# Test cases for SAE # Copyright (c) 2013-2020, Jouni Malinen # # This software may be distributed under the terms of the BSD license. # See README for more details. from remotehost import remote_compatible import binascii import os import time import logging logger = logging.getLogger() import socket import struct import subprocess import hwsim_utils import hostapd from wpasupplicant import WpaSupplicant from utils import * from test_ap_psk import find_wpas_process, read_process_memory, verify_not_present, get_key_locations @remote_compatible def test_sae(dev, apdev): """SAE with default group""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) key_mgmt = hapd.get_config()['key_mgmt'] if key_mgmt.split(' ')[0] != "SAE": raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt) dev[0].request("SET sae_groups ") id = dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") hapd.wait_sta() if dev[0].get_status_field('sae_group') != '19': raise Exception("Expected default SAE group not used") bss = dev[0].get_bss(apdev[0]['bssid']) if 'flags' not in bss: raise Exception("Could not get BSS flags from BSS table") if "[WPA2-SAE-CCMP]" not in bss['flags']: raise Exception("Unexpected BSS flags: " + bss['flags']) res = hapd.request("STA-FIRST") if "sae_group=19" not in res.splitlines(): raise Exception("hostapd STA output did not specify SAE group") pmk_h = hapd.request("GET_PMK " + dev[0].own_addr()) pmk_w = dev[0].get_pmk(id) if pmk_h != pmk_w: raise Exception("Fetched PMK does not match: hostapd %s, wpa_supplicant %s" % (pmk_h, pmk_w)) dev[0].request("DISCONNECT") dev[0].wait_disconnected() pmk_h2 = hapd.request("GET_PMK " + dev[0].own_addr()) if pmk_h != pmk_h2: raise Exception("Fetched PMK from PMKSA cache does not match: %s, %s" % (pmk_h, pmk_h2)) if "FAIL" not in hapd.request("GET_PMK foo"): raise Exception("Invalid GET_PMK did not return failure") if "FAIL" not in hapd.request("GET_PMK 02:ff:ff:ff:ff:ff"): raise Exception("GET_PMK for unknown STA did not return failure") @remote_compatible def test_sae_password_ecc(dev, apdev): """SAE with number of different passwords (ECC)""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups 19") for i in range(10): password = "12345678-" + str(i) hapd.set("wpa_passphrase", password) dev[0].connect("test-sae", psk=password, key_mgmt="SAE", scan_freq="2412") dev[0].request("REMOVE_NETWORK all") dev[0].wait_disconnected() @remote_compatible def test_sae_password_ffc(dev, apdev): """SAE with number of different passwords (FFC)""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params['sae_groups'] = '15' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups 15") for i in range(10): password = "12345678-" + str(i) hapd.set("wpa_passphrase", password) dev[0].connect("test-sae", psk=password, key_mgmt="SAE", scan_freq="2412") dev[0].request("REMOVE_NETWORK all") dev[0].wait_disconnected() @remote_compatible def test_sae_pmksa_caching(dev, apdev): """SAE and PMKSA caching""" run_sae_pmksa_caching(dev, apdev) @remote_compatible def test_sae_pmksa_caching_pmkid(dev, apdev): """SAE and PMKSA caching (PMKID in AssocReq after SAE)""" try: dev[0].set("sae_pmkid_in_assoc", "1") run_sae_pmksa_caching(dev, apdev) finally: dev[0].set("sae_pmkid_in_assoc", "0") def run_sae_pmksa_caching(dev, apdev): check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") ev = hapd.wait_event(["AP-STA-CONNECTED"], timeout=5) if ev is None: raise Exception("No connection event received from hostapd") sta0 = hapd.get_sta(dev[0].own_addr()) if sta0['wpa'] != '2' or sta0['AKMSuiteSelector'] != '00-0f-ac-8': raise Exception("SAE STA(0) AKM suite selector reported incorrectly") dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].request("RECONNECT") dev[0].wait_connected(timeout=15, error="Reconnect timed out") val = dev[0].get_status_field('sae_group') if val is not None: raise Exception("SAE group claimed to have been used: " + val) sta0 = hapd.get_sta(dev[0].own_addr()) if sta0['wpa'] != '2' or sta0['AKMSuiteSelector'] != '00-0f-ac-8': raise Exception("SAE STA(0) AKM suite selector reported incorrectly after PMKSA caching") @remote_compatible def test_sae_pmksa_caching_disabled(dev, apdev): """SAE and PMKSA caching disabled""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params['disable_pmksa_caching'] = '1' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") ev = hapd.wait_event(["AP-STA-CONNECTED"], timeout=5) if ev is None: raise Exception("No connection event received from hostapd") dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].request("RECONNECT") dev[0].wait_connected(timeout=15, error="Reconnect timed out") if dev[0].get_status_field('sae_group') != '19': raise Exception("Expected default SAE group not used") def test_sae_groups(dev, apdev): """SAE with all supported groups""" check_sae_capab(dev[0]) # This is the full list of supported groups, but groups 14-16 (2048-4096 bit # MODP) and group 21 (521-bit random ECP group) are a bit too slow on some # VMs and can result in hitting the mac80211 authentication timeout, so # allow them to fail and just report such failures in the debug log. sae_groups = [19, 25, 26, 20, 21, 1, 2, 5, 14, 15, 16, 22, 23, 24] tls = dev[0].request("GET tls_library") if tls.startswith("OpenSSL") and "run=OpenSSL 1." in tls: logger.info("Add Brainpool EC groups since OpenSSL is new enough") sae_groups += [27, 28, 29, 30] heavy_groups = [14, 15, 16] suitable_groups = [15, 16, 17, 18, 19, 20, 21] groups = [str(g) for g in sae_groups] params = hostapd.wpa2_params(ssid="test-sae-groups", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params['sae_groups'] = ' '.join(groups) hapd = hostapd.add_ap(apdev[0], params) for g in groups: logger.info("Testing SAE group " + g) dev[0].request("SET sae_groups " + g) id = dev[0].connect("test-sae-groups", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) if int(g) in heavy_groups: ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=5) if ev is None: logger.info("No connection with heavy SAE group %s did not connect - likely hitting timeout in mac80211" % g) dev[0].remove_network(id) time.sleep(0.1) dev[0].dump_monitor() continue logger.info("Connection with heavy SAE group " + g) else: ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=10) if ev is None: if "BoringSSL" in tls and int(g) in [25]: logger.info("Ignore connection failure with group " + g + " with BoringSSL") dev[0].remove_network(id) dev[0].dump_monitor() continue if int(g) not in suitable_groups: logger.info("Ignore connection failure with unsuitable group " + g) dev[0].remove_network(id) dev[0].dump_monitor() continue raise Exception("Connection timed out with group " + g) if dev[0].get_status_field('sae_group') != g: raise Exception("Expected SAE group not used") pmksa = dev[0].get_pmksa(hapd.own_addr()) if not pmksa: raise Exception("No PMKSA cache entry added") if pmksa['pmkid'] == '00000000000000000000000000000000': raise Exception("All zeros PMKID derived for group %s" % g) dev[0].remove_network(id) dev[0].wait_disconnected() dev[0].dump_monitor() @remote_compatible def test_sae_group_nego(dev, apdev): """SAE group negotiation""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae-group-nego", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params['sae_groups'] = '19' hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups 25 20 19") dev[0].connect("test-sae-group-nego", psk="12345678", key_mgmt="SAE", scan_freq="2412") if dev[0].get_status_field('sae_group') != '19': raise Exception("Expected SAE group not used") def test_sae_group_nego_no_match(dev, apdev): """SAE