto connect (2; STA using ver 1)""" try: run_dpp_auto_connect(dev, apdev, 2, sta_version=1) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_2_ap_ver1(dev, apdev): """DPP and auto connect (2; AP using ver 1)""" try: run_dpp_auto_connect(dev, apdev, 2, ap_version=1) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_2_ver1(dev, apdev): """DPP and auto connect (2; AP and STA using ver 1)""" try: run_dpp_auto_connect(dev, apdev, 2, ap_version=1, sta_version=1) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_2_conf_ver1(dev, apdev): """DPP and auto connect (2; Configurator using ver 1)""" try: run_dpp_auto_connect(dev, apdev, 2, sta1_version=1) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_auto_connect(dev, apdev, processing, ap_version=0, sta_version=0, sta1_version=0, stop_after_prov=False): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) csign = "30770201010420768240a3fc89d6662d9782f120527fe7fb9edc6366ab0b9c7dde96125cfd250fa00a06082a8648ce3d030107a144034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708" csign_pub = "3059301306072a8648ce3d020106082a8648ce3d030107034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708" ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJwYWtZbXVzd1dCdWpSYTl5OEsweDViaTVrT3VNT3dzZHRlaml2UG55ZHZzIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIybU5vNXZuRkI5bEw3d1VWb1hJbGVPYzBNSEE1QXZKbnpwZXZULVVTYzVNIiwieSI6IlhzS3dqVHJlLTg5WWdpU3pKaG9CN1haeUttTU05OTl3V2ZaSVl0bi01Q3MifX0.XhjFpZgcSa7G2lHy0OCYTvaZFRo5Hyx6b7g7oYyusLC7C_73AJ4_BxEZQVYJXAtDuGvb3dXSkHEKxREP9Q6Qeg" ap_netaccesskey = "30770201010420ceba752db2ad5200fa7bc565b9c05c69b7eb006751b0b329b0279de1c19ca67ca00a06082a8648ce3d030107a14403420004da6368e6f9c507d94bef0515a1722578e73430703902f267ce97af4fe51273935ec2b08d3adefbcf588224b3261a01ed76722a630cf7df7059f64862d9fee42b" params = {"ssid": "test", "wpa": "2", "wpa_key_mgmt": "DPP", "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": ap_connector, "dpp_csign": csign_pub, "dpp_netaccesskey": ap_netaccesskey} try: hapd = hostapd.add_ap(apdev[0], params) if ap_version: hapd.set("dpp_version_override", str(ap_version)) except: raise HwsimSkip("DPP not supported") if sta_version: dev[0].set("dpp_version_override", str(sta_version)) if sta1_version: dev[1].set("dpp_version_override", str(sta1_version)) conf_id = dev[1].dpp_configurator_add(key=csign) dev[0].set("dpp_config_processing", str(processing)) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, conf="sta-dpp", configurator=conf_id) wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0]) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") id = ev.split(' ')[1] if stop_after_prov: return id, hapd if processing == 1: dev[0].select_network(id, freq=2412) dev[0].wait_connected() hwsim_utils.test_connectivity(dev[0], hapd) def test_dpp_auto_connect_legacy(dev, apdev): """DPP and auto connect (legacy)""" try: run_dpp_auto_connect_legacy(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_legacy_ssid_charset(dev, apdev): """DPP and auto connect (legacy, ssid_charset)""" try: run_dpp_auto_connect_legacy(dev, apdev, ssid_charset=12345) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_legacy_sae_1(dev, apdev): """DPP and auto connect (legacy SAE)""" try: run_dpp_auto_connect_legacy(dev, apdev, conf='sta-sae', psk_sae=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_legacy_sae_2(dev, apdev): """DPP and auto connect (legacy SAE)""" try: run_dpp_auto_connect_legacy(dev, apdev, conf='sta-sae', sae_only=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_legacy_psk_sae_1(dev, apdev): """DPP and auto connect (legacy PSK+SAE)""" try: run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk-sae', psk_sae=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_legacy_psk_sae_2(dev, apdev): """DPP and auto connect (legacy PSK+SAE)""" try: run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk-sae', sae_only=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_auto_connect_legacy_psk_sae_3(dev, apdev): """DPP and auto connect (legacy PSK+SAE)""" try: run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk-sae') finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk', ssid_charset=None, psk_sae=False, sae_only=False): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = hostapd.wpa2_params(ssid="dpp-legacy", passphrase="secret passphrase") if sae_only: params['wpa_key_mgmt'] = 'SAE' params['ieee80211w'] = '2' elif psk_sae: params['wpa_key_mgmt'] = 'WPA-PSK SAE' params['ieee80211w'] = '1' params['sae_require_mfp'] = '1' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].set("dpp_config_processing", "2") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, conf=conf, ssid="dpp-legacy", ssid_charset=ssid_charset, passphrase="secret passphrase") wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0]) if ssid_charset: ev = dev[0].wait_event(["DPP-CONFOBJ-SSID-CHARSET"], timeout=1) if ev is None: raise Exception("ssid_charset not reported") charset = ev.split(' ')[1] if charset != str(ssid_charset): raise Exception("Incorrect ssid_charset reported: " + ev) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") id = ev.split(' ')[1] dev[0].wait_connected() def test_dpp_auto_connect_legacy_pmf_required(dev, apdev): """DPP and auto connect (legacy, PMF required)""" try: run_dpp_auto_connect_legacy_pmf_required(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_auto_connect_legacy_pmf_required(dev, apdev): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = hostapd.wpa2_params(ssid="dpp-legacy", passphrase="secret passphrase") params['wpa_key_mgmt'] = "WPA-PSK-SHA256" params['ieee80211w'] = "2" hapd = hostapd.add_ap(apdev[0], params) dev[0].set("dpp_config_processing", "2") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, conf="sta-psk", ssid="dpp-legacy", passphrase="secret passphrase") wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0]) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") dev[0].wait_connected() def test_dpp_qr_code_auth_responder_configurator(dev, apdev): """DPP QR Code and responder as the configurator""" run_dpp_qr_code_auth_responder_configurator(dev, apdev, "") def test_dpp_qr_code_auth_responder_configurator_group_id(dev, apdev): """DPP QR Code and responder as the configurator with group_id)""" run_dpp_qr_code_auth_responder_configurator(dev, apdev, " group_id=test-group") def run_dpp_qr_code_auth_responder_configurator(dev, apdev, extra): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", " conf=sta-dpp configurator=%d%s" % (conf_id, extra)) dev[0].dpp_listen(2412, role="configurator") dev[1].dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1], stop_responder=True) def test_dpp_qr_code_auth_enrollee_init_netrole(dev, apdev): """DPP QR Code and enrollee initiating with netrole specified""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", " conf=configurator configurator=%d" % conf_id) dev[0].dpp_listen(2412, role="configurator") dev[1].dpp_auth_init(uri=uri0, role="enrollee", netrole="configurator") wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1], stop_responder=True) dev[0].dump_monitor() dev[1].dump_monitor() # verify that netrole resets back to sta, if not explicitly stated dev[0].set("dpp_configurator_params", "conf=sta-dpp configurator=%d" % conf_id) dev[0].dpp_listen(2412, role="configurator") dev[1].dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1], stop_responder=True) def test_dpp_qr_code_hostapd_init(dev, apdev): """DPP QR Code and hostapd as initiator""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_listen(2437, role="configurator") hapd.dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], hapd, configurator=dev[0], enrollee=hapd, stop_responder=True) def test_dpp_qr_code_hostapd_init_offchannel(dev, apdev): """DPP QR Code and hostapd as initiator (offchannel)""" run_dpp_qr_code_hostapd_init_offchannel(dev, apdev, None) def test_dpp_qr_code_hostapd_init_offchannel_neg_freq(dev, apdev): """DPP QR Code and hostapd as initiator (offchannel, neg_freq)""" run_dpp_qr_code_hostapd_init_offchannel(dev, apdev, "neg_freq=2437") def run_dpp_qr_code_hostapd_init_offchannel(dev, apdev, extra): check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1,81/11", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_listen(2462, role="configurator") hapd.dpp_auth_init(uri=uri0, role="enrollee", extra=extra) wait_auth_success(dev[0], hapd, configurator=dev[0], enrollee=hapd, stop_responder=True) def test_dpp_qr_code_hostapd_init_offchannel_configurator(dev, apdev): """DPP QR Code and hostapd as initiator/Configurator (offchannel)""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "11"}) check_dpp_capab(hapd) id0 = dev[0].dpp_bootstrap_gen(chan="81/1") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) conf_id = hapd.dpp_configurator_add() hapd.dpp_auth_init(uri=uri0, configurator=conf_id, conf="sta-dpp") wait_auth_success(dev[0], hapd, configurator=hapd, enrollee=dev[0]) def test_dpp_qr_code_hostapd_ignore_mismatch(dev, apdev): """DPP QR Code and hostapd ignoring netaccessKey mismatch""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", "conf=ap-dpp configurator=%d" % conf_id) conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiYVRGNEpFR0lQS1NaMFh2OXpkQ01qbS10bjVYcE1zWUlWWjl3eVNBejFnSSIsInkiOiJRR2NIV0FfNnJiVTlYRFhBenRvWC1NNVEzc3VUbk1hcUVoVUx0bjdTU1h3In19._sm6YswxMf6hJLVTyYoU1uYUeY2VVkUNjrzjSiEhY42StD_RWowStEE-9CRsdCvLmsTptZ72_g40vTFwdId20A","csign":{"kty":"EC","crv":"P-256","x":"W4-Y5N1Pkos3UWb9A5qme0KUYRtY3CVUpekx_MapZ9s","y":"Et-M4NSF4NGjvh2VCh4B1sJ9eSCZ4RNzP2DBdP137VE","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU"}}}' dev[0].set("dpp_config_obj_override", conf) dev[0].dpp_listen(2437, role="configurator") hapd.set("dpp_ignore_netaccesskey_mismatch", "1") hapd.dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], hapd, configurator=dev[0], enrollee=hapd, stop_responder=True) def test_dpp_test_vector_p_256(dev, apdev): """DPP P-256 test vector (mutual auth)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) # Responder bootstrapping key priv = "54ce181a98525f217216f59b245f60e9df30ac7f6b26c939418cfc3c42d1afa0" id0 = dev[0].dpp_bootstrap_gen(chan="81/11", mac=True, key="30310201010420" + priv + "a00a06082a8648ce3d030107") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) # Responder protocol keypair override priv = "f798ed2e19286f6a6efe210b1863badb99af2a14b497634dbfd2a97394fb5aa5" dev[0].set("dpp_protocol_key_override", "30310201010420" + priv + "a00a06082a8648ce3d030107") dev[0].set("dpp_nonce_override", "3d0cfb011ca916d796f7029ff0b43393") # Initiator bootstrapping key priv = "15b2a83c5a0a38b61f2aa8200ee4994b8afdc01c58507d10d0a38f7eedf051bb" id1 = dev[1].dpp_bootstrap_gen(key="30310201010420" + priv + "a00a06082a8648ce3d030107") uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) # Initiator protocol keypair override priv = "a87de9afbb406c96e5f79a3df895ecac3ad406f95da66314c8cb3165e0c61783" dev[1].set("dpp_protocol_key_override", "30310201010420" + priv + "a00a06082a8648ce3d030107") dev[1].set("dpp_nonce_override", "13f4602a16daeb69712263b9c46cba31") dev[0].dpp_qr_code(uri1) dev[0].dpp_listen(2462, qr="mutual") dev[1].dpp_auth_init(uri=uri0, own=id1, neg_freq=2412) wait_auth_success(dev[0], dev[1]) def test_dpp_test_vector_p_256_b(dev, apdev): """DPP P-256 test vector (Responder-only auth)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) # Responder bootstrapping key priv = "54ce181a98525f217216f59b245f60e9df30ac7f6b26c939418cfc3c42d1afa0" id0 = dev[0].dpp_bootstrap_gen(chan="81/11", mac=True, key="30310201010420" + priv + "a00a06082a8648ce3d030107") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) # Responder protocol keypair override priv = "f798ed2e19286f6a6efe210b1863badb99af2a14b497634dbfd2a97394fb5aa5" dev[0].set("dpp_protocol_key_override", "30310201010420" + priv + "a00a06082a8648ce3d030107") dev[0].set("dpp_nonce_override", "3d0cfb011ca916d796f7029ff0b43393") # Initiator bootstrapping key priv = "15b2a83c5a0a38b61f2aa8200ee4994b8afdc01c58507d10d0a38f7eedf051bb" id1 = dev[1].dpp_bootstrap_gen(key="30310201010420" + priv + "a00a06082a8648ce3d030107") uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) # Initiator protocol keypair override priv = "a87de9afbb406c96e5f79a3df895ecac3ad406f95da66314c8cb3165e0c61783" dev[1].set("dpp_protocol_key_override", "30310201010420" + priv + "a00a06082a8648ce3d030107") dev[1].set("dpp_nonce_override", "13f4602a16daeb69712263b9c46cba31") dev[0].dpp_listen(2462) dev[1].dpp_auth_init(uri=uri0, own=id1, neg_freq=2412) wait_auth_success(dev[0], dev[1]) def der_priv_key_p_521(priv): if len(priv) != 2 * 66: raise Exception("Unexpected der_priv_key_p_521 parameter: " + priv) der_prefix = "30500201010442" der_postfix = "a00706052b81040023" return der_prefix + priv + der_postfix def test_dpp_test_vector_p_521(dev, apdev): """DPP P-521 test vector (mutual auth)""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) # Responder bootstrapping key priv = "0061e54f518cdf859735da3dd64c6f72c2f086f41a6fd52915152ea2fe0f24ddaecd8883730c9c9fd82cf7c043a41021696388cf5190b731dd83638bcd56d8b6c743" id0 = dev[0].dpp_bootstrap_gen(chan="81/11", mac=True, key=der_priv_key_p_521(priv)) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) # Responder protocol keypair override priv = "01d8b7b17cd1b0a33f7c66fb4220999329cdaf4f8b44b2ffadde8ab8ed8abffa9f5358c5b1caae26709ca4fb78e52a4d08f2e4f24111a36a6f440d20a0000ff51597" dev[0].set("dpp_protocol_key_override", der_priv_key_p_521(priv)) dev[0].set("dpp_nonce_override", "d749a782012eb0a8595af30b2dfc8d0880d004ebddb55ecc5afbdef18c400e01") # Initiator bootstrapping key priv = "0060c10df14af5ef27f6e362d31bdd9eeb44be77a323ba64b08f3f03d58b92cbfe05c182a91660caa081ca344243c47b5aa088bcdf738840eb35f0218b9f26881e02" id1 = dev[1].dpp_bootstrap_gen(key=der_priv_key_p_521(priv)) uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) # Initiator protocol keypair override priv = "019c1c08caaeec38fb931894699b095bc3ab8c1ec7ef0622d2e3eba821477c8c6fca41774f21166ad98aebda37c067d9aa08a8a2e1b5c44c61f2bae02a61f85d9661" dev[1].set("dpp_protocol_key_override", der_priv_key_p_521(priv)) dev[1].set("dpp_nonce_override", "de972af3847bec3ba2aedd9f5c21cfdec7bf0bc5fe8b276cbcd0267807fb15b0") dev[0].dpp_qr_code(uri1) dev[0].dpp_listen(2462, qr="mutual") dev[1].dpp_auth_init(uri=uri0, own=id1, neg_freq=2412) wait_auth_success(dev[0], dev[1]) def test_dpp_pkex(dev, apdev): """DPP and PKEX""" run_dpp_pkex(dev, apdev) def test_dpp_pkex_v2(dev, apdev): """DPP and PKEXv2""" run_dpp_pkex(dev, apdev, ver=2) def test_dpp_pkex_p256(dev, apdev): """DPP and PKEX (P-256)""" run_dpp_pkex(dev, apdev, "P-256") def test_dpp_pkex_p384(dev, apdev): """DPP and PKEX (P-384)""" run_dpp_pkex(dev, apdev, "P-384") def test_dpp_pkex_p521(dev, apdev): """DPP and PKEX (P-521)""" run_dpp_pkex(dev, apdev, "P-521") def test_dpp_pkex_bp256(dev, apdev): """DPP and PKEX (BP-256)""" run_dpp_pkex(dev, apdev, "brainpoolP256r1") def test_dpp_pkex_bp384(dev, apdev): """DPP and PKEX (BP-384)""" run_dpp_pkex(dev, apdev, "brainpoolP384r1") def test_dpp_pkex_bp512(dev, apdev): """DPP and PKEX (BP-512)""" run_dpp_pkex(dev, apdev, "brainpoolP512r1") def test_dpp_pkex_config(dev, apdev): """DPP and PKEX with initiator as the configurator""" check_dpp_capab(dev[1]) conf_id = dev[1].dpp_configurator_add() run_dpp_pkex(dev, apdev, init_extra="conf=sta-dpp configurator=%d" % (conf_id), check_config=True) def test_dpp_pkex_no_identifier(dev, apdev): """DPP and PKEX without identifier""" run_dpp_pkex(dev, apdev, identifier_i=None, identifier_r=None) def test_dpp_pkex_identifier_mismatch(dev, apdev): """DPP and PKEX with different identifiers""" run_dpp_pkex(dev, apdev, identifier_i="foo", identifier_r="bar", expect_no_resp=True) def test_dpp_pkex_identifier_mismatch2(dev, apdev): """DPP and PKEX with initiator using identifier and the responder not""" run_dpp_pkex(dev, apdev, identifier_i="foo", identifier_r=None, expect_no_resp=True) def test_dpp_pkex_identifier_mismatch3(dev, apdev): """DPP and PKEX with responder using identifier and the initiator not""" run_dpp_pkex(dev, apdev, identifier_i=None, identifier_r="bar", expect_no_resp=True) def run_dpp_pkex(dev, apdev, curve=None, init_extra=None, check_config=False, identifier_i="test", identifier_r="test", expect_no_resp=False, ver=None): min_ver = 3 if ver else 1 check_dpp_capab(dev[0], curve and "brainpool" in curve, min_ver=min_ver) check_dpp_capab(dev[1], curve and "brainpool" in curve, min_ver=min_ver) dev[0].dpp_pkex_resp(2437, identifier=identifier_r, code="secret", curve=curve) dev[1].dpp_pkex_init(identifier=identifier_i, code="secret", curve=curve, extra=init_extra, ver=ver) if expect_no_resp: ev = dev[0].wait_event(["DPP-RX"], timeout=10) if ev is None: raise Exception("DPP PKEX frame not received") ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=1) if ev is not None: raise Exception("DPP authentication succeeded") ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=0.1) if ev is not None: raise Exception("DPP authentication succeeded") return wait_auth_success(dev[0], dev[1], configurator=dev[1] if check_config else None, enrollee=dev[0] if check_config else None) def test_dpp_pkex_5ghz(dev, apdev): """DPP and PKEX on 5 GHz""" try: dev[0].request("SET country US") dev[1].request("SET country US") ev = dev[0].