]> git.ipfire.org Git - thirdparty/hostap.git/blob - tests/hwsim/test_dpp.py
tests: DPP and unknown configurator id
[thirdparty/hostap.git] / tests / hwsim / test_dpp.py
1 # Test cases for Device Provisioning Protocol (DPP)
2 # Copyright (c) 2017, Qualcomm Atheros, Inc.
3 # Copyright (c) 2018, The Linux Foundation
4 #
5 # This software may be distributed under the terms of the BSD license.
6 # See README for more details.
7
8 import base64
9 import binascii
10 import hashlib
11 import logging
12 logger = logging.getLogger()
13 import struct
14 import subprocess
15 import time
16
17 import hostapd
18 import hwsim_utils
19 from utils import HwsimSkip, alloc_fail, fail_test, wait_fail_trigger
20 from wpasupplicant import WpaSupplicant
21
22 try:
23 import OpenSSL
24 openssl_imported = True
25 except ImportError:
26 openssl_imported = False
27
28 def check_dpp_capab(dev, brainpool=False):
29 if "UNKNOWN COMMAND" in dev.request("DPP_BOOTSTRAP_GET_URI 0"):
30 raise HwsimSkip("DPP not supported")
31 if brainpool:
32 tls = dev.request("GET tls_library")
33 if not tls.startswith("OpenSSL") or "run=BoringSSL" in tls:
34 raise HwsimSkip("Crypto library does not support Brainpool curves: " + tls)
35
36 def test_dpp_qr_code_parsing(dev, apdev):
37 """DPP QR Code parsing"""
38 check_dpp_capab(dev[0])
39 id = []
40
41 tests = [ "DPP:C:81/1,115/36;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;",
42 "DPP:C:81/1,81/2,81/3,81/4,81/5,81/6,81/7,81/8,81/9,81/10,81/11,81/12,81/13,82/14,83/1,83/2,83/3,83/4,83/5,83/6,83/7,83/8,83/9,84/5,84/6,84/7,84/8,84/9,84/10,84/11,84/12,84/13,115/36;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkq/24e0rsrfMP9K1Tm8gx+ovP0I=;;",
43 "DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;",
44 "DPP:I:;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;" ]
45 for uri in tests:
46 res = dev[0].request("DPP_QR_CODE " + uri)
47 if "FAIL" in res:
48 raise Exception("Failed to parse QR Code")
49 id.append(int(res))
50
51 uri2 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id[-1])
52 if uri != uri2:
53 raise Exception("Returned URI does not match")
54
55 tests = [ "foo",
56 "DPP:",
57 "DPP:;;",
58 "DPP:C:1/2;M:;K;;",
59 "DPP:I:;M:01020304050;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;",
60 "DPP:K:" + base64.b64encode("hello") + ";;",
61 "DPP:K:MEkwEwYHKoZIzj0CAQYIKoZIzj0DAQEDMgAEXiJuIWt1Q/CPCkuULechh37UsXPmbUANOeN5U9sOQROE4o/NEFeFEejROHYwwehF;;",
62 "DPP:K:MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANNZaZA4T/kRDjnmpI1ACOJhAuTIIEk2KFOpS6XPpGF+EVr/ao3XemkE0/nzXmGaLzLqTUCJknSdxTnVPeWfCVsCAwEAAQ==;;",
63 "DPP:K:MIIBCjCB0wYHKoZIzj0CATCBxwIBATAkBgcqhkjOPQEBAhkA/////////////////////v//////////MEsEGP////////////////////7//////////AQYZCEFGeWcgOcPp+mrciQwSf643uzBRrmxAxUAMEWub8hCL2TtV5Uo04Eg6uEhltUEMQQYjagOsDCQ9ny/IOtDoYgA9P8K/YL/EBIHGSuV/8jaeGMQEe1rJM3Vc/l3oR55SBECGQD///////////////+Z3vg2FGvJsbTSKDECAQEDMgAEXiJuIWt1Q/CPCkuULechh37UsXPmbUANOeN5U9sOQROE4o/NEFeFEejROHYwwehF;;",
64 "DPP:I:foo\tbar;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;",
65 "DPP:C:1;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;",
66 "DPP:C:81/1a;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;",
67 "DPP:C:1/2000,81/-1;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;",
68 "DPP:C:-1/1;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADM2206avxHJaHXgLMkqa24e0rsrfMP9K1Tm8gx+ovP0I=;;" ]
69 for t in tests:
70 res = dev[0].request("DPP_QR_CODE " + t)
71 if "FAIL" not in res:
72 raise Exception("Accepted invalid QR Code: " + t)
73
74 logger.info("ID: " + str(id))
75 if id[0] == id[1] or id[0] == id[2] or id[1] == id[2]:
76 raise Exception("Duplicate ID returned")
77
78 if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_REMOVE 12345678"):
79 raise Exception("DPP_BOOTSTRAP_REMOVE accepted unexpectedly")
80 if "OK" not in dev[0].request("DPP_BOOTSTRAP_REMOVE %d" % id[1]):
81 raise Exception("DPP_BOOTSTRAP_REMOVE failed")
82
83 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode")
84 if "FAIL" in res:
85 raise Exception("Failed to generate bootstrapping info")
86 uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % int(res))
87 logger.info("Generated URI: " + uri)
88
89 res = dev[0].request("DPP_QR_CODE " + uri)
90 if "FAIL" in res:
91 raise Exception("Failed to parse self-generated QR Code URI")
92
93 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1,115/36 mac=010203040506 info=foo")
94 if "FAIL" in res:
95 raise Exception("Failed to generate bootstrapping info")
96 uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % int(res))
97 logger.info("Generated URI: " + uri)
98
99 res = dev[0].request("DPP_QR_CODE " + uri)
100 if "FAIL" in res:
101 raise Exception("Failed to parse self-generated QR Code URI")
102
103 def test_dpp_qr_code_parsing_fail(dev, apdev):
104 """DPP QR Code parsing local failure"""
105 check_dpp_capab(dev[0])
106 with alloc_fail(dev[0], 1, "dpp_parse_uri_info"):
107 if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"):
108 raise Exception("DPP_QR_CODE failure not reported")
109
110 with alloc_fail(dev[0], 1, "dpp_parse_uri_pk"):
111 if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"):
112 raise Exception("DPP_QR_CODE failure not reported")
113
114 with fail_test(dev[0], 1, "dpp_parse_uri_pk"):
115 if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"):
116 raise Exception("DPP_QR_CODE failure not reported")
117
118 with alloc_fail(dev[0], 1, "dpp_parse_uri"):
119 if "FAIL" not in dev[0].request("DPP_QR_CODE DPP:I:SN=4774LH2b4044;M:010203040506;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA=;;"):
120 raise Exception("DPP_QR_CODE failure not reported")
121
122 dpp_key_p256 ="30570201010420777fc55dc51e967c10ec051b91d860b5f1e6c934e48d5daffef98d032c64b170a00a06082a8648ce3d030107a124032200020c804188c7f85beb6e91070d2b3e5e39b90ca77b4d3c5251bc1844d6ca29dcad"
123 dpp_key_p384 = "307402010104302f56fdd83b5345cacb630eb7c22fa5ad5daba37307c95191e2a75756d137003bd8b32dbcb00eb5650c1eb499ecfcaec0a00706052b81040022a13403320003615ec2141b5b77aebb6523f8a012755f9a34405a8398d2ceeeebca7f5ce868bf55056cba4c4ec62fad3ed26dd29e0f23"
124 dpp_key_p521 = "308198020101044200c8010d5357204c252551aaf4e210343111e503fd1dc615b257058997c49b6b643c975226e93be8181cca3d83a7072defd161dfbdf433c19abe1f2ad51867a05761a00706052b81040023a1460344000301cdf3608b1305fe34a1f976095dcf001182b9973354efe156291a66830292f9babd8f412ad462958663e7a75d1d0610abdfc3dd95d40669f7ab3bc001668cfb3b7c"
125 dpp_key_bp256 = "3058020101042057133a676fb60bf2a3e6797e19833c7b0f89dc192ab99ab5fa377ae23a157765a00b06092b2403030208010107a12403220002945d9bf7ce30c9c1ac0ff21ca62b984d5bb80ff69d2be8c9716ab39a10d2caf0"
126 dpp_key_bp384 = "307802010104304902df9f3033a9b7128554c0851dc7127c3573eed150671dae74c0013e9896a9b1c22b6f7d43d8a2ebb7cd474dc55039a00b06092b240303020801010ba13403320003623cb5e68787f351faababf3425161571560add2e6f9a306fcbffb507735bf955bb46dd20ba246b0d5cadce73e5bd6a6"
127 dpp_key_bp512 = "30819802010104405803494226eb7e50bf0e90633f37e7e35d33f5fa502165eeba721d927f9f846caf12e925701d18e123abaaaf4a7edb4fc4de21ce18bc10c4d12e8b3439f74e40a00b06092b240303020801010da144034200033b086ccd47486522d35dc16fbb2229642c2e9e87897d45abbf21f9fb52acb5a6272b31d1b227c3e53720769cc16b4cb181b26cd0d35fe463218aaedf3b6ec00a"