group negotiation (no match)""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae-group-nego", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' # None-existing SAE group to force all attempts to be rejected params['sae_groups'] = '0' hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-sae-group-nego", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) ev = dev[0].wait_event(["CTRL-EVENT-SSID-TEMP-DISABLED"], timeout=10) dev[0].request("REMOVE_NETWORK all") if ev is None: raise Exception("Network profile disabling not reported") @remote_compatible def test_sae_anti_clogging(dev, apdev): """SAE anti clogging""" check_sae_capab(dev[0]) check_sae_capab(dev[1]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params['sae_anti_clogging_threshold'] = '1' hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[1].request("SET sae_groups ") id = {} for i in range(0, 2): dev[i].scan(freq="2412") id[i] = dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", only_add_network=True) for i in range(0, 2): dev[i].select_network(id[i]) for i in range(0, 2): dev[i].wait_connected(timeout=10) def test_sae_forced_anti_clogging(dev, apdev): """SAE anti clogging (forced)""" check_sae_capab(dev[0]) check_sae_capab(dev[1]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE WPA-PSK' params['sae_anti_clogging_threshold'] = '0' hostapd.add_ap(apdev[0], params) dev[2].connect("test-sae", psk="12345678", scan_freq="2412") for i in range(0, 2): dev[i].request("SET sae_groups ") dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") def test_sae_mixed(dev, apdev): """Mixed SAE and non-SAE network""" check_sae_capab(dev[0]) check_sae_capab(dev[1]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE WPA-PSK' params['sae_anti_clogging_threshold'] = '0' hapd = hostapd.add_ap(apdev[0], params) dev[2].connect("test-sae", psk="12345678", scan_freq="2412") for i in range(0, 2): dev[i].request("SET sae_groups ") dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") sta0 = hapd.get_sta(dev[0].own_addr()) sta2 = hapd.get_sta(dev[2].own_addr()) if sta0['wpa'] != '2' or sta0['AKMSuiteSelector'] != '00-0f-ac-8': raise Exception("SAE STA(0) AKM suite selector reported incorrectly") if sta2['wpa'] != '2' or sta2['AKMSuiteSelector'] != '00-0f-ac-2': raise Exception("PSK STA(2) AKM suite selector reported incorrectly") def test_sae_and_psk(dev, apdev): """SAE and PSK enabled in network profile""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE WPA-PSK", scan_freq="2412") def test_sae_and_psk2(dev, apdev): """SAE and PSK enabled in network profile (use PSK)""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-psk", passphrase="12345678") hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-psk", psk="12345678", key_mgmt="SAE WPA-PSK", scan_freq="2412") def test_sae_wpa3_roam(dev, apdev): """SAE and WPA3-Personal transition mode roaming""" check_sae_capab(dev[0]) # WPA3-Personal only AP params = hostapd.wpa2_params(ssid="test", passphrase="12345678") params['ieee80211w'] = '2' params['wpa_key_mgmt'] = 'SAE' hapd0 = hostapd.add_ap(apdev[0], params) # WPA2-Personal only AP params = hostapd.wpa2_params(ssid="test", passphrase="12345678") hapd1 = hostapd.add_ap(apdev[1], params) dev[0].set("sae_groups", "") dev[0].connect("test", psk="12345678", key_mgmt="SAE WPA-PSK", ieee80211w="1", scan_freq="2412") bssid = dev[0].get_status_field('bssid') # Disable the current AP to force roam to the other one if bssid == apdev[0]['bssid']: hapd0.disable() else: hapd1.disable() dev[0].wait_connected() # Disable the current AP to force roam to the other (previous) one if bssid == apdev[0]['bssid']: hapd0.enable() hapd1.disable() else: hapd1.enable() hapd0.disable() dev[0].wait_connected() # Force roam to an AP in WPA3-Personal transition mode if bssid == apdev[0]['bssid']: hapd1.set("ieee80211w", "1") hapd1.set("sae_require_mfp", "1") hapd1.set("wpa_key_mgmt", "SAE WPA-PSK") hapd1.enable() hapd0.disable() else: hapd0.set("ieee80211w", "1") hapd0.set("sae_require_mfp", "1") hapd0.set("wpa_key_mgmt", "SAE WPA-PSK") hapd0.enable() hapd1.disable() dev[0].wait_connected() status = dev[0].get_status() if status['key_mgmt'] != "SAE": raise Exception("Did not use SAE with WPA3-Personal transition mode AP") if status['pmf'] != "1": raise Exception("Did not use PMF with WPA3-Personal transition mode AP") def test_sae_mixed_mfp(dev, apdev): """Mixed SAE and non-SAE network and MFP required with SAE""" check_sae_capab(dev[0]) check_sae_capab(dev[1]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE WPA-PSK' params["ieee80211w"] = "1" params['sae_require_mfp'] = '1' hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", ieee80211w="2", scan_freq="2412") dev[0].dump_monitor() dev[1].request("SET sae_groups ") dev[1].connect("test-sae", psk="12345678", key_mgmt="SAE", ieee80211w="0", scan_freq="2412", wait_connect=False) ev = dev[1].wait_event(["CTRL-EVENT-CONNECTED", "CTRL-EVENT-ASSOC-REJECT"], timeout=10) if ev is None: raise Exception("No connection result reported") if "CTRL-EVENT-ASSOC-REJECT" not in ev: raise Exception("SAE connection without MFP was not rejected") if "status_code=31" not in ev: raise Exception("Unexpected status code in rejection: " + ev) dev[1].request("DISCONNECT") dev[1].dump_monitor() dev[2].connect("test-sae", psk="12345678", ieee80211w="0", scan_freq="2412") dev[2].dump_monitor() def _test_sae_mixed_check_mfp(dev, apdev): """Mixed SAE and non-SAE network with the sae_check_mfp option""" check_sae_capab(dev[0]) check_sae_capab(dev[1]) check_sae_capab(dev[2]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE WPA-PSK' params["ieee80211w"] = "1" hostapd.add_ap(apdev[0], params) params = hostapd.wpa2_params(ssid="test-sae-no-mfp", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE WPA-PSK' params["ieee80211w"] = "0" hostapd.add_ap(apdev[1], params) dev[0].set("sae_check_mfp", "0") dev[0].set("sae_groups", "") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE WPA-PSK", ieee80211w="0", scan_freq="2412") dev[0].dump_monitor() status = dev[0].get_status() if status['key_mgmt'] != "SAE": raise Exception("SAE without sae_check_mfp was not allowed") # Confirm SAE is used when sae_check_mfp is not set for non-PMF AP. dev[2].set("sae_check_mfp", "0") dev[2].set("sae_groups", "") dev[2].connect("test-sae-no-mfp", psk="12345678", key_mgmt="SAE WPA-PSK", ieee80211w="1", scan_freq="2412") status = dev[2].get_status() if status['key_mgmt'] != "SAE": raise Exception("SAE without sae_check_mfp was not allowed") dev[2].dump_monitor() # Confirm SAE is not used with the PMF disabled network configuration. dev[1].set("sae_check_mfp", "1") dev[1].set("sae_groups", "") dev[1].connect("test-sae", psk="12345678", key_mgmt="SAE WPA-PSK", ieee80211w="0", scan_freq="2412") status = dev[1].get_status() dev[1].request("DISCONNECT") dev[1].wait_disconnected() dev[1].dump_monitor() if status['key_mgmt'] != "WPA2-PSK": raise Exception("SAE without MFP was allowed") dev[1].request("REMOVE_NETWORK all") # Confirm SAE is not used connecting to PMF disabled AP. dev[1].set("sae_check_mfp", "1") dev[1].set("sae_groups", "") dev[1].connect("test-sae-no-mfp", psk="12345678", key_mgmt="SAE WPA-PSK", ieee80211w="1", scan_freq="2412") status = dev[1].get_status() if status['key_mgmt'] != "WPA2-PSK": raise Exception("SAE without MFP was allowed") def test_sae_mixed_check_mfp(dev, apdev): """Mixed SAE and non-SAE network with the sae_check_mfp option""" try: _test_sae_mixed_check_mfp(dev, apdev) finally: dev[0].set("sae_check_mfp", "0") dev[1].set("sae_check_mfp", "0") dev[2].set("sae_check_mfp", "0") def