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=1) if ev is None: ev = dev[0].wait_global_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=1) run_dpp_pkex_5ghz(dev, apdev) finally: dev[0].request("SET country 00") dev[1].request("SET country 00") subprocess.call(['iw', 'reg', 'set', '00']) time.sleep(0.1) def run_dpp_pkex_5ghz(dev, apdev): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(5745, identifier="test", code="secret") dev[1].dpp_pkex_init(identifier="test", code="secret") wait_auth_success(dev[0], dev[1], timeout=20) def test_dpp_pkex_test_vector(dev, apdev): """DPP and PKEX (P-256) test vector""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) init_addr = "ac:64:91:f4:52:07" resp_addr = "6e:5e:ce:6e:f3:dd" identifier = "joes_key" code = "thisisreallysecret" # Initiator bootstrapping private key init_priv = "5941b51acfc702cdc1c347264beb2920db88eb1a0bf03a211868b1632233c269" # Responder bootstrapping private key resp_priv = "2ae8956293f49986b6d0b8169a86805d9232babb5f6813fdfe96f19d59536c60" # Initiator x/X keypair override init_x_priv = "8365c5ed93d751bef2d92b410dc6adfd95670889183fac1bd66759ad85c3187a" # Responder y/Y keypair override resp_y_priv = "d98faa24d7dd3f592665d71a95c862bfd02c4c48acb0c515a41cbc6e929675ea" p256_prefix = "30310201010420" p256_postfix = "a00a06082a8648ce3d030107" dev[0].set("dpp_pkex_own_mac_override", resp_addr) dev[0].set("dpp_pkex_peer_mac_override", init_addr) dev[1].set("dpp_pkex_own_mac_override", init_addr) dev[1].set("dpp_pkex_peer_mac_override", resp_addr) # Responder y/Y keypair override dev[0].set("dpp_pkex_ephemeral_key_override", p256_prefix + resp_y_priv + p256_postfix) # Initiator x/X keypair override dev[1].set("dpp_pkex_ephemeral_key_override", p256_prefix + init_x_priv + p256_postfix) dev[0].dpp_pkex_resp(2437, identifier=identifier, code=code, key=p256_prefix + resp_priv + p256_postfix) dev[1].dpp_pkex_init(identifier=identifier, code=code, key=p256_prefix + init_priv + p256_postfix) wait_auth_success(dev[0], dev[1]) def test_dpp_pkex_code_mismatch(dev, apdev): """DPP and PKEX with mismatching code""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret") id1 = dev[1].dpp_pkex_init(identifier="test", code="unknown") wait_dpp_fail(dev[0], "possible PKEX code mismatch") dev[0].dump_monitor() dev[1].dump_monitor() dev[1].dpp_pkex_init(identifier="test", code="secret", use_id=id1) wait_auth_success(dev[0], dev[1]) def test_dpp_pkex_code_mismatch_limit(dev, apdev): """DPP and PKEX with mismatching code limit""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret") id1 = None for i in range(5): dev[0].dump_monitor() dev[1].dump_monitor() id1 = dev[1].dpp_pkex_init(identifier="test", code="unknown", use_id=id1) wait_dpp_fail(dev[0], "possible PKEX code mismatch") ev = dev[0].wait_event(["DPP-PKEX-T-LIMIT"], timeout=1) if ev is None: raise Exception("PKEX t limit not reported") def test_dpp_pkex_curve_mismatch(dev, apdev): """DPP and PKEX with mismatching curve""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret", curve="P-256") dev[1].dpp_pkex_init(identifier="test", code="secret", curve="P-384") wait_dpp_fail(dev[0], "Mismatching PKEX curve: peer=20 own=19") wait_dpp_fail(dev[1], "Peer indicated mismatching PKEX group - proposed 19") def test_dpp_pkex_curve_mismatch_failure(dev, apdev): """DPP and PKEX with mismatching curve (local failure)""" run_dpp_pkex_curve_mismatch_failure(dev, apdev, "=dpp_pkex_rx_exchange_req") def test_dpp_pkex_curve_mismatch_failure2(dev, apdev): """DPP and PKEX with mismatching curve (local failure 2)""" run_dpp_pkex_curve_mismatch_failure(dev, apdev, "dpp_pkex_build_exchange_resp") def run_dpp_pkex_curve_mismatch_failure(dev, apdev, func): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret", curve="P-256") with alloc_fail(dev[0], 1, func): dev[1].dpp_pkex_init(identifier="test", code="secret", curve="P-384") ev = dev[0].wait_event(["DPP-FAIL"], timeout=5) if ev is None: raise Exception("Failure not reported (dev 0)") if "Mismatching PKEX curve: peer=20 own=19" not in ev: raise Exception("Unexpected result: " + ev) wait_dpp_fail(dev[0], "Mismatching PKEX curve: peer=20 own=19") def test_dpp_pkex_exchange_resp_processing_failure(dev, apdev): """DPP and PKEX with local failure in processing Exchange Resp""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret") with fail_test(dev[1], 1, "dpp_pkex_derive_Qr;dpp_pkex_rx_exchange_resp"): dev[1].dpp_pkex_init(identifier="test", code="secret") wait_fail_trigger(dev[1], "GET_FAIL") def test_dpp_pkex_commit_reveal_req_processing_failure(dev, apdev): """DPP and PKEX with local failure in processing Commit Reveal Req""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret") with alloc_fail(dev[0], 1, "crypto_ec_key_get_pubkey_point;dpp_pkex_rx_commit_reveal_req"): dev[1].dpp_pkex_init(identifier="test", code="secret") wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") def test_dpp_pkex_config2(dev, apdev): """DPP and PKEX with responder as the configurator""" check_dpp_capab(dev[0]) conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_configurator_params", " conf=sta-dpp configurator=%d" % conf_id) run_dpp_pkex2(dev, apdev) def run_dpp_pkex2(dev, apdev, curve=None, init_extra=""): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret", curve=curve, listen_role="configurator") dev[1].dpp_pkex_init(identifier="test", code="secret", role="enrollee", curve=curve, extra=init_extra) wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1]) def test_dpp_pkex_no_responder(dev, apdev): """DPP and PKEX with no responder (retry behavior)""" check_dpp_capab(dev[0]) dev[0].dpp_pkex_init(identifier="test", code="secret") for i in range(15): ev = dev[0].wait_event(["DPP-TX ", "DPP-FAIL"], timeout=5) if ev is None: raise Exception("DPP PKEX failure not reported") if "DPP-FAIL" not in ev: continue if "No response from PKEX peer" not in ev: raise Exception("Unexpected failure reason: " + ev) break def test_dpp_pkex_after_retry(dev, apdev): """DPP and PKEX completing after retry""" check_dpp_capab(dev[0]) dev[0].dpp_pkex_init(identifier="test", code="secret") time.sleep(0.1) dev[1].dpp_pkex_resp(2437, identifier="test", code="secret") wait_auth_success(dev[1], dev[0], configurator=dev[0], enrollee=dev[1], allow_enrollee_failure=True) def test_dpp_pkex_hostapd_responder(dev, apdev): """DPP PKEX with hostapd as responder""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) hapd.dpp_pkex_resp(2437, identifier="test", code="secret") conf_id = dev[0].dpp_configurator_add() dev[0].dpp_pkex_init(identifier="test", code="secret", extra="conf=ap-dpp configurator=%d" % conf_id) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, stop_initiator=True) def test_dpp_pkex_v2_hostapd_responder(dev, apdev): """DPP PKEXv2 with hostapd as responder""" check_dpp_capab(dev[0], min_ver=3) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd, min_ver=3) hapd.dpp_pkex_resp(2437, identifier="test", code="secret") conf_id = dev[0].dpp_configurator_add() dev[0].dpp_pkex_init(identifier="test", code="secret", extra="conf=ap-dpp configurator=%d" % conf_id, ver=2) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, stop_initiator=True) def test_dpp_pkex_hostapd_initiator(dev, apdev): """DPP PKEX with hostapd as initiator""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret", listen_role="configurator") hapd.dpp_pkex_init(identifier="test", code="secret", role="enrollee") wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, stop_initiator=True) def test_dpp_pkex_v2_hostapd_initiator(dev, apdev): """DPP PKEXv2 with hostapd as initiator""" check_dpp_capab(dev[0], min_ver=3) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd, min_ver=3) conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret", listen_role="configurator") hapd.dpp_pkex_init(identifier="test", code="secret", role="enrollee", ver=2) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, stop_initiator=True) def test_dpp_pkex_hostapd_initiator_fallback(dev, apdev): """DPP PKEX with hostapd as initiator and fallback to v1""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd, min_ver=3) conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_listen(2437, role="configurator") hapd.dpp_pkex_init(identifier="test", code="secret", role="enrollee") while True: ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None: raise Exception("DPP-RX not reported") if "type=7" in ev: logger.info("Starting PKEXv1 responder") conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_pkex_resp(2437, identifier="test", code="secret", listen_role="configurator") break wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, stop_initiator=True) def test_dpp_pkex_hostapd_initiator_no_response(dev, apdev): """DPP PKEX with hostapd as initiator and no response""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() hapd.dpp_pkex_init(identifier="test", code="secret", role="enrollee") ev = hapd.wait_event(["DPP-FAIL"], timeout=30) if not ev: raise Exception("Failure not reported") if "No response from PKEX peer" not in ev: raise Exception("Unexpected failure reason: " + ev) def test_dpp_pkex_hostapd_errors(dev, apdev): """DPP PKEX errors with hostapd""" hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) id0 = hapd.dpp_bootstrap_gen(type="pkex") tests = ["own=%d" % id0, "own=%d identifier=foo" % id0, ""] for t in tests: if "FAIL" not in hapd.request("DPP_PKEX_ADD " + t): raise Exception("Invalid DPP_PKEX_ADD accepted: " + t) res = hapd.request("DPP_PKEX_ADD own=%d code=foo" % id0) if "FAIL" in res: raise Exception("Failed to add PKEX responder") if "OK" not in hapd.request("DPP_PKEX_REMOVE " + res): raise Exception("Failed to remove PKEX responder") hapd.request("DPP_PKEX_REMOVE " + res) res = hapd.request("DPP_PKEX_ADD own=%d code=foo" % id0) if "FAIL" in res: raise Exception("Failed to add PKEX responder") if "OK" not in hapd.request("DPP_PKEX_REMOVE *"): raise Exception("Failed to flush PKEX responders") hapd.request("DPP_PKEX_REMOVE *") def test_dpp_pkex_nak_curve_change(dev, apdev): """DPP PKEX with netAccessKey curve change""" try: run_dpp_pkex_nak_curve_change(dev, apdev) finally: dev[1].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_pkex_nak_curve_change2(dev, apdev): """DPP PKEX with netAccessKey curve change (2)""" try: run_dpp_pkex_nak_curve_change(dev, apdev, failure=True) finally: dev[1].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_pkex_nak_curve_change(dev, apdev, failure=False): check_dpp_capab(dev[0], min_ver=3) check_dpp_capab(dev[1], min_ver=3) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd, min_ver=3) hapd.dpp_pkex_resp(2437, identifier="test-1", code="secret-1", curve="secp384r1") conf_id = dev[0].dpp_configurator_add() dev[0].dpp_pkex_init(identifier="test-1", code="secret-1", curve="secp384r1", extra="conf=ap-dpp configurator=%d" % conf_id) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, stop_initiator=True) update_hapd_config(hapd) dev[0].dump_monitor() hapd.dump_monitor() dev[1].set("dpp_config_processing", "2") dev[1].dpp_pkex_resp(2437, identifier="test-2", code="secret-2") if failure: dev[0].dpp_configurator_set(conf_id, net_access_key_curve="prime256v1") dev[0].dpp_pkex_init(identifier="test-2", code="secret-2", extra="conf=sta-dpp configurator=%d" % conf_id) wait_auth_success(dev[1], dev[0], configurator=dev[0], enrollee=dev[1], stop_initiator=True) if failure: ev = dev[1].wait_event(["DPP-INTRO"], timeout=10) if ev is None: raise Exception("No DPP-INTRO message seen") if "status=7" not in ev: raise Exception("Unexpected DPP-INTRO contents: " + ev) else: dev[1].wait_connected() dev[0].dump_monitor() dev[1].dump_monitor() hapd.dump_monitor() def test_dpp_hostapd_configurator(dev, apdev): """DPP with hostapd as configurator/initiator""" run_dpp_hostapd_configurator(dev, apdev) def test_dpp_hostapd_configurator_enrollee_v1(dev, apdev): """DPP with hostapd as configurator/initiator with v1 enrollee""" check_dpp_capab(dev[0]) dev[0].set("dpp_version_override", "1") run_dpp_hostapd_configurator(dev, apdev) def run_dpp_hostapd_configurator(dev, apdev): check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "1"}) check_dpp_capab(hapd) conf_id = hapd.dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) id1 = hapd.dpp_qr_code(uri0) res = hapd.request("DPP_BOOTSTRAP_INFO %d" % id1) if "FAIL" in res: raise Exception("DPP_BOOTSTRAP_INFO failed") if "type=QRCODE" not in res: raise Exception("DPP_BOOTSTRAP_INFO did not report correct type") if "mac_addr=" + dev[0].own_addr() not in res: raise Exception("DPP_BOOTSTRAP_INFO did not report correct mac_addr") dev[0].dpp_listen(2412) hapd.dpp_auth_init(peer=id1, configurator=conf_id, conf="sta-dpp") wait_auth_success(dev[0], hapd, configurator=hapd, enrollee=dev[0], stop_responder=True) def test_dpp_hostapd_configurator_responder(dev, apdev): """DPP with hostapd as configurator/responder""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "1"}) check_dpp_capab(hapd) conf_id = hapd.dpp_configurator_add() hapd.set("dpp_configurator_params", " conf=sta-dpp configurator=%d" % conf_id) id0 = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(hapd, dev[0], configurator=hapd, enrollee=dev[0], stop_initiator=True) def test_dpp_hostapd_configurator_fragmentation(dev, apdev): """DPP with hostapd as configurator/initiator requiring fragmentation""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "1"}) check_dpp_capab(hapd) conf_id = hapd.dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) id1 = hapd.dpp_qr_code(uri0) res = hapd.request("DPP_BOOTSTRAP_INFO %d" % id1) if "FAIL" in res: raise Exception("DPP_BOOTSTRAP_INFO failed") if "type=QRCODE" not in res: raise Exception("DPP_BOOTSTRAP_INFO did not report correct type") if "mac_addr=" + dev[0].own_addr() not in res: raise Exception("DPP_BOOTSTRAP_INFO did not report correct mac_addr") dev[0].dpp_listen(2412) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' hapd.set("dpp_config_obj_override", conf) hapd.dpp_auth_init(peer=id1, configurator=conf_id, conf="sta-dpp") wait_auth_success(dev[0], hapd, configurator=hapd, enrollee=dev[0], stop_responder=True) def test_dpp_hostapd_enrollee_fragmentation(dev, apdev): """DPP