[PATCHv7 4/8] tests: FT using old style key for AP-to-AP protocol
Michael Braun
michael-dev at fami-braun.de
Sat Apr 22 01:46:39 PDT 2017
From: Jouni Malinen <j at w1.fi>
Signed-off-by: Jouni Malinen <j at w1.fi>
---
tests/hwsim/test_ap_ft.py | 40 ++++++++++++++++++++++++++++++++++++++++
1 file changed, 40 insertions(+)
diff --git a/tests/hwsim/test_ap_ft.py b/tests/hwsim/test_ap_ft.py
index 7764495..9fcaf4d 100644
--- a/tests/hwsim/test_ap_ft.py
+++ b/tests/hwsim/test_ap_ft.py
@@ -60,6 +60,13 @@ def ft_params1(rsn=True, ssid=None, passphrase=None):
params['r1kh'] = "02:00:00:00:04:00 00:01:02:03:04:06 200102030405060708090a0b0c0d0e0f200102030405060708090a0b0c0d0e0f"
return params
+def ft_params1_old_key(rsn=True, ssid=None, passphrase=None):
+ params = ft_params1a(rsn, ssid, passphrase)
+ params['r0kh'] = [ "02:00:00:00:03:00 nas1.w1.fi 100102030405060708090a0b0c0d0e0f",
+ "02:00:00:00:04:00 nas2.w1.fi 300102030405060708090a0b0c0d0e0f" ]
+ params['r1kh'] = "02:00:00:00:04:00 00:01:02:03:04:06 200102030405060708090a0b0c0d0e0f"
+ return params
+
def ft_params2a(rsn=True, ssid=None, passphrase=None):
params = ft_params(rsn, ssid, passphrase)
params['nas_identifier'] = "nas2.w1.fi"
@@ -73,6 +80,13 @@ def ft_params2(rsn=True, ssid=None, passphrase=None):
params['r1kh'] = "02:00:00:00:03:00 00:01:02:03:04:05 300102030405060708090a0b0c0d0e0f300102030405060708090a0b0c0d0e0f"
return params
+def ft_params2_old_key(rsn=True, ssid=None, passphrase=None):
+ params = ft_params2a(rsn, ssid, passphrase)
+ params['r0kh'] = [ "02:00:00:00:03:00 nas1.w1.fi 200102030405060708090a0b0c0d0e0f",
+ "02:00:00:00:04:00 nas2.w1.fi 000102030405060708090a0b0c0d0e0f" ]
+ params['r1kh'] = "02:00:00:00:03:00 00:01:02:03:04:05 300102030405060708090a0b0c0d0e0f"
+ return params
+
def ft_params1_r0kh_mismatch(rsn=True, ssid=None, passphrase=None):
params = ft_params(rsn, ssid, passphrase)
params['nas_identifier'] = "nas1.w1.fi"
@@ -173,6 +187,18 @@ def test_ap_ft(dev, apdev):
if "[WPA2-FT/PSK-CCMP]" not in dev[0].request("SCAN_RESULTS"):
raise Exception("Scan results missing RSN element info")
+def test_ap_ft_old_key(dev, apdev):
+ """WPA2-PSK-FT AP (old key)"""
+ ssid = "test-ft"
+ passphrase="12345678"
+
+ params = ft_params1_old_key(ssid=ssid, passphrase=passphrase)
+ hapd0 = hostapd.add_ap(apdev[0], params)
+ params = ft_params2_old_key(ssid=ssid, passphrase=passphrase)
+ hapd1 = hostapd.add_ap(apdev[1], params)
+
+ run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase)
+
def test_ap_ft_multi_akm(dev, apdev):
"""WPA2-PSK-FT AP with non-FT AKMs enabled"""
ssid = "test-ft"
@@ -441,6 +467,20 @@ def test_ap_ft_over_ds_pull(dev, apdev):
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, over_ds=True)
+def test_ap_ft_over_ds_pull_old_key(dev, apdev):
+ """WPA2-PSK-FT AP over DS (pull PMK; old key)"""
+ ssid = "test-ft"
+ passphrase="12345678"
+
+ params = ft_params1_old_key(ssid=ssid, passphrase=passphrase)
+ params["pmk_r1_push"] = "0"
+ hapd0 = hostapd.add_ap(apdev[0], params)
+ params = ft_params2_old_key(ssid=ssid, passphrase=passphrase)
+ params["pmk_r1_push"] = "0"
+ hapd1 = hostapd.add_ap(apdev[1], params)
+
+ run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, over_ds=True)
+
def test_ap_ft_sae(dev, apdev):
"""WPA2-PSK-FT-SAE AP"""
if "SAE" not in dev[0].get_capability("auth_alg"):
--
2.1.4
More information about the Hostap
mailing list