test_sae_and_psk_transition_disable(dev, apdev): """SAE and PSK transition disable indication""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params["ieee80211w"] = "1" params['wpa_key_mgmt'] = 'SAE WPA-PSK' params['transition_disable'] = '0x01' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") id = dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE WPA-PSK", ieee80211w="1", scan_freq="2412") ev = dev[0].wait_event(["TRANSITION-DISABLE"], timeout=1) if ev is None: raise Exception("Transition disable not indicated") if ev.split(' ')[1] != "01": raise Exception("Unexpected transition disable bitmap: " + ev) val = dev[0].get_network(id, "ieee80211w") if val != "2": raise Exception("Unexpected ieee80211w value: " + val) val = dev[0].get_network(id, "key_mgmt") if val != "SAE": raise Exception("Unexpected key_mgmt value: " + val) val = dev[0].get_network(id, "group") if val != "CCMP": raise Exception("Unexpected group value: " + val) val = dev[0].get_network(id, "proto") if val != "RSN": raise Exception("Unexpected proto value: " + val) dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].request("RECONNECT") dev[0].wait_connected() def test_sae_mfp(dev, apdev): """SAE and MFP enabled without sae_require_mfp""" check_sae_capab(dev[0]) check_sae_capab(dev[1]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params["ieee80211w"] = "1" hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", ieee80211w="2", scan_freq="2412") dev[1].request("SET sae_groups ") dev[1].connect("test-sae", psk="12345678", key_mgmt="SAE", ieee80211w="0", scan_freq="2412") @remote_compatible def test_sae_missing_password(dev, apdev): """SAE and missing password""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups ") id = dev[0].connect("test-sae", raw_psk="46b4a73b8a951ad53ebd2e0afdb9c5483257edd4c21d12b7710759da70945858", key_mgmt="SAE", scan_freq="2412", wait_connect=False) ev = dev[0].wait_event(['CTRL-EVENT-SSID-TEMP-DISABLED'], timeout=10) if ev is None: raise Exception("Invalid network not temporarily disabled") def test_sae_key_lifetime_in_memory(dev, apdev, params): """SAE and key lifetime in memory""" check_sae_capab(dev[0]) password = "5ad144a7c1f5a5503baa6fa01dabc15b1843e8c01662d78d16b70b5cd23cf8b" p = hostapd.wpa2_params(ssid="test-sae", passphrase=password) p['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], p) pid = find_wpas_process(dev[0]) dev[0].request("SET sae_groups ") id = dev[0].connect("test-sae", psk=password, key_mgmt="SAE", scan_freq="2412") # The decrypted copy of GTK is freed only after the CTRL-EVENT-CONNECTED # event has been delivered, so verify that wpa_supplicant has returned to # eloop before reading process memory. time.sleep(1) dev[0].ping() password = password.encode() buf = read_process_memory(pid, password) dev[0].request("DISCONNECT") dev[0].wait_disconnected() dev[0].relog() sae_k = None sae_keyseed = None sae_kck = None pmk = None ptk = None gtk = None with open(os.path.join(params['logdir'], 'log0'), 'r') as f: for l in f.readlines(): if "SAE: k - hexdump" in l: val = l.strip().split(':')[3].replace(' ', '') sae_k = binascii.unhexlify(val) if "SAE: keyseed - hexdump" in l: val = l.strip().split(':')[3].replace(' ', '') sae_keyseed = binascii.unhexlify(val) if "SAE: KCK - hexdump" in l: val = l.strip().split(':')[3].replace(' ', '') sae_kck = binascii.unhexlify(val) if "SAE: PMK - hexdump" in l: val = l.strip().split(':')[3].replace(' ', '') pmk = binascii.unhexlify(val) if "WPA: PTK - hexdump" in l: val = l.strip().split(':')[3].replace(' ', '') ptk = binascii.unhexlify(val) if "WPA: Group Key - hexdump" in l: val = l.strip().split(':')[3].replace(' ', '') gtk = binascii.unhexlify(val) if not sae_k or not sae_keyseed or not sae_kck or not pmk or not ptk or not gtk: raise Exception("Could