and hostapd as Enrollee with GAS fragmentation""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[0].set("dpp_config_obj_override", conf) dev[0].set("dpp_configurator_params", " conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_listen(2437, role="configurator") hapd.dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], hapd, configurator=dev[0], enrollee=hapd, stop_responder=True) def test_dpp_hostapd_enrollee_gas_timeout(dev, apdev): """DPP and hostapd as Enrollee with GAS timeout""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[0].set("dpp_config_obj_override", conf) dev[0].set("dpp_configurator_params", "conf=ap-dpp configurator=%d" % conf_id) dev[0].set("ext_mgmt_frame_handling", "1") dev[0].dpp_listen(2437, role="configurator") hapd.dpp_auth_init(uri=uri0, role="enrollee") process_dpp_frames(dev[0]) ev = hapd.wait_event(["GAS-QUERY-DONE"], timeout=10) if "result=TIMEOUT" not in ev: raise Exception("GAS timeout not reported") def test_dpp_hostapd_enrollee_gas_timeout_comeback(dev, apdev): """DPP and hostapd as Enrollee with GAS timeout during comeback""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[0].set("dpp_config_obj_override", conf) dev[0].set("dpp_configurator_params", "conf=ap-dpp configurator=%d" % conf_id) dev[0].set("ext_mgmt_frame_handling", "1") dev[0].dpp_listen(2437, role="configurator") hapd.dpp_auth_init(uri=uri0, role="enrollee") process_dpp_frames(dev[0], count=4) ev = hapd.wait_event(["GAS-QUERY-DONE"], timeout=10) if "result=TIMEOUT" not in ev: raise Exception("GAS timeout not reported") def process_dpp_frames(dev, count=3): for i in range(count): msg = dev.mgmt_rx() cmd = "MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode()) if "OK" not in dev.request(cmd): raise Exception("MGMT_RX_PROCESS failed") def test_dpp_hostapd_enrollee_gas_errors(dev, apdev): """DPP and hostapd as Enrollee with GAS query local errors""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", "conf=ap-dpp configurator=%d" % conf_id) dev[0].set("ext_mgmt_frame_handling", "1") # GAS without comeback tests = [(1, "gas_query_append;gas_query_rx_initial", 3, True), (1, "gas_query_rx_initial", 3, True), (1, "gas_query_tx_initial_req", 2, True), (1, "gas_query_ap_req", 2, False)] for count, func, frame_count, wait_ev in tests: dev[0].request("DPP_STOP_LISTEN") dev[0].dpp_listen(2437, role="configurator") dev[0].dump_monitor() hapd.dump_monitor() with alloc_fail(hapd, count, func): hapd.dpp_auth_init(uri=uri0, role="enrollee") process_dpp_frames(dev[0], count=frame_count) if wait_ev: ev = hapd.wait_event(["GAS-QUERY-DONE"], timeout=10) if not ev or "result=INTERNAL_ERROR" not in ev: raise Exception("Unexpect GAS query result: " + str(ev)) # GAS with comeback conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[0].set("dpp_config_obj_override", conf) tests = [(1, "gas_query_append;gas_query_rx_comeback", 4), (1, "wpabuf_alloc;gas_query_tx_comeback_req", 3), (1, "hostapd_drv_send_action;gas_query_tx_comeback_req", 3)] for count, func, frame_count in tests: dev[0].request("DPP_STOP_LISTEN") dev[0].dpp_listen(2437, role="configurator") dev[0].dump_monitor() hapd.dump_monitor() with alloc_fail(hapd, count, func): hapd.dpp_auth_init(uri=uri0, role="enrollee") process_dpp_frames(dev[0], count=frame_count) ev = hapd.wait_event(["GAS-QUERY-DONE"], timeout=10) if not ev or "result=INTERNAL_ERROR" not in ev: raise Exception("Unexpect GAS query result: " + str(ev)) def test_dpp_hostapd_enrollee_gas_proto(dev, apdev): """DPP and hostapd as Enrollee with GAS query protocol testing""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) bssid = hapd.own_addr() conf_id = dev[0].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/6", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", "conf=ap-dpp configurator=%d" % conf_id) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' ' dev[0].set("dpp_config_obj_override", conf) dev[0].set("ext_mgmt_frame_handling", "1") dev[0].dpp_listen(2437, role="configurator") hapd.dpp_auth_init(uri=uri0, role="enrollee") process_dpp_frames(dev[0], count=3) msg = dev[0].mgmt_rx() payload = msg['payload'] dialog_token, = struct.unpack('B', payload[2:3]) hdr = struct.pack('= 2 and ver1 >= 2: # DPP Configuration Result rx_process_frame(dev[0]) wait_conf_completion(dev[0], dev[1]) def test_dpp_truncated_attr(dev, apdev): """DPP and truncated attribute""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) start_dpp(dev) # DPP Authentication Request msg = dev[0].mgmt_rx() frame = msg['frame'] # DPP: Truncated message - not enough room for the attribute - dropped frame1 = binascii.hexlify(frame[0:36]).decode() if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame1)): raise Exception("MGMT_RX_PROCESS failed") ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None or "ignore=invalid-attributes" not in ev: raise Exception("Invalid attribute error not reported") # DPP: Unexpected octets (3) after the last attribute frame2 = binascii.hexlify(frame).decode() + "000000" if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame2)): raise Exception("MGMT_RX_PROCESS failed") ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None or "ignore=invalid-attributes" not in ev: raise Exception("Invalid attribute error not reported") def test_dpp_bootstrap_key_autogen_issues(dev, apdev): """DPP bootstrap key autogen issues""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code") id1 = dev[1].dpp_qr_code(uri0) logger.info("dev1 initiates DPP Authentication") dev[0].dpp_listen(2412) with alloc_fail(dev[1], 1, "dpp_autogen_bootstrap_key"): dev[1].dpp_auth_init(peer=id1, expect_fail=True) with alloc_fail(dev[1], 1, "dpp_gen_uri;dpp_autogen_bootstrap_key"): dev[1].dpp_auth_init(peer=id1, expect_fail=True) with fail_test(dev[1], 1, "dpp_keygen;dpp_autogen_bootstrap_key"): dev[1].dpp_auth_init(peer=id1, expect_fail=True) dev[0].request("DPP_STOP_LISTEN") def test_dpp_auth_resp_status_failure(dev, apdev): """DPP and Auth Resp(status) build failure""" with alloc_fail(dev[0], 1, "dpp_auth_build_resp"): run_dpp_proto_auth_resp_missing(dev, 99999, None, incompatible_roles=True) def test_dpp_auth_resp_aes_siv_issue(dev, apdev): """DPP Auth Resp AES-SIV issue""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) logger.info("dev0 displays QR Code") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("dev1 scans QR Code and initiates DPP Authentication") dev[0].dpp_listen(2412) with fail_test(dev[1], 1, "aes_siv_decrypt;dpp_auth_resp_rx"): dev[1].dpp_auth_init(uri=uri0) wait_dpp_fail(dev[1], "AES-SIV decryption failed") dev[0].request("DPP_STOP_LISTEN") def test_dpp_invalid_legacy_params(dev, apdev): """DPP invalid legacy parameters""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) # No pass/psk dev[1].dpp_auth_init(uri=uri0, conf="sta-psk", ssid="dpp-legacy", expect_fail=True) def test_dpp_invalid_legacy_params2(dev, apdev): """DPP invalid legacy parameters 2""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", " conf=sta-psk ssid=%s" % (binascii.hexlify(b"dpp-legacy").decode())) dev[0].dpp_listen(2412, role="configurator") dev[1].dpp_auth_init(uri=uri0, role="enrollee") # No pass/psk ev = dev[0].wait_event(["DPP: Failed to set configurator parameters"], timeout=5) if ev is None: raise Exception("DPP configuration failure not reported") def test_dpp_legacy_params_failure(dev, apdev): """DPP legacy parameters local failure""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) with alloc_fail(dev[1], 1, "dpp_build_conf_obj_legacy"): dev[1].dpp_auth_init(uri=uri0, conf="sta-psk", passphrase="passphrase", ssid="dpp-legacy") ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=5) if ev is None: raise Exception("DPP configuration failure not reported") def test_dpp_invalid_configurator_key(dev, apdev): """DPP invalid configurator key""" check_dpp_capab(dev[0]) if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=aa"): raise Exception("Invalid key accepted") with alloc_fail(dev[0], 1, "dpp_keygen_configurator"): if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256): raise Exception("Error not reported") with alloc_fail(dev[0], 1, "crypto_ec_key_get_pubkey_point;dpp_keygen_configurator"): if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256): raise Exception("Error not reported") with alloc_fail(dev[0], 1, "base64_gen_encode;dpp_keygen_configurator"): if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256): raise Exception("Error not reported") with fail_test(dev[0], 1, "dpp_keygen_configurator"): if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256): raise Exception("Error not reported") def test_dpp_own_config_sign_fail(dev, apdev): """DPP own config signing failure""" check_dpp_capab(dev[0]) conf_id = dev[0].dpp_configurator_add() tests = ["", " ", " conf=sta-dpp", " configurator=%d" % conf_id, " conf=sta-dpp configurator=%d curve=unsupported" % conf_id] for t in tests: if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_SIGN " + t): raise Exception("Invalid command accepted: " + t) def test_dpp_peer_intro_failures(dev, apdev): """DPP peer introduction failures""" try: run_dpp_peer_intro_failures(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_peer_intro_failures(dev, apdev): check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) conf_id = hapd.dpp_configurator_add(key=dpp_key_p256) csign = hapd.request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id) if "FAIL" in csign or len(csign) == 0: raise Exception("DPP_CONFIGURATOR_GET_KEY failed") conf_id2 = dev[0].dpp_configurator_add(key=csign) csign2 = dev[0].request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id2) if csign != csign2: raise Exception("Unexpected difference in configurator key") cmd = "DPP_CONFIGURATOR_SIGN conf=ap-dpp configurator=%d" % conf_id res = hapd.request(cmd) if "FAIL" in res: raise Exception("Failed to generate own configuration") update_hapd_config(hapd) dev[0].set("dpp_config_processing", "1") cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d" % conf_id res = dev[0].request(cmd) if "FAIL" in res: raise Exception("Failed to generate own configuration") ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") id = ev.split(' ')[1] dev[0].select_network(id, freq=2412) dev[0].wait_connected() dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].dump_monitor() tests = ["eyJ0eXAiOiJkcHBDb24iLCJraWQiOiIwTlNSNTlxRTc0alFfZTFLVGVPV1lYY1pTWnFUaDdNXzU0aHJPcFRpaFJnIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOltdLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiJiVmFMRGlBT09OQmFjcVFVN1pYamFBVEtEMVhhbDVlUExqOUZFZUl3VkN3IiwieSI6Il95c25JR1hTYjBvNEsyMWg0anZmSkZxMHdVNnlPNWp1VUFPd3FuM0dHVHMifX0.WgzZBOJaisWBRxvtXPbVYPXU7OIZxs6sZD-cPOLmJVTIYZKdMkSOMvP5b6si_j61FIrjhm43tmGq1P6cpoxB_g", "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiIwTlNSNTlxRTc0alFfZTFLVGVPV1lYY1pTWnFUaDdNXzU0aHJPcFRpaFJnIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7fV0sIm5ldEFjY2Vzc0tleSI6eyJrdHkiOiJFQyIsImNydiI6IlAtMjU2IiwieCI6IkJhY3BWSDNpNDBrZklNS0RHa1FFRzhCODBCaEk4cEFmTWpLbzM5NlFZT2ciLCJ5IjoiMjBDYjhDNjRsSjFzQzV2NXlKMnBFZXRRempxMjI4YVV2cHMxNmQ0M3EwQSJ9fQ.dG2y8VvZQJ5hfob8E5F2FAeR7Nd700qstYkxDgA2QfARaNMZ0_SfKfoG-yKXsIZNM-TvGBfACgfhagG9Oaw_Xw", "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiIwTlNSNTlxRTc0alFfZTFLVGVPV1lYY1pTWnFUaDdNXzU0aHJPcFRpaFJnIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiJkc2VmcmJWWlhad0RMWHRpLWlObDBBYkFIOXpqeFFKd0R1SUd5NzNuZGU0IiwieSI6IjZFQnExN3cwYW1fZlh1OUQ4UGxWYk9XZ2I3b19DcTUxWHlmSG8wcHJyeDQifX0.caBvdDUtXrhnS61-juVZ_2FQdprepv0yZjC04G4ERvLUpeX7cgu0Hp-A1aFDogP1PEFGpkaEdcAWRQnSSRiIKQ"] for t in tests: dev[0].set_network_quoted(id, "dpp_connector", t) dev[0].select_network(id, freq=2412) ev = dev[0].wait_event(["DPP-INTRO"], timeout=5) if ev is None or "status=8" not in ev: raise Exception("Introduction failure not reported") dev[0].request("DISCONNECT") dev[0].dump_monitor() def test_dpp_peer_intro_local_failures(dev, apdev): """DPP peer introduction local failures""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = {"ssid": "dpp", "wpa": "2", "wpa_key_mgmt": "DPP", "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") tests = ["dpp_derive_pmk", "dpp_hkdf_expand;dpp_derive_pmk", "dpp_derive_pmkid"] for func in tests: with fail_test(dev[0], 1, func): dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, wait_connect=False) ev = dev[0].wait_event(["DPP-INTRO"], timeout=10) if ev is None or "fail=peer_connector_validation_failed" not in ev: raise Exception("Introduction failure not reported") dev[0].request("REMOVE_NETWORK all") dev[0].dump_monitor() tests = [(1, "base64_gen_decode;dpp_peer_intro"), (1, "json_parse;dpp_peer_intro"), (50, "json_parse;dpp_peer_intro"), (1, "=dpp_check_signed_connector;dpp_peer_intro"), (1, "dpp_parse_jwk")] for count, func in tests: with alloc_fail(dev[0], count, func): dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, wait_connect=False) ev = dev[0].wait_event(["DPP-INTRO"], timeout=10) if ev is None or "fail=peer_connector_validation_failed" not in ev: raise Exception("Introduction failure not reported") dev[0].request("REMOVE_NETWORK all") dev[0].dump_monitor() parts = params1_ap_connector.split('.') for ap_connector in ['.'.join(parts[0:2]), '.'.join(parts[0:1])]: hapd.set("dpp_connector", ap_connector) dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, wait_connect=False) ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=10) if ev is None: raise Exception("No TX status reported") dev[0].request("REMOVE_NETWORK all") dev[0].dump_monitor() hapd.set("dpp_netaccesskey", "00") dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, wait_connect=False) ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=10) if ev is None: raise Exception("No TX status reported") dev[0].request("REMOVE_NETWORK all") dev[0].dump_monitor() hapd.set("dpp_csign", "00") dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, wait_connect=False) ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=10) if ev is None: raise Exception("No TX status reported") dev[0].request("REMOVE_NETWORK all") def run_dpp_configurator_id_unknown(dev): check_dpp_capab(dev) conf_id = dev.dpp_configurator_add() if "FAIL" not in dev.request("DPP_CONFIGURATOR_GET_KEY %d" % (conf_id + 1)): raise Exception("DPP_CONFIGURATOR_GET_KEY with incorrect id accepted") cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d" % (conf_id + 1) if "FAIL" not in dev.request(cmd): raise Exception("DPP_CONFIGURATOR_SIGN with incorrect id accepted") def test_dpp_configurator_id_unknown(dev, apdev): """DPP and unknown configurator id""" run_dpp_configurator_id_unknown(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) run_dpp_configurator_id_unknown(hapd) def run_dpp_bootstrap_gen_failures(dev): check_dpp_capab(dev) tests = ["type=unsupported", "type=qrcode chan=-1", "type=qrcode mac=a", "type=qrcode key=qq", "type=qrcode key=", "type=qrcode info=abc\tdef"] for t in tests: if "FAIL" not in dev.request("DPP_BOOTSTRAP_GEN " + t): raise Exception("Command accepted unexpectedly") id = dev.dpp_bootstrap_gen() uri = dev.request("DPP_BOOTSTRAP_GET_URI %d" % id) if not uri.startswith("DPP:"): raise Exception("Could not get URI") if "FAIL" not in dev.request("DPP_BOOTSTRAP_GET_URI 0"): raise Exception("Failure not reported") info = dev.request("DPP_BOOTSTRAP_INFO %d" % id) if not info.startswith("type=QRCODE"): raise Exception("Could not get info") if "FAIL" not in dev.request("DPP_BOOTSTRAP_REMOVE 0"): raise Exception("Failure not reported") if "FAIL" in dev.request("DPP_BOOTSTRAP_REMOVE *"): raise Exception("Failed to remove bootstrap info") if "FAIL" not in dev.request("DPP_BOOTSTRAP_GET_URI %d" % id): raise Exception("Failure not reported") if "FAIL" not in dev.request("DPP_BOOTSTRAP_INFO %d" % id): raise Exception("Failure not reported") func = "dpp_bootstrap_gen" with alloc_fail(dev, 1, "=" + func): if "FAIL" not in dev.request("DPP_BOOTSTRAP_GEN type=qrcode"): raise Exception("Command accepted unexpectedly") with alloc_fail(dev, 1, "dpp_gen_uri;dpp_bootstrap_gen"): if "FAIL" not in dev.request("DPP_BOOTSTRAP_GEN type=qrcode"): raise Exception("Command accepted unexpectedly") with alloc_fail(dev, 1, "get_param"): dev.request("DPP_BOOTSTRAP_GEN type=qrcode curve=foo") def test_dpp_bootstrap_gen_failures(dev, apdev): """DPP_BOOTSTRAP_GEN/REMOVE/GET_URI/INFO error cases""" run_dpp_bootstrap_gen_failures(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) run_dpp_bootstrap_gen_failures(hapd) def test_dpp_listen_continue(dev, apdev): """DPP and continue listen state""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) dev[0].dpp_listen(2412) time.sleep(5.1) dev[1].dpp_auth_init(uri=uri) wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=True, stop_responder=True, stop_initiator=True) def test_dpp_network_addition_failure(dev, apdev): """DPP network addition failure""" try: run_dpp_network_addition_failure(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_network_addition_failure(dev, apdev): check_dpp_capab(dev[0]) conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_config_processing", "1") cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d" % conf_id tests = [(1, "=wpas_dpp_add_network"), (2, "=wpas_dpp_add_network"), (3, "=wpas_dpp_add_network"), (4, "=wpas_dpp_add_network"), (1, "wpa_config_add_network;wpas_dpp_add_network")] for count, func in tests: with alloc_fail(dev[0], count, func): res = dev[0].request(cmd) if "OK" in res: ev = dev[0].wait_event(["DPP-NET-ACCESS-KEY"], timeout=2) if ev is None: raise Exception("Config object not processed") wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") dev[0].dump_monitor() cmd = "DPP_CONFIGURATOR_SIGN conf=sta-psk pass=%s configurator=%d" % (binascii.hexlify(b"passphrase").decode(), conf_id) tests = [(1, "wpa_config_set_quoted;wpas_dpp_add_network")] for count, func in tests: with alloc_fail(dev[0], count, func): res = dev[0].request(cmd) if "OK" in res: ev = dev[0].wait_event(["DPP-NET-ACCESS-KEY"], timeout=2) if ev is None: raise Exception("Config object not processed") wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") dev[0].dump_monitor() def test_dpp_two_initiators(dev, apdev): """DPP and two initiators""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) check_dpp_capab(dev[2]) id = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) dev[0].dpp_listen(2412) peer = dev[2].dpp_qr_code(uri) dev[1].dpp_auth_init(uri=uri) ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None: raise Exeption("No DPP Authentication Request seen") dev[2].dpp_auth_init(uri=uri, peer=peer) ev = dev[0].wait_event(["DPP-FAIL"], timeout=5) if ev is None: raise Exception("Failure not reported") skip = False if "Configurator rejected configuration" in ev: # Race condition prevented real test from being executed skip = True elif "DPP-FAIL Already in DPP authentication exchange - ignore new one" not in ev: raise Exception("Unexpected result: " + ev) ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=2) if ev is None: raise Exception("DPP configuration result not seen (Enrollee)") ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=2) if ev is None: raise Exception("DPP configuration result not seen (Responder)") dev[0].request("DPP_STOP_LISTEN") dev[1].request("DPP_STOP_LISTEN") dev[2].request("DPP_STOP_LISTEN") if skip: raise HwsimSkip("dpp_two_initiators not fully executed due to race condition") def test_dpp_conf_file_update(dev, apdev, params): """DPP provisioning updating wpa_supplicant configuration file""" config = os.path.join(params['logdir'], 'dpp_conf_file_update.conf') with open(config, "w") as f: f.write("update_config=1\n") wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", config=config) check_dpp_capab(wpas) wpas.set("dpp_config_processing", "1") run_dpp_qr_code_auth_unicast([wpas, dev[1]], apdev, None, init_extra="conf=sta-dpp", require_conf_success=True, configurator=True) wpas.interface_remove("wlan5") with open(config, "r") as f: res = f.read() for i in ["network={", "dpp_connector=", "key_mgmt=DPP", "ieee80211w=2", "dpp_netaccesskey=", "dpp_csign="]: if i not in res: raise Exception("Configuration file missing '%s'" % i) wpas.interface_add("wlan5", config=config) if len(wpas.list_networks()) != 1: raise Exception("Unexpected number of networks") def test_dpp_duplicated_auth_resp(dev, apdev): """DPP and duplicated Authentication Response""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("ext_mgmt_frame_handling", "1") dev[1].set("ext_mgmt_frame_handling", "1") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0) # DPP Authentication Request rx_process_frame(dev[0]) # DPP Authentication Response msg = rx_process_frame(dev[1]) frame = binascii.hexlify(msg['frame']).decode() # Duplicated frame if "OK" not in dev[1].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)): raise Exception("MGMT_RX_PROCESS failed") # Modified frame - nonzero status if frame[2*32:2*37] != "0010010000": raise Exception("Could not find Status attribute") frame2 = frame[0:2*32] + "0010010001" + frame[2*37:] if "OK" not in dev[1].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame2)): raise Exception("MGMT_RX_PROCESS failed") frame2 = frame[0:2*32] + "00100100ff" + frame[2*37:] if "OK" not in dev[1].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame2)): raise Exception("MGMT_RX_PROCESS failed") # DPP Authentication Confirmation rx_process_frame(dev[0]) wait_auth_success(dev[0], dev[1]) # DPP Configuration Request rx_process_frame(dev[1]) # DPP Configuration Response rx_process_frame(dev[0]) wait_conf_completion(dev[1], dev[0]) def test_dpp_duplicated_auth_conf(dev, apdev): """DPP and duplicated Authentication Confirmation""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("ext_mgmt_frame_handling", "1") dev[1].set("ext_mgmt_frame_handling", "1") dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0) # DPP Authentication Request rx_process_frame(dev[0]) # DPP Authentication Response rx_process_frame(dev[1]) # DPP Authentication Confirmation msg = rx_process_frame(dev[0]) # Duplicated frame if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())): raise Exception("MGMT_RX_PROCESS failed") wait_auth_success(dev[0], dev[1]) # DPP Configuration Request rx_process_frame(dev[1]) # DPP Configuration Response rx_process_frame(dev[0]) wait_conf_completion(dev[1], dev[0]) def test_dpp_enrollee_reject_config(dev, apdev): """DPP and Enrollee rejecting Config Object""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) dev[0].set("dpp_test", "91") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, conf="sta-sae", ssid="dpp-legacy", passphrase="secret passphrase") wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=True, allow_configurator_failure=True) def test_dpp_enrollee_ap_reject_config(dev, apdev): """DPP and Enrollee AP rejecting Config Object""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) hapd.set("dpp_test", "91") conf_id = dev[0].dpp_configurator_add() id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) dev[0].dpp_auth_init(uri=uri, conf="ap-dpp", configurator=conf_id) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, allow_enrollee_failure=True, allow_configurator_failure=True) def test_dpp_legacy_and_dpp_akm(dev, apdev): """DPP and provisoning DPP and legacy AKMs""" try: run_dpp_legacy_and_dpp_akm(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_legacy_and_dpp_akm(dev, apdev): check_dpp_capab(dev[0], min_ver=2) check_dpp_capab(dev[1], min_ver=2) csign = "30770201010420768240a3fc89d6662d9782f120527fe7fb9edc6366ab0b9c7dde96125cfd250fa00a06082a8648ce3d030107a144034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708" csign_pub = "3059301306072a8648ce3d020106082a8648ce3d030107034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708" ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJwYWtZbXVzd1dCdWpSYTl5OEsweDViaTVrT3VNT3dzZHRlaml2UG55ZHZzIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIybU5vNXZuRkI5bEw3d1VWb1hJbGVPYzBNSEE1QXZKbnpwZXZULVVTYzVNIiwieSI6IlhzS3dqVHJlLTg5WWdpU3pKaG9CN1haeUttTU05OTl3V2ZaSVl0bi01Q3MifX0.XhjFpZgcSa7G2lHy0OCYTvaZFRo5Hyx6b7g7oYyusLC7C_73AJ4_BxEZQVYJXAtDuGvb3dXSkHEKxREP9Q6Qeg" ap_netaccesskey = "30770201010420ceba752db2ad5200fa7bc565b9c05c69b7eb006751b0b329b0279de1c19ca67ca00a06082a8648ce3d030107a14403420004da6368e6f9c507d94bef0515a1722578e73430703902f267ce97af4fe51273935ec2b08d3adefbcf588224b3261a01ed76722a630cf7df7059f64862d9fee42b" ssid = "dpp-both" passphrase = "secret passphrase" params = {"ssid": ssid, "wpa": "2", "wpa_key_mgmt": "DPP WPA-PSK SAE", "ieee80211w": "1", "sae_require_mfp": '1', "rsn_pairwise": "CCMP", "wpa_passphrase": passphrase, "dpp_connector": ap_connector, "dpp_csign": csign_pub, "dpp_netaccesskey": ap_netaccesskey} try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") dev[0].request("SET sae_groups ") conf_id = dev[1].dpp_configurator_add(key=csign) dev[0].set("dpp_config_processing", "1") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) dev[1].dpp_auth_init(uri=uri0, conf="sta-psk-sae-dpp", ssid=ssid, passphrase=passphrase, configurator=conf_id) wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=True, allow_configurator_failure=True) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") id0 = ev.split(' ')[1] key_mgmt = dev[0].get_network(id0, "key_mgmt").split(' ') for m in ["SAE", "WPA-PSK", "DPP"]: if m not in key_mgmt: raise Exception("%s missing from key_mgmt" % m) dev[0].scan_for_bss(hapd.own_addr(), freq=2412) dev[0].select_network(id0, freq=2412) dev[0].wait_connected() dev[0].request("DISCONNECT") dev[0].wait_disconnected() hapd.disable() params = {"ssid": ssid, "wpa": "2", "wpa_key_mgmt": "WPA-PSK SAE", "ieee80211w": "1", "sae_require_mfp": '1', "rsn_pairwise": "CCMP", "wpa_passphrase": passphrase} hapd2 = hostapd.add_ap(apdev[1], params) dev[0].request("BSS_FLUSH 0") dev[0].scan_for_bss(hapd2.own_addr(), freq=2412, force_scan=True, only_new=True) dev[0].select_network(id0, freq=2412) dev[0].wait_connected() dev[0].request("DISCONNECT") dev[0].wait_disconnected() def test_dpp_controller_relay(dev, apdev, params): """DPP Controller/Relay""" try: run_dpp_controller_relay(dev, apdev, params) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_controller_relay_chirp(dev, apdev, params): """DPP Controller/Relay with chirping""" try: run_dpp_controller_relay(dev, apdev, params, chirp=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_controller_relay_chirp_duplicate(dev, apdev, params): """DPP Controller/Relay with chirping (duplicate)""" try: run_dpp_controller_relay(dev, apdev, params, chirp=True, duplicate=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_controller_relay_discover(dev, apdev, params): """DPP Controller/Relay with need to discover Controller""" try: run_dpp_controller_relay(dev, apdev, params, chirp=True, discover=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def run_dpp_controller_relay(dev, apdev, params, chirp=False, discover=False, duplicate=False): check_dpp_capab(dev[0], min_ver=2) check_dpp_capab(dev[1], min_ver=2) cap_lo = params['prefix'] + ".lo.pcap" wt = WlantestCapture('lo', cap_lo) # Controller conf_id = dev[1].dpp_configurator_add() dev[1].set("dpp_configurator_params", "conf=sta-dpp configurator=%d" % conf_id) id_c = dev[1].dpp_bootstrap_gen() uri_c = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id_c) res = dev[1].request("DPP_BOOTSTRAP_INFO %d" % id_c) pkhash = None for line in res.splitlines(): name, value = line.split('=') if name == "pkhash": pkhash = value break if not pkhash: raise Exception("Could not fetch public key hash from Controller") if "OK" not in dev[1].request("DPP_CONTROLLER_START"): raise Exception("Failed to start Controller") # Relay params = {"ssid": "unconfigured", "channel": "6"} if discover: params["dpp_relay_port"] = "11111" else: params["dpp_controller"] = "ipaddr=127.0.0.1 pkhash=" + pkhash if chirp: params["channel"] = "11" params["dpp_configurator_connectivity"] = "1" relay = hostapd.add_ap(apdev[1], params) check_dpp_capab(relay) # Enroll Relay to the network # TODO: Do this over TCP once direct Enrollee-over-TCP case is supported if chirp: id_h = relay.dpp_bootstrap_gen(chan="81/11", mac=True) else: id_h = relay.dpp_bootstrap_gen(chan="81/6", mac=True) uri_r = relay.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) dev[1].dpp_auth_init(uri=uri_r, conf="ap-dpp", configurator=conf_id) wait_auth_success(relay, dev[1], configurator=dev[1], enrollee=relay) update_hapd_config(relay) dev[0].flush_scan_cache() # Initiate from Enrollee with broadcast DPP Authentication Request or # using chirping dev[0].set("dpp_config_processing", "2") if chirp: id1 = dev[0].dpp_bootstrap_gen() uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) idc = dev[1].dpp_qr_code(uri) dev[1].dpp_bootstrap_set(idc, conf="sta-dpp", configurator=conf_id) if duplicate: relay.set("ext_mgmt_frame_handling", "1") if "OK" not in dev[0].request("DPP_CHIRP own=%d iter=5" % id1): raise Exception("DPP_CHIRP failed") if duplicate: for i in range(10): msg = relay.mgmt_rx(timeout=10) if msg is None: raise Exception("MGMT RX wait timed out") relay.request("MGMT_RX_PROCESS freq=2462 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(msg['frame']).decode()) if msg['subtype'] == 13: # Process duplicate Presence Announcement relay.request("MGMT_RX_PROCESS freq=2462 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(msg['frame']).decode()) break relay.set("ext_mgmt_frame_handling", "0") ev = relay.wait_event(["DPP-RX"], timeout=10) if ev is None: raise Exception("Presence Announcement not seen") if "type=13" not in ev: raise Exception("Unexpected DPP frame received: " + ev) else: dev[0].dpp_auth_init(uri=uri_c, role="enrollee") if discover: ev = relay.wait_event(["DPP-RELAY-NEEDS-CONTROLLER"], timeout=30) if ev is None: raise Exception("Relay did not indicate need for a Controller") cmd = "DPP_RELAY_ADD_CONTROLLER 127.0.0.1 " + pkhash if "OK" not in relay.request(cmd): raise Exception("Could not add Controller to Relay") wait_auth_success(dev[1], dev[0], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=True, allow_configurator_failure=True, timeout=100 if discover else 5) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network id not reported") network = int(ev.split(' ')[1]) dev[0].wait_connected() dev[0].dump_monitor() dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].dump_monitor() if "OK" not in dev[0].request("DPP_RECONFIG %s" % network): raise Exception("Failed to start reconfiguration") ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=15) if ev is None: raise Exception("DPP network id not reported for reconfiguration") network2 = int(ev.split(' ')[1]) if network == network2: raise Exception("Network ID did not change") dev[0].wait_connected() time.sleep(0.5) wt.close() def test_dpp_controller_init_through_relay(dev, apdev, params): """DPP Controller initiating through Relay""" try: run_dpp_controller_init_through_relay(dev, apdev, params) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_controller_init_through_relay_dynamic(dev, apdev, params): """DPP Controller initiating through Relay (dynamic addition)""" try: run_dpp_controller_init_through_relay(dev, apdev, params, dynamic=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_controller_init_through_relay_add(dev, apdev, params): """DPP Controller initiating through Relay (add Controller connection)""" try: run_dpp_controller_init_through_relay(dev, apdev, params, add=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) dev[1].request("DPP_CONTROLLER_STOP") def run_dpp_controller_init_through_relay(dev, apdev, params, dynamic=False, add=False): check_dpp_capab(dev[0], min_ver=2) check_dpp_capab(dev[1], min_ver=2) cap_lo = os.path.join(params['prefix'], ".lo.pcap") wt = WlantestCapture('lo', cap_lo) # Controller conf_id = dev[1].dpp_configurator_add() dev[1].set("dpp_configurator_params", "conf=sta-dpp configurator=%d" % conf_id) if not dynamic: id_c = dev[1].dpp_bootstrap_gen() res = dev[1].request("DPP_BOOTSTRAP_INFO %d" % id_c) pkhash = None for line in res.splitlines(): name, value = line.split('=') if name == "pkhash": pkhash = value break if not pkhash: raise Exception("Could not fetch public key hash from Controller") if "OK" not in dev[1].request("DPP_CONTROLLER_START"): raise Exception("Failed to start Controller") # Relay port = 11111 params = {"ssid": "unconfigured", "channel": "6", "dpp_relay_port": str(port)} if not dynamic and not add: params["dpp_controller"] = "ipaddr=127.0.0.1 pkhash=" + pkhash relay = hostapd.add_ap(apdev[0], params) check_dpp_capab(relay) # Enroll Relay to the network # TODO: Do this over TCP once direct Enrollee-over-TCP case is supported id_h = relay.dpp_bootstrap_gen(chan="81/6", mac=True) uri_r = relay.