not find keys from debug log") if len(gtk) != 16: raise Exception("Unexpected GTK length") kck = ptk[0:16] kek = ptk[16:32] tk = ptk[32:48] fname = os.path.join(params['logdir'], 'sae_key_lifetime_in_memory.memctx-') logger.info("Checking keys in memory while associated") get_key_locations(buf, password, "Password") get_key_locations(buf, pmk, "PMK") if password not in buf: raise HwsimSkip("Password not found while associated") if pmk not in buf: raise HwsimSkip("PMK not found while associated") if kck not in buf: raise Exception("KCK not found while associated") if kek not in buf: raise Exception("KEK not found while associated") #if tk in buf: # raise Exception("TK found from memory") verify_not_present(buf, sae_k, fname, "SAE(k)") verify_not_present(buf, sae_keyseed, fname, "SAE(keyseed)") verify_not_present(buf, sae_kck, fname, "SAE(KCK)") logger.info("Checking keys in memory after disassociation") buf = read_process_memory(pid, password) # Note: Password is still present in network configuration # Note: PMK is in PMKSA cache get_key_locations(buf, password, "Password") get_key_locations(buf, pmk, "PMK") verify_not_present(buf, kck, fname, "KCK") verify_not_present(buf, kek, fname, "KEK") verify_not_present(buf, tk, fname, "TK") if gtk in buf: get_key_locations(buf, gtk, "GTK") verify_not_present(buf, gtk, fname, "GTK") verify_not_present(buf, sae_k, fname, "SAE(k)") verify_not_present(buf, sae_keyseed, fname, "SAE(keyseed)") verify_not_present(buf, sae_kck, fname, "SAE(KCK)") dev[0].request("PMKSA_FLUSH") logger.info("Checking keys in memory after PMKSA cache flush") buf = read_process_memory(pid, password) get_key_locations(buf, password, "Password") get_key_locations(buf, pmk, "PMK") verify_not_present(buf, pmk, fname, "PMK") dev[0].request("REMOVE_NETWORK all") logger.info("Checking keys in memory after network profile removal") buf = read_process_memory(pid, password) get_key_locations(buf, password, "Password") get_key_locations(buf, pmk, "PMK") verify_not_present(buf, password, fname, "password") verify_not_present(buf, pmk, fname, "PMK") verify_not_present(buf, kck, fname, "KCK") verify_not_present(buf, kek, fname, "KEK") verify_not_present(buf, tk, fname, "TK") verify_not_present(buf, gtk, fname, "GTK") verify_not_present(buf, sae_k, fname, "SAE(k)") verify_not_present(buf, sae_keyseed, fname, "SAE(keyseed)") verify_not_present(buf, sae_kck, fname, "SAE(KCK)") @remote_compatible def test_sae_oom_wpas(dev, apdev): """SAE and OOM in wpa_supplicant""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' params['sae_groups'] = '19 25 26 20' hapd = hostapd.add_ap(apdev[0], params) dev[0].request("SET sae_groups 20") with alloc_fail(dev[0], 1, "sae_set_group"): dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") dev[0].request("REMOVE_NETWORK all") dev[0].request("SET sae_groups ") with alloc_fail(dev[0], 2, "sae_set_group"): dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") dev[0].request("REMOVE_NETWORK all") with alloc_fail(dev[0], 1, "wpabuf_alloc;sme_auth_build_sae_commit"): dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412") dev[0].request("REMOVE_NETWORK all") with alloc_fail(dev[0], 1, "wpabuf_alloc;sme_auth_build_sae_confirm"): dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") dev[0].request("REMOVE_NETWORK all") with alloc_fail(dev[0], 1, "=sme_authenticate"): dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") dev[0].request("REMOVE_NETWORK all") with alloc_fail(dev[0], 1, "radio_add_work;sme_authenticate"): dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") dev[0].request("REMOVE_NETWORK all") @remote_compatible def test_sae_proto_ecc(dev, apdev): """SAE protocol testing (ECC)""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) bssid = apdev[0]['bssid'] dev[0].request("SET