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) dev[1].dpp_auth_init(uri=uri_r, conf="ap-dpp", configurator=conf_id) wait_auth_success(relay, dev[1], configurator=dev[1], enrollee=relay) update_hapd_config(relay) dev[0].flush_scan_cache() # Initiate from Controller with broadcast DPP Authentication Request dev[0].set("dpp_config_processing", "2") dev[0].dpp_listen(2437) id_e = dev[0].dpp_bootstrap_gen() uri_e = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id_e) dev[1].dpp_auth_init(uri=uri_e, conf="sta-dpp", configurator=conf_id, tcp_addr="127.0.0.1", tcp_port=str(port)) wait_auth_success(dev[1], dev[0], configurator=dev[1], enrollee=dev[0], allow_enrollee_failure=True, allow_configurator_failure=True) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network id not reported") network = int(ev.split(' ')[1]) dev[0].wait_connected() dev[0].dump_monitor() dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].dump_monitor() if add: cmd = "DPP_RELAY_ADD_CONTROLLER 127.0.0.1 " + pkhash if "OK" not in relay.request(cmd): raise Exception("Could not add Controller to Relay") if not dynamic: if "OK" not in dev[0].request("DPP_RECONFIG %s" % network): raise Exception("Failed to start reconfiguration") ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=15) if ev is None: raise Exception("DPP network id not reported for reconfiguration") network2 = int(ev.split(' ')[1]) if network == network2: raise Exception("Network ID did not change") dev[0].wait_connected() if add: relay.request("DPP_RELAY_REMOVE_CONTROLLER 127.0.0.1") time.sleep(0.5) wt.close() class MyTCPServer(TCPServer): def __init__(self, addr, handler): self.allow_reuse_address = True TCPServer.__init__(self, addr, handler) class DPPControllerServer(StreamRequestHandler): def handle(self): data = self.rfile.read() # Do not reply def test_dpp_relay_incomplete_connections(dev, apdev): """DPP Relay and incomplete connections""" check_dpp_capab(dev[0], min_ver=2) check_dpp_capab(dev[1], min_ver=2) id_c = dev[1].dpp_bootstrap_gen() uri_c = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id_c) res = dev[1].request("DPP_BOOTSTRAP_INFO %d" % id_c) pkhash = None for line in res.splitlines(): name, value = line.split('=') if name == "pkhash": pkhash = value break if not pkhash: raise Exception("Could not fetch public key hash from Controller") params = {"ssid": "unconfigured", "channel": "6", "dpp_controller": "ipaddr=127.0.0.1 pkhash=" + pkhash} hapd = hostapd.add_ap(apdev[0], params) check_dpp_capab(hapd) server = MyTCPServer(("127.0.0.1", 8908), DPPControllerServer) server.timeout = 30 hapd.set("ext_mgmt_frame_handling", "1") dev[0].dpp_auth_init(uri=uri_c, role="enrollee") msg = hapd.mgmt_rx() if msg is None: raise Exception("MGMT RX wait timed out") dev[0].request("DPP_STOP_LISTEN") frame = msg['frame'] for i in range(20): if i == 14: time.sleep(20) addr = struct.pack('6B', 0x02, 0, 0, 0, 0, i) tmp = frame[0:10] + addr + frame[16:] hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(tmp).decode()) ev = hapd.wait_event(["DPP-FAIL"], timeout=0.1) if ev: raise Exception("DPP relay failed [%d]: %s" % (i + 1, ev)) server.server_close() def test_dpp_tcp(dev, apdev, params): """DPP over TCP""" prefix = "dpp_tcp" cap_lo = os.path.join(params['logdir'], prefix + ".lo.pcap") try: run_dpp_tcp(dev[0], dev[1], cap_lo) finally: dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_tcp_port(dev, apdev, params): """DPP over TCP and specified port""" prefix = "dpp_tcp_port" cap_lo = os.path.join(params['logdir'], prefix + ".lo.pcap") try: run_dpp_tcp(dev[0], dev[1], cap_lo, port="23456") finally: dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_tcp_mutual(dev, apdev, params): """DPP over TCP (mutual)""" cap_lo = os.path.join(params['prefix'], ".lo.pcap") try: run_dpp_tcp(dev[0], dev[1], cap_lo, mutual=True) finally: dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_tcp_mutual_hostapd_conf(dev, apdev, params): """DPP over TCP (mutual, hostapd as Configurator)""" cap_lo = os.path.join(params['prefix'], ".lo.pcap") hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) run_dpp_tcp(dev[0], hapd, cap_lo, mutual=True) def run_dpp_tcp(dev0, dev1, cap_lo, port=None, mutual=False): check_dpp_capab(dev0) check_dpp_capab(dev1) wt = WlantestCapture('lo', cap_lo) time.sleep(1) # Controller conf_id = dev1.dpp_configurator_add() dev1.set("dpp_configurator_params", " conf=sta-dpp configurator=%d" % conf_id) id_c = dev1.dpp_bootstrap_gen() uri_c = dev1.request("DPP_BOOTSTRAP_GET_URI %d" % id_c) res = dev1.request("DPP_BOOTSTRAP_INFO %d" % id_c) pkhash = None for line in res.splitlines(): name, value = line.split('=') if name == "pkhash": pkhash = value break if not pkhash: raise Exception("Could not fetch public key hash from Controller") req = "DPP_CONTROLLER_START" if port: req += " tcp_port=" + port if mutual: req += " qr=mutual" id0 = dev0.dpp_bootstrap_gen() uri0 = dev0.request("DPP_BOOTSTRAP_GET_URI %d" % id0) own = id0 else: own = None if "OK" not in dev1.request(req): raise Exception("Failed to start Controller") # Initiate from Enrollee with broadcast DPP Authentication Request dev0.dpp_auth_init(uri=uri_c, own=own, role="enrollee", tcp_addr="127.0.0.1", tcp_port=port) if mutual: ev = dev0.wait_event(["DPP-RESPONSE-PENDING"], timeout=5) if ev is None: raise Exception("Pending response not reported") ev = dev1.wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5) if ev is None: raise Exception("QR Code scan for mutual authentication not requested") id1 = dev1.dpp_qr_code(uri0) ev = dev0.wait_event(["DPP-AUTH-DIRECTION"], timeout=5) if ev is None: raise Exception("DPP authentication direction not indicated (Initiator)") if "mutual=1" not in ev: raise Exception("Mutual authentication not used") wait_auth_success(dev1, dev0, configurator=dev1, enrollee=dev0, allow_enrollee_failure=True, allow_configurator_failure=True) time.sleep(0.5) wt.close() def test_dpp_tcp_conf_init(dev, apdev, params): """DPP over TCP (Configurator initiates)""" cap_lo = os.path.join(params['prefix'], ".lo.pcap") try: run_dpp_tcp_conf_init(dev[0], dev[1], cap_lo) finally: dev[1].request("DPP_CONTROLLER_STOP") def test_dpp_tcp_conf_init_hostapd_enrollee(dev, apdev, params): """DPP over TCP (Configurator initiates, hostapd as Enrollee)""" cap_lo = os.path.join(params['prefix'], ".lo.pcap") hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) run_dpp_tcp_conf_init(dev[0], hapd, cap_lo, conf="ap-dpp") def run_dpp_tcp_conf_init(dev0, dev1, cap_lo, port=None, conf="sta-dpp"): check_dpp_capab(dev0, min_ver=2) check_dpp_capab(dev1, min_ver=2) wt = WlantestCapture('lo', cap_lo) time.sleep(1) id_c = dev1.dpp_bootstrap_gen() uri_c = dev1.request("DPP_BOOTSTRAP_GET_URI %d" % id_c) res = dev1.request("DPP_BOOTSTRAP_INFO %d" % id_c) req = "DPP_CONTROLLER_START role=enrollee" if port: req += " tcp_port=" + port if "OK" not in dev1.request(req): raise Exception("Failed to start Controller") conf_id = dev0.dpp_configurator_add() dev0.dpp_auth_init(uri=uri_c, role="configurator", conf=conf, configurator=conf_id, tcp_addr="127.0.0.1", tcp_port=port) wait_auth_success(dev1, dev0, configurator=dev0, enrollee=dev1, allow_enrollee_failure=True, allow_configurator_failure=True) time.sleep(0.5) wt.close() def test_dpp_tcp_controller_management_hostapd(dev, apdev, params): """DPP Controller management in hostapd""" hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) conf_id = hapd.dpp_configurator_add() if "OK" not in hapd.request("DPP_CONTROLLER_START"): raise Exception("Failed to start Controller") if "FAIL" not in hapd.request("DPP_CONTROLLER_START"): raise Exception("DPP_CONTROLLER_START succeeded while already running Controller") hapd.request("DPP_CONTROLLER_STOP") hapd.dpp_configurator_remove(conf_id) if "FAIL" not in hapd.request("DPP_CONFIGURATOR_REMOVE %d" % conf_id): raise Exception("Removal of unknown Configurator accepted") def test_dpp_tcp_controller_management_hostapd2(dev, apdev, params): """DPP Controller management in hostapd over interface addition/removal""" check_dpp_capab(dev[0], min_ver=2) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd, min_ver=2) hapd2 = hostapd.add_ap(apdev[1], {"ssid": "unconfigured"}) check_dpp_capab(hapd2, min_ver=2) id_c = hapd.dpp_bootstrap_gen() uri_c = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_c) if "OK" not in hapd.request("DPP_CONTROLLER_START role=enrollee"): raise Exception("Failed to start Controller") conf_id = dev[0].dpp_configurator_add() dev[0].dpp_auth_init(uri=uri_c, role="configurator", conf="sta-dpp", configurator=conf_id, tcp_addr="127.0.0.1") ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5) if ev is None: raise Exception("DPP Authentication did not succeed") ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5) if ev is None: raise Exception("DPP Configuration did not succeed") hapd_global = hostapd.HostapdGlobal(apdev) hapd_global.remove(apdev[0]['ifname']) dev[0].dpp_auth_init(uri=uri_c, role="configurator", conf="sta-dpp", configurator=conf_id, tcp_addr="127.0.0.1") ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5) if ev is not None: raise Exception("Unexpected DPP Authentication success") def test_dpp_tcp_controller_start_failure(dev, apdev, params): """DPP Controller startup failure""" check_dpp_capab(dev[0]) try: if "OK" not in dev[0].request("DPP_CONTROLLER_START"): raise Exception("Could not start Controller") if "OK" in dev[0].request("DPP_CONTROLLER_START"): raise Exception("Second Controller start not rejected") finally: dev[0].request("DPP_CONTROLLER_STOP") tests = ["dpp_controller_start", "eloop_sock_table_add_sock;?eloop_register_sock;dpp_controller_start"] for func in tests: with alloc_fail(dev[0], 1, func): if "FAIL" not in dev[0].request("DPP_CONTROLLER_START"): raise Exception("Failure not reported during OOM") def test_dpp_tcp_init_failure(dev, apdev, params): """DPP TCP init failure""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id_c = dev[1].dpp_bootstrap_gen() uri_c = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id_c) peer = dev[0].dpp_qr_code(uri_c) tests = ["dpp_tcp_init", "eloop_sock_table_add_sock;?eloop_register_sock;dpp_tcp_init", "dpp_tcp_encaps"] cmd = "DPP_AUTH_INIT peer=%d tcp_addr=127.0.0.1" % peer for func in tests: with alloc_fail(dev[0], 1, func): if "FAIL" not in dev[0].request(cmd): raise Exception("DPP_AUTH_INIT accepted during OOM") def test_dpp_controller_rx_failure(dev, apdev, params): """DPP Controller RX failure""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) try: run_dpp_controller_rx_failure(dev, apdev) finally: dev[0].request("DPP_CONTROLLER_STOP") def run_dpp_controller_rx_failure(dev, apdev): if "OK" not in dev[0].request("DPP_CONTROLLER_START"): raise Exception("Could not start Controller") id_c = dev[0].dpp_bootstrap_gen() uri_c = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id_c) peer = dev[1].dpp_qr_code(uri_c) tests = ["dpp_controller_tcp_cb", "eloop_sock_table_add_sock;?eloop_register_sock;dpp_controller_tcp_cb", "dpp_controller_rx", "dpp_controller_rx_auth_req", "wpabuf_alloc;=dpp_tcp_send_msg;dpp_controller_rx_auth_req"] cmd = "DPP_AUTH_INIT peer=%d tcp_addr=127.0.0.1" % peer for func in tests: with alloc_fail(dev[0], 1, func): if "OK" not in dev[1].request(cmd): raise Exception("Failed to initiate TCP connection") wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") def test_dpp_controller_rx_errors(dev, apdev, params): """DPP Controller RX error cases""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) try: run_dpp_controller_rx_errors(dev, apdev) finally: dev[0].request("DPP_CONTROLLER_STOP") def run_dpp_controller_rx_errors(dev, apdev): if "OK" not in dev[0].request("DPP_CONTROLLER_START"): raise Exception("Could not start Controller") addr = ("127.0.0.1", 8908) tests = [b"abc", b"abcd", b"\x00\x00\x00\x00", b"\x00\x00\x00\x01", b"\x00\x00\x00\x01\x09", b"\x00\x00\x00\x07\x09\x50\x6f\x9a\x1a\xff\xff", b"\x00\x00\x00\x07\x09\x50\x6f\x9a\x1a\x01\xff", b"\x00\x00\x00\x07\x09\x50\x6f\x9a\x1a\x01\x00", b"\x00\x00\x00\x08\x09\x50\x6f\x9a\x1a\x01\x00\xff", b"\x00\x00\x00\x01\x0a", b"\x00\x00\x00\x04\x0a\xff\xff\xff", b"\x00\x00\x00\x01\x0b", b"\x00\x00\x00\x08\x0b\xff\xff\xff\xff\xff\xff\xff", b"\x00\x00\x00\x08\x0b\xff\x00\x00\xff\xff\xff\xff", b"\x00\x00\x00\x08\x0b\xff\x00\x00\xff\xff\x6c\x00", b"\x00\x00\x00\x0a\x0b\xff\x00\x00\xff\xff\x6c\x02\xff\xff", b"\x00\x00\x00\x10\x0b\xff\x00\x00\xff\xff\x6c\x08\xff\xdd\x05\x50\x6f\x9a\x1a\x01", b"\x00\x00\x00\x12\x0b\xff\x00\x00\xff\xff\x6c\x08\xff\xdd\x05\x50\x6f\x9a\x1a\x01\x00\x00", b"\x00\x00\x00\x01\xff", b"\x00\x00\x00\x01\xff\xee"] #define WLAN_PA_GAS_INITIAL_REQ 10 #define WLAN_PA_GAS_INITIAL_RESP 11 for t in tests: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM, socket.IPPROTO_TCP) sock.settimeout(0.1) sock.connect(addr) sock.send(t) sock.shutdown(1) try: sock.recv(10) except socket.timeout: pass sock.close() def test_dpp_conn_status_success(dev, apdev): """DPP connection status - success""" try: run_dpp_conn_status(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_conn_status_wrong_passphrase(dev, apdev): """DPP connection status - wrong passphrase""" try: run_dpp_conn_status(dev, apdev, result=2) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_conn_status_no_ap(dev, apdev): """DPP connection status - no AP""" try: run_dpp_conn_status(dev, apdev, result=10) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_conn_status_connector_mismatch(dev, apdev): """DPP connection status - invalid Connector""" try: run_dpp_conn_status(dev, apdev, result=8) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_conn_status_assoc_reject(dev, apdev): """DPP connection status - association rejection""" try: dev[0].request("TEST_ASSOC_IE 30020000") run_dpp_conn_status(dev, apdev, assoc_reject=True) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_conn_status(dev, apdev, result=0, assoc_reject=False): check_dpp_capab(dev[0], min_ver=2) check_dpp_capab(dev[1], min_ver=2) if result != 10: if result == 7 or result == 8: params = {"ssid": "dpp-status", "wpa": "2", "wpa_key_mgmt": "DPP", "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey} else: if result == 2: passphrase = "wrong passphrase" else: passphrase = "secret passphrase" params = hostapd.wpa2_params(ssid="dpp-status", passphrase=passphrase) try: hapd = hostapd.add_ap(apdev[0], params) except: raise HwsimSkip("DPP not supported") dev[0].request("SET sae_groups ") dev[0].set("dpp_config_processing", "2") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) if result == 7 or result == 8: conf = 'sta-dpp' passphrase = None configurator = dev[1].dpp_configurator_add() else: conf = 'sta-psk' passphrase = "secret passphrase" configurator = None dev[1].dpp_auth_init(uri=uri0, conf=conf, ssid="dpp-status", passphrase=passphrase, configurator=configurator, conn_status=True) res = wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0]) if 'wait_conn_status' not in res: raise Exception("Configurator did not request connection status") if assoc_reject and result == 0: result = 2 ev = dev[1].wait_event(["DPP-CONN-STATUS-RESULT"], timeout=20) if ev is None: raise Exception("No connection status reported") if "timeout" in ev: raise Exception("Connection status result timeout") if "result=%d" % result not in ev: raise Exception("Unexpected connection status result: " + ev) if "ssid=dpp-status" not in ev: raise Exception("SSID not reported") if result == 0: dev[0].wait_connected() if result == 10 and "channel_list=" not in ev: raise Exception("Channel list not reported for no-AP") def test_dpp_conn_status_success_hostapd_configurator(dev, apdev): """DPP connection status - success with hostapd as Configurator""" try: run_dpp_conn_status_hostapd_configurator(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_conn_status_hostapd_configurator(dev, apdev): check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "1"}) check_dpp_capab(hapd) conf_id = hapd.dpp_configurator_add() cmd = "DPP_CONFIGURATOR_SIGN conf=ap-dpp configurator=%d" % conf_id res = hapd.request(cmd) if "FAIL" in res: raise Exception("Failed to generate own configuration") update_hapd_config(hapd) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) id1 = hapd.dpp_qr_code(uri0) res = hapd.request("DPP_BOOTSTRAP_INFO %d" % id1) if "FAIL" in res: raise Exception("DPP_BOOTSTRAP_INFO failed") if "type=QRCODE" not in res: raise Exception("DPP_BOOTSTRAP_INFO did not report correct type") if "mac_addr=" + dev[0].own_addr() not in res: raise Exception("DPP_BOOTSTRAP_INFO did not report correct mac_addr") dev[0].set("dpp_config_processing", "2") dev[0].dpp_listen(2412) hapd.dpp_auth_init(peer=id1, configurator=conf_id, conf="sta-dpp", conn_status=True) res = wait_auth_success(dev[0], hapd, configurator=hapd, enrollee=dev[0]) if 'wait_conn_status' not in res: raise Exception("Configurator did not request connection status") ev = hapd.wait_event(["DPP-CONN-STATUS-RESULT"], timeout=20) if ev is None: raise Exception("No connection status reported") if "result=0" not in ev: raise Exception("Unexpected connection status: " + ev) def test_dpp_mud_url(dev, apdev): """DPP MUD URL""" check_dpp_capab(dev[0]) try: dev[0].set("dpp_name", "Test Enrollee") dev[0].set("dpp_mud_url", "https://example.com/mud") run_dpp_qr_code_auth_unicast(dev, apdev, None) finally: dev[0].set("dpp_mud_url", "") dev[0].set("dpp_name", "Test") def test_dpp_mud_url_hostapd(dev, apdev): """DPP MUD URL from hostapd""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) params = {"ssid": "unconfigured", "dpp_name": "AP Enrollee", "dpp_mud_url": "https://example.com/mud"} hapd = hostapd.add_ap(apdev[0], params) check_dpp_capab(hapd) id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) conf_id = dev[0].dpp_configurator_add() dev[0].dpp_auth_init(uri=uri, conf="ap-dpp", configurator=conf_id) wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd) update_hapd_config(hapd) def test_dpp_config_save(dev, apdev, params): """DPP configuration saving""" config = os.path.join(params['logdir'], 'dpp_config_save.conf') run_dpp_config_save(dev, apdev, config, "test", '"test"') def test_dpp_config_save2(dev, apdev, params): """DPP configuration saving (2)""" config = os.path.join(params['logdir'], 'dpp_config_save2.conf') run_dpp_config_save(dev, apdev, config, "\\u0001*", '012a') def test_dpp_config_save3(dev, apdev, params): """DPP configuration saving (3)""" config = os.path.join(params['logdir'], 'dpp_config_save3.conf') run_dpp_config_save(dev, apdev, config, "\\u0001*\\u00c2\\u00bc\\u00c3\\u009e\\u00c3\\u00bf", '012ac2bcc39ec3bf') def run_dpp_config_save(dev, apdev, config, conf_ssid, exp_ssid): check_dpp_capab(dev[1]) with open(config, "w") as f: f.write("update_config=1\n" + "dpp_config_processing=1\n") wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", config=config) check_dpp_capab(wpas) conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"' + conf_ssid + '"},"cred":{"akm":"psk","pass":"secret passphrase"}}' dev[1].set("dpp_config_obj_override", conf) dpp_dev = [wpas, dev[1]] run_dpp_qr_code_auth_unicast(dpp_dev, apdev, "prime256v1", require_conf_success=True) if "OK" not in wpas.request("SAVE_CONFIG"): raise Exception("Failed to save configuration file") with open(config, "r") as f: data = f.read() logger.info("Saved configuration:\n" + data) if 'ssid=' + exp_ssid + '\n' not in data: raise Exception("SSID not saved") if 'psk="secret passphrase"' not in data: raise Exception("Passphtase not saved") def test_dpp_nfc_uri(dev, apdev): """DPP bootstrapping via NFC URI record""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id = dev[0].dpp_bootstrap_gen(type="nfc-uri", chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) logger.info("Generated URI: " + uri) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id) logger.info("Bootstrapping info:\n" + info) if "type=NFC-URI" not in info: raise Exception("Unexpected bootstrapping info contents") dev[0].dpp_listen(2412) conf_id = dev[1].dpp_configurator_add() dev[1].dpp_auth_init(nfc_uri=uri, configurator=conf_id, conf="sta-dpp") wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0]) def test_dpp_nfc_uri_hostapd(dev, apdev): """DPP bootstrapping via NFC URI record (hostapd)""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) id = hapd.dpp_bootstrap_gen(type="nfc-uri", chan="81/1", mac=True) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id) logger.info("Generated URI: " + uri) info = hapd.request("DPP_BOOTSTRAP_INFO %d" % id) logger.info("Bootstrapping info:\n" + info) if "type=NFC-URI" not in info: raise Exception("Unexpected bootstrapping info contents") hapd.dpp_listen(2412) conf_id = dev[0].dpp_configurator_add() dev[0].dpp_auth_init(nfc_uri=uri, configurator=conf_id, conf="ap-dpp") wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd) def test_dpp_nfc_uri_hostapd_tag_read(dev, apdev): """DPP bootstrapping via NFC URI record (hostapd reading tag)""" check_dpp_capab(dev[0]) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd) id = dev[0].dpp_bootstrap_gen(type="nfc-uri", chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) info = dev[0].request("DPP_BOOTSTRAP_INFO %d" % id) conf_id = dev[0].dpp_configurator_add() dev[0].set("dpp_configurator_params", "conf=ap-dpp configurator=%d" % conf_id) dev[0].dpp_listen(2412) hapd.dpp_auth_init(nfc_uri=uri, role="enrollee") wait_auth_success(dev[0], hapd, configurator=dev[0], enrollee=hapd) def test_dpp_nfc_negotiated_handover(dev, apdev): """DPP bootstrapping via NFC negotiated handover""" run_dpp_nfc_negotiated_handover(dev) def test_dpp_nfc_negotiated_handover_diff_curve(dev, apdev): """DPP bootstrapping via NFC negotiated handover (different curve)""" run_dpp_nfc_negotiated_handover(dev, curve0="prime256v1", curve1="secp384r1") def test_dpp_nfc_negotiated_handover_hostapd_sel(dev, apdev): """DPP bootstrapping via NFC negotiated handover (hostapd as selector)""" hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) run_dpp_nfc_negotiated_handover([dev[0], hapd], conf="ap-dpp") def test_dpp_nfc_negotiated_handover_hostapd_req(dev, apdev): """DPP bootstrapping via NFC negotiated handover (hostapd as requestor)""" hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) run_dpp_nfc_negotiated_handover([hapd, dev[0]]) def run_dpp_nfc_negotiated_handover(dev, curve0=None, curve1=None, conf="sta-dpp"): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(type="nfc-uri", chan="81/6,11", mac=True, curve=curve0) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) logger.info("Generated URI[0]: " + uri0) id1 = dev[1].dpp_bootstrap_gen(type="nfc-uri", chan="81/1,6,11", mac=True, curve=curve1) uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) logger.info("Generated URI[1]: " + uri1) # dev[0] acting as NFC Handover Requestor # dev[1] acting as NFC Handover Selector res = dev[1].request("DPP_NFC_HANDOVER_REQ own=%d uri=%s" % (id1, uri0)) if "FAIL" in res: raise Exception("Failed to process NFC Handover Request") info = dev[1].request("DPP_BOOTSTRAP_INFO %d" % id1) logger.info("Updated local bootstrapping info:\n" + info) freq = None for line in info.splitlines(): if line.startswith("use_freq="): freq = int(line.split('=')[1]) if freq is None: raise Exception("Selected channel not indicated") uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1) logger.info("Updated URI[1]: " + uri1) dev[1].dpp_listen(freq) res = dev[0].request("DPP_NFC_HANDOVER_SEL own=%d uri=%s" % (id0, uri1)) if "FAIL" in res: raise Exception("Failed to process NFC Handover Select") peer = int(res) conf_id = dev[0].dpp_configurator_add() dev[0].dpp_auth_init(peer=peer, own=id0, configurator=conf_id, conf=conf) wait_auth_success(dev[1], dev[0], configurator=dev[0], enrollee=dev[1]) def test_dpp_nfc_errors_hostapd(dev, apdev): """DPP NFC operation failures in hostapd""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(type="nfc-uri", chan="81/11", mac=True, curve="secp384r1") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "channel": "6"}) check_dpp_capab(hapd) id_h = hapd.dpp_bootstrap_gen(type="nfc-uri", chan="81/6", mac=True) uri_h = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) tests = ["", "own=123456789", "own=%d" % id_h, "own=%d uri=%s" % (id_h, "foo")] for t in tests: if "FAIL" not in hapd.request("DPP_NFC_HANDOVER_REQ " + t): raise Exception("Invalid DPP_NFC_HANDOVER_REQ accepted") if "FAIL" not in hapd.request("DPP_NFC_HANDOVER_SEL " + t): raise Exception("Invalid DPP_NFC_HANDOVER_SEL accepted") # DPP: Peer (NFC Handover Selector) used different curve if "FAIL" not in hapd.request("DPP_NFC_HANDOVER_SEL own=%d uri=%s" % (id_h, uri0)): raise Exception("Invalid DPP_NFC_HANDOVER_SEL accepted") # DPP: No common channel found if "FAIL" not in hapd.request("DPP_NFC_HANDOVER_REQ own=%d uri=%s" % (id_h, uri0)): raise Exception("DPP_NFC_HANDOVER_REQ with local error accepted") def test_dpp_with_p2p_device(dev, apdev): """DPP exchange when driver uses a separate P2P Device interface""" check_dpp_capab(dev[0]) with HWSimRadio(use_p2p_device=True) as (radio, iface): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add(iface) check_dpp_capab(wpas) id1 = wpas.dpp_bootstrap_gen(chan="81/1", mac=True) uri1 = wpas.request("DPP_BOOTSTRAP_GET_URI %d" % id1) wpas.dpp_listen(2412) time.sleep(7) dev[0].dpp_auth_init(uri=uri1) wait_auth_success(wpas, dev[0], configurator=dev[0], enrollee=wpas, allow_enrollee_failure=True) @long_duration_test def test_dpp_chirp(dev, apdev): """DPP chirp""" check_dpp_capab(dev[0]) dev[0].flush_scan_cache() params = {"ssid": "dpp", "channel": "11"} hapd = hostapd.add_ap(apdev[0], params) check_dpp_capab(hapd) dpp_cc = False id1 = dev[0].dpp_bootstrap_gen(chan="81/1") if "OK" not in dev[0].request("DPP_CHIRP own=%d iter=5" % id1): raise Exception("DPP_CHIRP failed") chan1 = 0 chan6 = 0 chan11 = 0 for i in range(30): ev = dev[0].wait_event(["DPP-CHIRP-STOPPED", "DPP-TX "], timeout=60) if ev is None: raise Exception("DPP chirp stop not reported") if "DPP-CHIRP-STOPPED" in ev: break if "type=13" not in ev: continue freq = int(ev.split(' ')[2].split('=')[1]) if freq == 2412: chan1 += 1 elif freq == 2437: chan6 += 1 elif freq == 2462: chan11 += 1 if not dpp_cc: hapd.set("dpp_configurator_connectivity", "1") if "OK" not in hapd.request("UPDATE_BEACON"): raise Exception("UPDATE_BEACON failed") dpp_cc = True if chan1 != 5 or chan6 != 5 or chan11 != 1: raise Exception("Unexpected number of presence announcements sent: %d %d %d" % (chan1, chan6, chan11)) ev = hapd.wait_event(["DPP-CHIRP-RX"], timeout=1) if ev is None: raise Exception("No chirp received on the AP") if "freq=2462" not in ev: raise Exception("Chirp reception reported on unexpected channel: " + ev) if "src=" + dev[0].own_addr() not in ev: raise Exception("Unexpected chirp source reported: " + ev) @long_duration_test def test_dpp_chirp_listen(dev, apdev): """DPP chirp with listen""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id1 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) if "OK" not in dev[0].request("DPP_CHIRP own=%d iter=2 listen=2412" % id1): raise Exception("DPP_CHIRP failed") for i in range(30): ev = dev[0].wait_event(["DPP-CHIRP-STOPPED", "DPP-TX "], timeout=60) if ev is None: raise Exception("DPP chirp stop not reported") if "DPP-CHIRP-STOPPED" in ev: break def test_dpp_chirp_configurator(dev, apdev): """DPP chirp with a standalone Configurator""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id1 = dev[0].dpp_bootstrap_gen(chan="81/1") uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) conf_id = dev[1].dpp_configurator_add() idc = dev[1].dpp_qr_code(uri) dev[1].dpp_bootstrap_set(idc, conf="sta-dpp", configurator=conf_id) dev[1].dpp_listen(2437) if "OK" not in dev[0].request("DPP_CHIRP own=%d iter=2" % id1): raise Exception("DPP_CHIRP failed") ev = dev[1].wait_event(["DPP-RX"], timeout=10) if ev is None: raise Exception("Presence Announcement not seen") if "type=13" not in ev: raise Exception("Unexpected DPP frame received: " + ev) ev = dev[1].wait_event(["DPP-TX"], timeout=10) if ev is None: raise Exception("Authentication Request TX not seen") if "type=0" not in ev: raise Exception("Unexpected DPP frame TX: " + ev) if "dst=" + dev[0].own_addr() not in ev: raise Exception("Unexpected Authentication Request destination: " + ev) wait_auth_success(dev[0], dev[1], dev[1], dev[0]) def test_dpp_chirp_ap_as_configurator(dev, apdev): """DPP chirp with an AP as a standalone Configurator""" check_dpp_capab(dev[0], min_ver=2) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd, min_ver=2) id1 = dev[0].dpp_bootstrap_gen(chan="81/1") uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) conf_id = hapd.dpp_configurator_add() idc = hapd.dpp_qr_code(uri) hapd.dpp_bootstrap_set(idc, conf="sta-dpp", configurator=conf_id) hapd.dpp_listen(2412) if "OK" not in dev[0].request("DPP_CHIRP own=%d iter=2" % id1): raise Exception("DPP_CHIRP failed") wait_auth_success(dev[0], hapd, hapd, dev[0]) def test_dpp_chirp_configurator_inits(dev, apdev): """DPP chirp with a standalone Configurator initiating""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id1 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id1) conf_id = dev[1].dpp_configurator_add() idc = dev[1].dpp_qr_code(uri) if "OK" not in dev[0].request("DPP_CHIRP own=%d iter=2 listen=2412" % id1): raise Exception("DPP_CHIRP failed") for i in range(2): ev = dev[0].wait_event(["DPP-TX "], timeout=10) if ev is None or "type=13" not in ev: raise Exception("Presence Announcement not sent") dev[1].dpp_auth_init(uri=uri, conf="sta-dpp", configurator=conf_id) wait_auth_success(dev[0], dev[1], dev[1], dev[0]) def test_dpp_chirp_ap(dev, apdev): """DPP chirp by an AP""" check_dpp_capab(dev[0], min_ver=2) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "start_disabled": "1"}) check_dpp_capab(hapd, min_ver=2) id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) conf_id = dev[0].dpp_configurator_add() idc = dev[0].dpp_qr_code(uri) dev[0].dpp_bootstrap_set(idc, conf="ap-dpp", configurator=conf_id) dev[0].dpp_listen(2437) if "OK" not in hapd.request("DPP_CHIRP own=%d iter=5" % id_h): raise Exception("DPP_CHIRP failed") wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, timeout=20) update_hapd_config(hapd) @long_duration_test