sae_groups 19") tests = [("Confirm mismatch", "1300" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", "0000800edebc3f260dc1fe7e0b20888af2b8a3316252ec37388a8504e25b73dc4240"), ("Commit without even full cyclic group field", "13", None), ("Too short commit", "1300" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02", None), ("Invalid commit scalar (0)", "1300" + "0000000000000000000000000000000000000000000000000000000000000000" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", None), ("Invalid commit scalar (1)", "1300" + "0000000000000000000000000000000000000000000000000000000000000001" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", None), ("Invalid commit scalar (> r)", "1300" + "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", None), ("Commit element not on curve", "1300" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728d0000000000000000000000000000000000000000000000000000000000000000", None), ("Invalid commit element (y coordinate > P)", "1300" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", None), ("Invalid commit element (x coordinate > P)", "1300" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", None), ("Different group in commit", "1400" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", None), ("Too short confirm", "1300" + "033d3635b39666ed427fd4a3e7d37acec2810afeaf1687f746a14163ff0e6d03" + "559cb8928db4ce4e3cbd6555e837591995e5ebe503ef36b503d9ca519d63728dd3c7c676b8e8081831b6bc3a64bdf136061a7de175e17d1965bfa41983ed02f8", "0000800edebc3f260dc1fe7e0b20888af2b8a3316252ec37388a8504e25b73dc42")] for (note, commit, confirm) in tests: logger.info(note) dev[0].scan_for_bss(bssid, freq=2412) hapd.set("ext_mgmt_frame_handling", "1") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) logger.info("Commit") for i in range(0, 10): req = hapd.mgmt_rx() if req is None: raise Exception("MGMT RX wait timed out (commit)") if req['subtype'] == 11: break req = None if not req: raise Exception("Authentication frame (commit) not received") hapd.dump_monitor() resp = {} resp['fc'] = req['fc'] resp['da'] = req['sa'] resp['sa'] = req['da'] resp['bssid'] = req['bssid'] resp['payload'] = binascii.unhexlify("030001000000" + commit) hapd.mgmt_tx(resp) if confirm: logger.info("Confirm") for i in range(0, 10): req = hapd.mgmt_rx() if req is None: raise Exception("MGMT RX wait timed out (confirm)") if req['subtype'] == 11: break req = None if not req: raise Exception("Authentication frame (confirm) not received") hapd.dump_monitor() resp = {} resp['fc'] = req['fc'] resp['da'] = req['sa'] resp['sa'] = req['da'] resp['bssid'] = req['bssid'] resp['payload'] = binascii.unhexlify("030002000000" + confirm) hapd.mgmt_tx(resp) time.sleep(0.1) dev[0].request("REMOVE_NETWORK all") hapd.set("ext_mgmt_frame_handling", "0") hapd.dump_monitor() @remote_compatible def test_sae_proto_ffc(dev, apdev): """SAE protocol testing (FFC)""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) bssid = apdev[0]['bssid'] dev[0].request("SET sae_groups 2") tests = [("Confirm mismatch", "0200" + "0c70519d874e3e4930a917cc5e17ea7a26028211159f217bab28b8d6c56691805e49f03249b2c6e22c7c9f86b30e04ccad2deedd5e5108ae07b737c00001c59cd0eb08b1dfc7f1b06a1542e2b6601a963c066e0c65940983a03917ae57a101ce84b5cbbc76ff33ebb990aac2e54aa0f0ab6ec0a58113d927683502b2cb2347d2" + "a8c00117493cdffa5dd671e934bc9cb1a69f39e25e9dd9cd9afd3aea2441a0f5491211c7ba50a753563f9ce943b043557cb71193b28e86ed9544f4289c471bf91b70af5c018cf4663e004165b0fd0bc1d8f3f78adf42eee92bcbc55246fd3ee9f107ab965dc7d4986f23eb71d616ebfe6bfe0a6c1ac5dc1718acee17c9a17486", "0000f3116a9731f1259622e3eb55d4b3b50ba16f8c5f5565b28e609b180c51460251"), ("Too short commit", "0200" + "0c70519d874e3e4930a917cc5e17ea7a26028211159f217bab28b8d6c56691805e49f03249b2c6e22c7c9f86b30e04ccad2deedd5e5108ae07b737c00001c59cd0eb08b1dfc7f1b06a1542e2b6601a963c066e0c65940983a03917ae57a101ce84b5cbbc76ff33ebb990aac2e54aa0f0ab6ec0a58113d927683502b2cb2347d2" + "a8c00117493cdffa5dd671e934bc9cb1a69f39e25e9dd9cd9afd3aea2441a0f5491211c7ba50a753563f9ce943b043557cb71193b28e86ed9544f4289c471bf91b70af5c018cf4663e004165b0fd0bc1d8f3f78adf42eee92bcbc55246fd3ee9f107ab965dc7d4986f23eb71d616ebfe6bfe0a6c1ac5dc1718acee17c9a174", None), ("Invalid element (0) in commit", "0200" + "0c70519d874e3e4930a917cc5e17ea7a26028211159f217bab28b8d6c56691805e49f03249b2c6e22c7c9f86b30e04ccad2deedd5e5108ae07b737c00001c59cd0eb08b1dfc7f1b06a1542e2b6601a963c066e0c65940983a03917ae57a101ce84b5cbbc76ff33ebb990aac2e54aa0f0ab6ec0a58113d927683502b2cb2347d2" + "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", None), ("Invalid element (1) in commit", "0200" + "0c70519d874e3e4930a917cc5e17ea7a26028211159f217bab28b8d6c56691805e49f03249b2c6e22c7c9f86b30e04ccad2deedd5e5108ae07b737c00001c59cd0eb08b1dfc7f1b06a1542e2b6601a963c066e0c65940983a03917ae57a101ce84b5cbbc76ff33ebb990aac2e54aa0f0ab6ec0a58113d927683502b2cb2347d2" + "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001", None), ("Invalid element (> P) in commit", "0200" + "0c70519d874e3e4930a917cc5e17ea7a26028211159f217bab28b8d6c56691805e49f03249b2c6e22c7c9f86b30e04ccad2deedd5e5108ae07b737c00001c59cd0eb08b1dfc7f1b06a1542e2b6601a963c066e0c65940983a03917ae57a101ce84b5cbbc76ff33ebb990aac2e54aa0f0ab6ec0a58113d927683502b2cb2347d2" + "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", None)] for (note, commit, confirm) in tests: logger.info(note) dev[0].scan_for_bss(bssid, freq=2412) hapd.set("ext_mgmt_frame_handling", "1") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) logger.info("Commit") for i in range(0, 10): req = hapd.mgmt_rx() if req is None: raise Exception("MGMT RX wait timed out (commit)") if req['subtype'] == 11: break req = None if not req: raise Exception("Authentication frame (commit) not received") hapd.dump_monitor() resp = {} resp['fc'] = req['fc'] resp['da'] = req['sa'] resp['sa'] = req['da'] resp['bssid'] = req['bssid'] resp['payload'] = binascii.unhexlify("030001000000" + commit) hapd.mgmt_tx(resp) if confirm: logger.info("Confirm") for i in range(0, 10): req = hapd.mgmt_rx() if req is None: raise Exception("MGMT RX wait timed out (confirm)") if req['subtype'] == 11: break req = None if not req: raise Exception("Authentication frame (confirm) not received") hapd.dump_monitor() resp = {} resp['fc'] = req['fc'] resp['da'] = req['sa'] resp['sa'] = req['da'] resp['bssid'] = req['bssid'] resp['payload'] = binascii.unhexlify("030002000000" + confirm) hapd.mgmt_tx(resp) time.sleep(0.1) dev[0].request("REMOVE_NETWORK all") hapd.set("ext_mgmt_frame_handling", "0") hapd.dump_monitor() def test_sae_proto_commit_delayed(dev, apdev): """SAE protocol testing - Commit delayed""" check_sae_capab(dev[0]) params = hostapd.wpa2_params(ssid="test-sae", passphrase="12345678") params['wpa_key_mgmt'] = 'SAE' hapd = hostapd.add_ap(apdev[0], params) bssid = apdev[0]['bssid'] dev[0].request("SET sae_groups 19") dev[0].scan_for_bss(bssid, freq=2412) hapd.set("ext_mgmt_frame_handling", "1") dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412", wait_connect=False) logger.info("Commit") for i in range(0, 10): req = hapd.mgmt_rx() if req is None: raise Exception("MGMT RX wait timed out (commit)") if req['subtype'] == 11: break req = None if not req: raise Exception("Authentication frame (commit) not received") hapd.dump_monitor() time.sleep(2.5) hapd.request("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(req['frame']).decode()) logger.info("Commit/Confirm") for i in range(0, 10): req = hapd.mgmt_rx() if req is None: raise Exception("MGMT RX wait timed out (confirm)") if req['subtype'] == 11: trans, = struct.unpack('