def test_dpp_chirp_ap_5g(dev, apdev): """DPP chirp by an AP on 5 GHz""" check_dpp_capab(dev[0], min_ver=2) try: hapd = None hapd2 = None params = {"ssid": "unconfigured", "country_code": "US", "hw_mode": "a", "channel": "40", "dpp_configurator_connectivity": "1"} hapd2 = hostapd.add_ap(apdev[1], params) check_dpp_capab(hapd2, min_ver=2) params = {"ssid": "unconfigured", "country_code": "US", "hw_mode": "a", "channel": "36", "start_disabled": "1"} hapd = hostapd.add_ap(apdev[0], params) check_dpp_capab(hapd, min_ver=2) id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) # First, check chirping iteration and timeout if "OK" not in hapd.request("DPP_CHIRP own=%d iter=2" % id_h): raise Exception("DPP_CHIRP failed") chan1 = 0 chan6 = 0 chan40 = 0 chan149 = 0 for i in range(30): ev = hapd.wait_event(["DPP-CHIRP-STOPPED", "DPP-TX "], timeout=60) if ev is None: raise Exception("DPP chirp stop not reported") if "DPP-CHIRP-STOPPED" in ev: break if "type=13" not in ev: continue freq = int(ev.split(' ')[2].split('=')[1]) if freq == 2412: chan1 += 1 elif freq == 2437: chan6 += 1 elif freq == 5200: chan40 += 1 elif freq == 5745: chan149 += 1 if not chan1 or not chan6 or not chan40 or not chan149: raise Exception("Chirp not sent on all channels") # Then, check successful chirping conf_id = dev[0].dpp_configurator_add() idc = dev[0].dpp_qr_code(uri) dev[0].dpp_bootstrap_set(idc, conf="ap-dpp", configurator=conf_id) dev[0].dpp_listen(5200) # Workaround for some strange issues in the Authentication Request frame # not getting transmitted. An extra wait of one second here seems to # avoid that?! time.sleep(1) if "OK" not in hapd.request("DPP_CHIRP own=%d iter=5" % id_h): raise Exception("DPP_CHIRP failed") wait_auth_success(hapd, dev[0], configurator=dev[0], enrollee=hapd, timeout=20) update_hapd_config(hapd) finally: clear_regdom(hapd, dev) clear_scan_cache(apdev[0]) def test_dpp_chirp_ap_errors(dev, apdev): """DPP chirp errors in hostapd""" hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured", "start_disabled": "1"}) check_dpp_capab(hapd, min_ver=2) id_h = hapd.dpp_bootstrap_gen(chan="81/1", mac=True) uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) tests = ["", "own=%d" % (id_h + 1), "own=%d iter=-1" % id_h, "own=%d listen=0" % id_h] for t in tests: if "FAIL" not in hapd.request("DPP_CHIRP " + t): raise Exception("Invalid DPP_CHIRP accepted: " + t) if "OK" not in hapd.request("DPP_CHIRP own=%d iter=5" % id_h): raise Exception("DPP_CHIRP failed") hapd.request("DPP_STOP_CHIRP") def start_dpp_pfs_ap(apdev, pfs, sae=False): params = {"ssid": "dpp", "wpa": "2", "wpa_key_mgmt": "DPP", "dpp_pfs": str(pfs), "ieee80211w": "2", "rsn_pairwise": "CCMP", "dpp_connector": params1_ap_connector, "dpp_csign": params1_csign, "dpp_netaccesskey": params1_ap_netaccesskey} if sae: params["wpa_key_mgmt"] = "DPP SAE" params["sae_password"] = "sae-password" try: hapd = hostapd.add_ap(apdev, params) except: raise HwsimSkip("DPP not supported") return hapd def run_dpp_pfs_sta(dev, pfs, fail=False, pfs_expected=None, sae=False): key_mgmt = "DPP SAE" if sae else "DPP" psk = "sae-password" if sae else None dev.connect("dpp", key_mgmt=key_mgmt, scan_freq="2412", ieee80211w="2", dpp_pfs=str(pfs), dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey, psk=psk, wait_connect=not fail) if fail: for i in range(2): ev = dev.wait_event(["CTRL-EVENT-ASSOC-REJECT", "CTRL-EVENT-CONNECTED"], timeout=10) if ev is None: raise Exception("Connection result not reported") if "CTRL-EVENT-CONNECTED" in ev: raise Exception("Unexpected connection") dev.request("REMOVE_NETWORK all") else: if pfs_expected is not None: res = dev.get_status_field("dpp_pfs") pfs_used = res == "1" if pfs_expected != pfs_used: raise Exception("Unexpected PFS negotiation result") dev.request("REMOVE_NETWORK all") dev.wait_disconnected() dev.dump_monitor() def test_dpp_pfs_ap_0(dev, apdev): """DPP PFS AP default""" check_dpp_capab(dev[0]) hapd = start_dpp_pfs_ap(apdev[0], 0) run_dpp_pfs_sta(dev[0], 0, pfs_expected=True) run_dpp_pfs_sta(dev[0], 1, pfs_expected=True) run_dpp_pfs_sta(dev[0], 2, pfs_expected=False) def test_dpp_pfs_ap_1(dev, apdev): """DPP PFS AP required""" check_dpp_capab(dev[0]) hapd = start_dpp_pfs_ap(apdev[0], 1) run_dpp_pfs_sta(dev[0], 0, pfs_expected=True) run_dpp_pfs_sta(dev[0], 1, pfs_expected=True) run_dpp_pfs_sta(dev[0], 2, fail=True) def test_dpp_pfs_ap_2(dev, apdev): """DPP PFS AP not allowed""" check_dpp_capab(dev[0]) hapd = start_dpp_pfs_ap(apdev[0], 2) run_dpp_pfs_sta(dev[0], 0, pfs_expected=False) run_dpp_pfs_sta(dev[0], 1, fail=True) run_dpp_pfs_sta(dev[0], 2, pfs_expected=False) def test_dpp_pfs_connect_cmd(dev, apdev): """DPP PFS and cfg80211 connect command""" wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") check_dpp_capab(wpas) hapd = start_dpp_pfs_ap(apdev[0], 0) run_dpp_pfs_sta(wpas, 0, pfs_expected=True) run_dpp_pfs_sta(wpas, 1, pfs_expected=True) run_dpp_pfs_sta(wpas, 2, pfs_expected=False) def test_dpp_pfs_connect_cmd_ap_2(dev, apdev): """DPP PFS and cfg80211 connect command (PFS not allowed by AP)""" wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") check_dpp_capab(wpas) hapd = start_dpp_pfs_ap(apdev[0], 2) run_dpp_pfs_sta(wpas, 0, pfs_expected=False) run_dpp_pfs_sta(wpas, 1, fail=True) run_dpp_pfs_sta(wpas, 2, pfs_expected=False) def test_dpp_pfs_connect_cmd_ap_2_sae(dev, apdev): """DPP PFS and cfg80211 connect command (PFS not allowed by AP; SAE enabled)""" wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") check_dpp_capab(wpas) check_sae_capab(wpas) hapd = start_dpp_pfs_ap(apdev[0], 2, sae=True) run_dpp_pfs_sta(wpas, 0, pfs_expected=False, sae=True) run_dpp_pfs_sta(wpas, 1, fail=True, sae=True) run_dpp_pfs_sta(wpas, 2, pfs_expected=False, sae=True) def test_dpp_pfs_ap_0_sta_ver1(dev, apdev): """DPP PFS AP default with version 1 STA""" check_dpp_capab(dev[0]) dev[0].set("dpp_version_override", "1") hapd = start_dpp_pfs_ap(apdev[0], 0) run_dpp_pfs_sta(dev[0], 0, pfs_expected=False) def test_dpp_pfs_errors(dev, apdev): """DPP PFS error cases""" check_dpp_capab(dev[0], min_ver=2) hapd = start_dpp_pfs_ap(apdev[0], 1) tests = [(1, "dpp_pfs_init"), (1, "crypto_ecdh_init;dpp_pfs_init"), (1, "wpabuf_alloc;dpp_pfs_init")] for count, func in tests: with alloc_fail(dev[0], count, func): dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2", dpp_pfs="1", dpp_csign=params1_csign, dpp_connector=params1_sta_connector, dpp_netaccesskey=params1_sta_netaccesskey) dev[0].request("REMOVE_NETWORK all") dev[0].wait_disconnected() dev[0].dump_monitor() hapd.dump_monitor() def test_dpp_reconfig_connector(dev, apdev): """DPP reconfiguration connector""" try: run_dpp_reconfig_connector(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def test_dpp_reconfig_connector_different_groups(dev, apdev): """DPP reconfiguration connector with different groups""" try: run_dpp_reconfig_connector(dev, apdev, conf_curve="secp384r1") finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) @long_duration_test def test_dpp_reconfig_retries(dev, apdev): """DPP reconfiguration retries""" try: run_dpp_reconfig_connector(dev, apdev, test_retries=True) for i in range(4): ev = dev[0].wait_event(["DPP-TX "], timeout=120) if ev is None or "type=14" not in ev: raise Exception("Reconfig Announcement not sent") dev[0].request("DPP_STOP_LISTEN") finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_reconfig_connector(dev, apdev, conf_curve=None, test_retries=False): check_dpp_capab(dev[0], min_ver=2) check_dpp_capab(dev[1], min_ver=2) ssid = "reconfig" passphrase = "secret passphrase" passphrase2 = "another secret passphrase" params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase) hapd = hostapd.add_ap(apdev[0], params) dev[0].set("dpp_config_processing", "2") id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) configurator = dev[1].dpp_configurator_add(curve=conf_curve) conf = 'sta-psk' dev[1].dpp_auth_init(uri=uri0, conf=conf, ssid=ssid, passphrase=passphrase, configurator=configurator, conn_status=True) res = wait_auth_success(dev[0], dev[1], configurator=dev[1], enrollee=dev[0]) if 'wait_conn_status' not in res: raise Exception("Configurator did not request connection status") ev = dev[1].wait_event(["DPP-CONN-STATUS-RESULT"], timeout=20) if ev is None: raise Exception("No connection status reported") dev[1].dump_monitor() ev = dev[0].wait_event(["DPP-CONFOBJ-SSID"], timeout=1) if ev is None: raise Exception("SSID not reported") res_ssid = ev.split(' ')[1] if res_ssid != ssid: raise Exception("Unexpected SSID value") ev = dev[0].wait_event(["DPP-CONNECTOR"], timeout=1) if ev is None: raise Exception("Connector not reported") connector = ev.split(' ')[1] ev = dev[0].wait_event(["DPP-C-SIGN-KEY"], timeout=1) if ev is None: raise Exception("C-sign-key not reported") p = ev.split(' ') csign = p[1] ev = dev[0].wait_event(["DPP-NET-ACCESS-KEY"], timeout=1) if ev is None: raise Exception("netAccessKey not reported") p = ev.split(' ') net_access_key = p[1] net_access_key_expiry = p[2] if len(p) > 2 else None ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") id = ev.split(' ')[1] dev[0].wait_connected() n_key_mgmt = dev[0].get_network(id, "key_mgmt") if n_key_mgmt != "WPA-PSK FT-PSK WPA-PSK-SHA256": raise Exception("Unexpected key_mgmt: " + n_key_mgmt) n_connector = dev[0].get_network(id, "dpp_connector") if n_connector.strip('"') != connector: raise Exception("Connector mismatch: %s %s" % (n_connector, connector)) n_csign = dev[0].get_network(id, "dpp_csign") if n_csign.strip('"') != csign: raise Exception("csign mismatch: %s %s" % (n_csign, csign)) n_net_access_key = dev[0].get_network(id, "dpp_netaccesskey") if n_net_access_key.strip('"') != net_access_key: raise Exception("net_access_key mismatch: %s %s" % (n_net_access_key, net_access_key)) dev[0].request("DISCONNECT") dev[0].wait_disconnected() hapd.disable() hapd.set("wpa_passphrase", passphrase2) hapd.enable() time.sleep(0.1) dev[0].dump_monitor() dev[1].dump_monitor() if test_retries: dev[1].request("DPP_STOP_LISTEN") if "OK" not in dev[0].request("DPP_RECONFIG %s iter=10" % id): raise Exception("Failed to start reconfiguration") return dev[1].set("dpp_configurator_params", "conf=sta-psk ssid=%s pass=%s conn_status=1" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(passphrase2.encode()).decode())) dev[1].dpp_listen(2437) if "OK" not in dev[0].request("DPP_RECONFIG %s" % id): raise Exception("Failed to start reconfiguration") ev = dev[0].wait_event(["DPP-TX "], timeout=10) if ev is None or "type=14" not in ev: raise Exception("Reconfig Announcement not sent") ev = dev[1].wait_event(["DPP-RX"], timeout=5) if ev is None: raise Exception("DPP Reconfig Announcement not received") if "freq=2437 type=14" not in ev: raise Exception("Unexpected RX data for Reconfig Announcement: " + ev) ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None or "freq=2437 type=15" not in ev: raise Exception("DPP Reconfig Authentication Request not received") ev = dev[1].wait_event(["DPP-RX"], timeout=5) if ev is None or "freq=2437 type=16" not in ev: raise Exception("DPP Reconfig Authentication Response not received") ev = dev[0].wait_event(["DPP-RX"], timeout=5) if ev is None or "freq=2437 type=17" not in ev: raise Exception("DPP Reconfig Authentication Confirm not received") ev = dev[0].wait_event(["GAS-QUERY-START"], timeout=5) if ev is None or "freq=2437" not in ev: raise Exception("DPP Config Request (GAS) not transmitted") ev = dev[1].wait_event(["DPP-CONF-REQ-RX"], timeout=5) if ev is None: raise Exception("DPP Config Request (GAS) not received") ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=5) if ev is None or "freq=2437" not in ev: raise Exception("DPP Config Response (GAS) not received") ev = dev[1].wait_event(["DPP-RX"], timeout=5) if ev is None or "freq=2437 type=11" not in ev: raise Exception("DPP Config Result not received") ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5) if ev is None: raise Exception("DPP Config Response (GAS) not transmitted") ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5) if ev is None: raise Exception("DPP config response reception result not indicated") if "DPP-CONF-RECEIVED" not in ev: raise Exception("Reconfiguration failed") dev[0].wait_connected() ev = dev[1].wait_event(["DPP-CONN-STATUS-RESULT"], timeout=20) if ev is None: raise Exception("No connection status reported") def test_dpp_reconfig_hostapd_configurator(dev, apdev): """DPP reconfiguration with hostapd as configurator""" try: run_dpp_reconfig_hostapd_configurator(dev, apdev) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_reconfig_hostapd_configurator(dev, apdev): ssid = "reconfig-ap" check_dpp_capab(dev[0], min_ver=2) hapd = hostapd.add_ap(apdev[0], {"ssid": "unconfigured"}) check_dpp_capab(hapd, min_ver=2) conf_id = hapd.dpp_configurator_add() cmd = "DPP_CONFIGURATOR_SIGN conf=ap-dpp configurator=%d ssid=%s" % (conf_id, binascii.hexlify(ssid.encode()).decode()) res = hapd.request(cmd) if "FAIL" in res: raise Exception("Failed to generate own configuration") hapd.set("dpp_configurator_connectivity", "1") update_hapd_config(hapd) id = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id) dev[0].set("dpp_config_processing", "2") dev[0].dpp_listen(2412) hapd.dpp_auth_init(uri=uri, conf="sta-dpp", configurator=conf_id, extra="expiry=%d" % (time.time() + 10), ssid=ssid) wait_auth_success(dev[0], hapd, configurator=hapd, enrollee=dev[0]) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network id not reported") network = int(ev.split(' ')[1]) dev[0].wait_connected() dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].dump_monitor() time.sleep(10) if "FAIL" in dev[0].request("PMKSA_FLUSH"): raise Exception("PMKSA_FLUSH failed") dev[0].request("RECONNECT") ev = dev[0].wait_event(["DPP-MISSING-CONNECTOR", "CTRL-EVENT-CONNECTED"], timeout=15) if ev is None or "DPP-MISSING-CONNECTOR" not in ev: raise Exception("Missing Connector not reported") if "netAccessKey expired" not in ev: raise Exception("netAccessKey expiry not indicated") dev[0].request("DISCONNECT") dev[0].dump_monitor() hapd.set("dpp_configurator_params", "conf=sta-dpp configurator=%d ssid=%s" % (conf_id, binascii.hexlify(ssid.encode()).decode())) if "OK" not in dev[0].request("DPP_RECONFIG %s" % network): raise Exception("Failed to start reconfiguration") ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=15) if ev is None: raise Exception("DPP network id not reported for reconfiguration") network2 = int(ev.split(' ')[1]) if network == network2: raise Exception("Network ID did not change") dev[0].wait_connected() def test_dpp_qr_code_auth_rand_mac_addr(dev, apdev): """DPP QR Code and authentication exchange (rand_mac_addr=1)""" flags = int(dev[0].get_driver_status_field('capa.flags'), 16) if flags & 0x0000400000000000 == 0: raise HwsimSkip("Driver does not support random GAS TA") try: dev[0].set("gas_rand_mac_addr", "1") run_dpp_qr_code_auth_unicast(dev, apdev, None) finally: dev[0].set("gas_rand_mac_addr", "0") def dpp_sign_cert(cacert, cakey, csr_der): csr = OpenSSL.crypto.load_certificate_request(OpenSSL.crypto.FILETYPE_ASN1, csr_der) cert = OpenSSL.crypto.X509() cert.set_serial_number(12345) cert.gmtime_adj_notBefore(-10) cert.gmtime_adj_notAfter(100000) cert.set_pubkey(csr.get_pubkey()) dn = csr.get_subject() cert.set_subject(dn) cert.set_version(2) cert.add_extensions([ OpenSSL.crypto.X509Extension(b"basicConstraints", True, b"CA:FALSE"), OpenSSL.crypto.X509Extension(b"subjectKeyIdentifier", False, b"hash", subject=cert), OpenSSL.crypto.X509Extension(b"authorityKeyIdentifier", False, b"keyid:always", issuer=cacert), ]) cert.set_issuer(cacert.get_subject()) cert.sign(cakey, "sha256") return cert def test_dpp_enterprise(dev, apdev, params): """DPP and enterprise EAP-TLS provisioning""" check_dpp_capab(dev[0], min_ver=2) try: dev[0].set("dpp_config_processing", "2") run_dpp_enterprise(dev, apdev, params) finally: dev[0].set("dpp_config_processing", "0", allow_fail=True) def run_dpp_enterprise(dev, apdev, params): if not openssl_imported: raise HwsimSkip("OpenSSL python method not available") check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) cert_file = params['prefix'] + ".cert.pem" pkcs7_file = params['prefix'] + ".pkcs7.der" params = {"ssid": "dpp-ent", "wpa": "2", "wpa_key_mgmt": "WPA-EAP", "rsn_pairwise": "CCMP", "ieee8021x": "1", "eap_server": "1", "eap_user_file": "auth_serv/eap_user.conf", "ca_cert": "auth_serv/ec-ca.pem", "server_cert": "auth_serv/ec-server.pem", "private_key": "auth_serv/ec-server.key"} hapd = hostapd.add_ap(apdev[0], params) with open("auth_serv/ec-ca.pem", "rb") as f: res = f.read() cacert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM, res) with open("auth_serv/ec-ca.key", "rb") as f: res = f.read() cakey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM, res) conf_id = dev[1].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) csrattrs = "MAsGCSqGSIb3DQEJBw==" id1 = dev[1].dpp_auth_init(uri=uri0, configurator=conf_id, conf="sta-dot1x", csrattrs=csrattrs, ssid="dpp-ent") ev = dev[1].wait_event(["DPP-CSR"], timeout=10) if ev is None: raise Exception("Configurator did not receive CSR") id1_csr = int(ev.split(' ')[1].split('=')[1]) if id1 != id1_csr: raise Exception("Peer bootstrapping ID mismatch in CSR event") csr = ev.split(' ')[2] if not csr.startswith("csr="): raise Exception("Could not parse CSR event: " + ev) csr = csr[4:] csr = base64.b64decode(csr.encode()) logger.info("CSR: " + binascii.hexlify(csr).decode()) cert = dpp_sign_cert(cacert, cakey, csr) with open(cert_file, 'wb') as f: f.write(OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_PEM, cert)) subprocess.check_call(['openssl', 'crl2pkcs7', '-nocrl', '-certfile', cert_file, '-certfile', 'auth_serv/ec-ca.pem', '-outform', 'DER', '-out', pkcs7_file]) #caCert = base64.b64encode(b"TODO").decode() #res = dev[1].request("DPP_CA_SET peer=%d name=caCert value=%s" % (id1, caCert)) #if "OK" not in res: # raise Exception("Failed to set caCert") name = "server.w1.fi" res = dev[1].request("DPP_CA_SET peer=%d name=trustedEapServerName value=%s" % (id1, name)) if "OK" not in res: raise Exception("Failed to set trustedEapServerName") with open(pkcs7_file, 'rb') as f: pkcs7_der = f.read() certbag = base64.b64encode(pkcs7_der).decode() res = dev[1].request("DPP_CA_SET peer=%d name=certBag value=%s" % (id1, certbag)) if "OK" not in res: raise Exception("Failed to set certBag") ev = dev[1].wait_event(["DPP-CONF-SENT", "DPP-CONF-FAILED"], timeout=5) if ev is None: raise Exception("DPP configuration not completed (Configurator)") if "DPP-CONF-FAILED" in ev: raise Exception("DPP configuration did not succeed (Configurator)") ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=1) if ev is None: raise Exception("DPP configuration not completed (Enrollee)") if "DPP-CONF-FAILED" in ev: raise Exception("DPP configuration did not succeed (Enrollee)") ev = dev[0].wait_event(["DPP-CERTBAG"], timeout=1) if ev is None: raise Exception("DPP-CERTBAG not reported") certbag = base64.b64decode(ev.split(' ')[1].encode()) if certbag != pkcs7_der: raise Exception("DPP-CERTBAG mismatch") #ev = dev[0].wait_event(["DPP-CACERT"], timeout=1) #if ev is None: # raise Exception("DPP-CACERT not reported") ev = dev[0].wait_event(["DPP-SERVER-NAME"], timeout=1) if ev is None: raise Exception("DPP-SERVER-NAME not reported") if ev.split(' ')[1] != name: raise Exception("DPP-SERVER-NAME mismatch: " + ev) ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1) if ev is None: raise Exception("DPP network profile not generated") id = ev.split(' ')[1] dev[0].wait_connected() def test_dpp_enterprise_reject(dev, apdev, params): """DPP and enterprise EAP-TLS provisioning and CSR getting rejected""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) conf_id = dev[1].dpp_configurator_add() id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) csrattrs = "MAsGCSqGSIb3DQEJBw==" id1 = dev[1].dpp_auth_init(uri=uri0, configurator=conf_id, conf="sta-dot1x", csrattrs=csrattrs, ssid="dpp-ent") ev = dev[1].wait_event(["DPP-CSR"], timeout=10) if ev is None: raise Exception("Configurator did not receive CSR") res = dev[1].request("DPP_CA_SET peer=%d name=status value=5" % id1) if "OK" not in res: raise Exception("Failed to set status") ev = dev[1].wait_event(["DPP-CONF-SENT", "DPP-CONF-FAILED"], timeout=5) if ev is None: raise Exception("DPP configuration not completed (Configurator)") if "DPP-CONF-FAILED" in ev: raise Exception("DPP configuration did not succeed (Configurator)") ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=1) if ev is None: raise Exception("DPP configuration not completed (Enrollee)") if "DPP-CONF-FAILED" not in ev: raise Exception("DPP configuration did not fail (Enrollee)") def test_dpp_enterprise_tcp(dev, apdev, params): """DPP over TCP for enterprise provisioning""" if not openssl_imported: raise HwsimSkip("OpenSSL python method not available") try: run_dpp_enterprise_tcp(dev, apdev, params) finally: dev[1].request("DPP_CONTROLLER_STOP") def run_dpp_enterprise_tcp(dev, apdev, params): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) cap_lo = params['prefix'] + ".lo.pcap" wt = WlantestCapture('lo', cap_lo) time.sleep(1) # Controller conf_id = dev[1].dpp_configurator_add() csrattrs = "MAsGCSqGSIb3DQEJBw==" dev[1].set("dpp_configurator_params", "conf=sta-dot1x configurator=%d csrattrs=%s" % (conf_id, csrattrs)) id_c = dev[1].dpp_bootstrap_gen() uri_c = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id_c) res = dev[1].request("DPP_BOOTSTRAP_INFO %d" % id_c) req = "DPP_CONTROLLER_START" if "OK" not in dev[1].request(req): raise Exception("Failed to start Controller") dev[0].dpp_auth_init(uri=uri_c, role="enrollee", tcp_addr="127.0.0.1") run_dpp_enterprise_tcp_end(params, dev, wt) def run_dpp_enterprise_tcp_end(params, dev, wt): cert_file = params['prefix'] + ".cert.pem" pkcs7_file = params['prefix'] + ".pkcs7.der" with open("auth_serv/ec-ca.pem", "rb") as f: res = f.read() cacert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM, res) with open("auth_serv/ec-ca.key", "rb") as f: res = f.read() cakey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM, res) ev = dev[1].wait_event(["DPP-CSR"], timeout=10) if ev is None: raise Exception("Configurator did not receive CSR") id1_csr = int(ev.split(' ')[1].split('=')[1]) csr = ev.split(' ')[2] if not csr.startswith("csr="): raise Exception("Could not parse CSR event: " + ev) csr = csr[4:] csr = base64.b64decode(csr.encode()) logger.info("CSR: " + binascii.hexlify(csr).decode()) cert = dpp_sign_cert(cacert, cakey, csr) with open(cert_file, 'wb') as f: f.write(OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_PEM, cert)) subprocess.check_call(['openssl', 'crl2pkcs7', '-nocrl', '-certfile', cert_file, '-certfile', 'auth_serv/ec-ca.pem', '-outform', 'DER', '-out', pkcs7_file]) with open(pkcs7_file, 'rb') as f: pkcs7_der = f.read() certbag = base64.b64encode(pkcs7_der).decode() res = dev[1].request("DPP_CA_SET peer=%d name=certBag value=%s" % (id1_csr, certbag)) if "OK" not in res: raise Exception("Failed to set certBag") ev = dev[1].wait_event(["DPP-CONF-SENT", "DPP-CONF-FAILED"], timeout=5) if ev is None: raise Exception("DPP configuration not completed (Configurator)") if "DPP-CONF-FAILED" in ev: raise Exception("DPP configuration did not succeed (Configurator)") ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=1) if ev is None: raise Exception("DPP configuration not completed (Enrollee)") if "DPP-CONF-RECEIVED" not in ev: raise Exception("DPP configuration did not succeed (Enrollee)") time.sleep(0.5) wt.close() def test_dpp_enterprise_tcp2(dev, apdev, params): """DPP over TCP for enterprise provisioning (Controller initiating)""" if not openssl_imported: raise HwsimSkip("OpenSSL python method not available") try: run_dpp_enterprise_tcp2(dev, apdev, params) finally: dev[0].request("DPP_CONTROLLER_STOP") dev[1].request("DPP_CONTROLLER_STOP") def run_dpp_enterprise_tcp2(dev, apdev, params): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) cap_lo = params['prefix'] + ".lo.pcap" cert_file = params['prefix'] + ".cert.pem" pkcs7_file = params['prefix'] + ".pkcs7.der" with open("auth_serv/ec-ca.pem", "rb") as f: res = f.read() cacert = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM, res) with open("auth_serv/ec-ca.key", "rb") as f: res = f.read() cakey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM, res) wt = WlantestCapture('lo', cap_lo) time.sleep(1) # Client/Enrollee/Responder id_e = dev[0].dpp_bootstrap_gen() uri_e = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id_e) req = "DPP_CONTROLLER_START" if "OK" not in dev[0].request(req): raise Exception("Failed to start Client/Enrollee") # Controller/Configurator/Initiator conf_id = dev[1].dpp_configurator_add() csrattrs = "MAsGCSqGSIb3DQEJBw==" dev[1].dpp_auth_init(uri=uri_e, role="configurator", configurator=conf_id, conf="sta-dot1x", csrattrs=csrattrs, tcp_addr="127.0.0.1") run_dpp_enterprise_tcp_end(params, dev, wt) def test_dpp_qr_code_config_event_initiator(dev, apdev): """DPP QR Code and config event on Configurator Initiator""" run_dpp_qr_code_config_event_initiator(dev, apdev) def test_dpp_qr_code_config_event_initiator_set_comeback(dev, apdev): """DPP QR Code and config event on Configurator Initiator (set comeback)""" run_dpp_qr_code_config_event_initiator(dev, apdev, set_comeback=True) def test_dpp_qr_code_config_event_initiator_slow(dev, apdev): """DPP QR Code and config event on Configurator Initiator (slow)""" run_dpp_qr_code_config_event_initiator(dev, apdev, slow=True) def test_dpp_qr_code_config_event_initiator_failure(dev, apdev): """DPP QR Code and config event on Configurator Initiator (failure)""" run_dpp_qr_code_config_event_initiator(dev, apdev, failure=True) def test_dpp_qr_code_config_event_initiator_no_response(dev, apdev): """DPP QR Code and config event on Configurator Initiator (no response)""" run_dpp_qr_code_config_event_initiator(dev, apdev, failure=True, no_response=True) def run_dpp_qr_code_config_event_initiator(dev, apdev, set_comeback=False, slow=False, failure=False, no_response=False): check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) id1 = dev[1].dpp_auth_init(uri=uri0, conf="query") wait_auth_success(dev[0], dev[1]) ev = dev[1].wait_event(["DPP-CONF-NEEDED"]) if ev is None: raise Exception("Configuration query not seen") if "peer=%d " % id1 not in ev: raise Exception("Peer id mismatch: " + ev) if "net_role=sta" not in ev: raise Exception("Net role mismatch: " + ev) if set_comeback: if "OK" not in dev[1].request(("DPP_CONF_SET peer=%d comeback=123" % id1)): raise Exception("DPP_CONF_SET failed") if slow: time.sleep(0.100) if failure: conf = "conf=failure" else: ssid = "sae" password = "password" conf = "conf=sta-sae" conf += " ssid=" + binascii.hexlify(ssid.encode()).decode() conf += " pass=" + binascii.hexlify(password.encode()).decode() if not no_response: if "OK" not in dev[1].request(("DPP_CONF_SET peer=%d " % id1) + conf): raise Exception("DPP_CONF_SET failed") ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=65) if ev is None: raise Exception("DPP configuration not completed (Enrollee)") if failure and "DPP-CONF-FAILED" not in ev: raise Exception("DPP configuration did not fail (Enrollee)") if (not failure) and "DPP-CONF-RECEIVED" not in ev: raise Exception("DPP configuration did not succeed (Enrollee)") time.sleep(0.01) dev[0].dump_monitor() dev[1].dump_monitor() def test_dpp_qr_code_config_event_initiator_both(dev, apdev): """DPP QR Code and config event on Configurator/Enrollee Initiator""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) ssid = "sae" password = "password" dev[0].set("dpp_configurator_params", "conf=sta-sae ssid=%s pass=%s" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(password.encode()).decode())) dev[0].dpp_listen(2412, role="configurator") id1 = dev[1].dpp_auth_init(uri=uri0, conf="query", role="either") wait_auth_success(dev[0], dev[1], configurator=dev[0], enrollee=dev[1]) time.sleep(0.01) dev[0].dump_monitor() dev[1].dump_monitor() def test_dpp_tcp_qr_code_config_event_initiator(dev, apdev, params): """DPP over TCP (Configurator initiates with config event)""" try: run_dpp_tcp_qr_code_config_event_initiator(dev[0], dev[1]) finally: dev[1].request("DPP_CONTROLLER_STOP") def run_dpp_tcp_qr_code_config_event_initiator(dev0, dev1): check_dpp_capab(dev0, min_ver=2) check_dpp_capab(dev1, min_ver=2) id_c = dev1.dpp_bootstrap_gen() uri_c = dev1.request("DPP_BOOTSTRAP_GET_URI %d" % id_c) res = dev1.request("DPP_BOOTSTRAP_INFO %d" % id_c) req = "DPP_CONTROLLER_START role=enrollee" if "OK" not in dev1.request(req): raise Exception("Failed to start Controller") conf_id = dev0.dpp_configurator_add() id1 = dev0.dpp_auth_init(uri=uri_c, role="configurator", conf="query", tcp_addr="127.0.0.1") wait_auth_success(dev1, dev0) ev = dev0.wait_event(["DPP-CONF-NEEDED"]) if ev is None: raise Exception("Configuration query not seen") if "peer=%d " % id1 not in ev: raise Exception("Peer id mismatch: " + ev) if "net_role=sta" not in ev: raise Exception("Net role mismatch: " + ev) ssid = "sae" password = "password" conf = "conf=sta-sae" conf += " ssid=" + binascii.hexlify(ssid.encode()).decode() conf += " pass=" + binascii.hexlify(password.encode()).decode() if "OK" not in dev0.request(("DPP_CONF_SET peer=%d " % id1) + conf): raise Exception("DPP_CONF_SET failed") ev = dev1.wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=15) if ev is None: raise Exception("DPP configuration not completed (Enrollee)") if "DPP-CONF-RECEIVED" not in ev: raise Exception("DPP configuration did not succeed (Enrollee)") time.sleep(0.01) dev0.dump_monitor() dev1.dump_monitor() def test_dpp_qr_code_config_event_responder(dev, apdev): """DPP QR Code and config event on Configurator Responder""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1", mac=True) uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].set("dpp_configurator_params", "conf=query") dev[0].dpp_listen(2412, role="configurator") dev[1].dpp_auth_init(uri=uri0, role="enrollee") wait_auth_success(dev[0], dev[1]) ev = dev[0].wait_event(["DPP-CONF-NEEDED"]) if ev is None: raise Exception("Configuration query not seen") if "net_role=sta" not in ev: raise Exception("Net role mismatch: " + ev) peer_id = int(ev.split()[1].split('=')[1]) ssid = "sae" password = "password" conf = "conf=sta-sae" conf += " ssid=" + binascii.hexlify(ssid.encode()).decode() conf += " pass=" + binascii.hexlify(password.encode()).decode() if "OK" not in dev[0].request(("DPP_CONF_SET peer=%d " % peer_id) + conf): raise Exception("DPP_CONF_SET failed") ev = dev[1].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=15) if ev is None: raise Exception("DPP configuration not completed (Enrollee)") if "DPP-CONF-RECEIVED" not in ev: raise Exception("DPP configuration did not succeed (Enrollee)") time.sleep(0.01) dev[0].dump_monitor() dev[1].dump_monitor() def test_dpp_discard_public_action(dev, apdev): """DPP and discarding Public Action frames""" check_dpp_capab(dev[0]) check_dpp_capab(dev[1]) id0 = dev[0].dpp_bootstrap_gen(chan="81/1") uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0) dev[0].dpp_listen(2412) dev[1].set("dpp_discard_public_action", "1") dev[1].dpp_auth_init(uri=uri0) ev = dev[0].wait_event(["DPP-FAIL"], timeout=5) if ev is None: raise Exception("Failure not reported") if "No Auth Confirm received" not in ev: raise Exception("Unexpected failure reason: " + ev)