128
129 def test_dpp_qr_code_curves(dev, apdev):
130 """DPP QR Code and supported curves"""
131 check_dpp_capab(dev[0])
132 tests = [ ("prime256v1", dpp_key_p256),
133 ("secp384r1", dpp_key_p384),
134 ("secp521r1", dpp_key_p521) ]
135 for curve, hex in tests:
136 id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode key=" + hex)
137 if "FAIL" in id:
138 raise Exception("Failed to set key for " + curve)
139 info = dev[0].request("DPP_BOOTSTRAP_INFO " + id)
140 if "FAIL" in info:
141 raise Exception("Failed to get info for " + curve)
142 if "curve=" + curve not in info:
143 raise Exception("Curve mismatch for " + curve)
144
145 def test_dpp_qr_code_curves_brainpool(dev, apdev):
146 """DPP QR Code and supported Brainpool curves"""
147 check_dpp_capab(dev[0], brainpool=True)
148 tests = [ ("brainpoolP256r1", dpp_key_bp256),
149 ("brainpoolP384r1", dpp_key_bp384),
150 ("brainpoolP512r1", dpp_key_bp512) ]
151 for curve, hex in tests:
152 id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode key=" + hex)
153 if "FAIL" in id:
154 raise Exception("Failed to set key for " + curve)
155 info = dev[0].request("DPP_BOOTSTRAP_INFO " + id)
156 if "FAIL" in info:
157 raise Exception("Failed to get info for " + curve)
158 if "curve=" + curve not in info:
159 raise Exception("Curve mismatch for " + curve)
160
161 def test_dpp_qr_code_unsupported_curve(dev, apdev):
162 """DPP QR Code and unsupported curve"""
163 check_dpp_capab(dev[0])
164
165 id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode curve=unsupported")
166 if "FAIL" not in id:
167 raise Exception("Unsupported curve accepted")
168
169 tests = [ "30",
170 "305f02010104187f723ed9e1b41979ec5cd02eb82696efc76b40e277661049a00a06082a8648ce3d030101a134033200043f292614dea97c43f500f069e79ae9fb48f8b07369180de5eec8fa2bc9eea5af7a46dc335f52f10cb1c0e9464201d41b" ]
171 for hex in tests:
172 id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode key=" + hex)
173 if "FAIL" not in id:
174 raise Exception("Unsupported/invalid curve accepted")
175
176 def test_dpp_qr_code_keygen_fail(dev, apdev):
177 """DPP QR Code and keygen failure"""
178 check_dpp_capab(dev[0])
179
180 with alloc_fail(dev[0], 1, "dpp_bootstrap_key_der;dpp_keygen"):
181 if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode"):
182 raise Exception("Failure not reported")
183
184 with alloc_fail(dev[0], 1, "base64_gen_encode;dpp_keygen"):
185 if "FAIL" not in dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode"):
186 raise Exception("Failure not reported")
187
188 def test_dpp_qr_code_curve_select(dev, apdev):
189 """DPP QR Code and curve selection"""
190 check_dpp_capab(dev[0], brainpool=True)
191 check_dpp_capab(dev[1], brainpool=True)
192
193 addr = dev[0].own_addr().replace(':', '')
194 bi = []
195 for key in [ dpp_key_p256, dpp_key_p384, dpp_key_p521,
196 dpp_key_bp256, dpp_key_bp384, dpp_key_bp512 ]:
197 id = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr + " key=" + key)
198 if "FAIL" in id:
199 raise Exception("Failed to set key for " + curve)
200 info = dev[0].request("DPP_BOOTSTRAP_INFO " + id)
201 for i in info.splitlines():
202 if '=' in i:
203 name, val = i.split('=')
204 if name == "curve":
205 curve = val
206 break
207 uri = dev[0].request("DPP_BOOTSTRAP_GET_URI " + id)
208 bi.append((curve, uri))
209
210 for curve, uri in bi:
211 logger.info("Curve: " + curve)
212 logger.info("URI: " + uri)
213
214 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
215 raise Exception("Failed to start listen operation")
216
217 res = dev[1].request("DPP_QR_CODE " + uri)
218 if "FAIL" in res:
219 raise Exception("Failed to parse QR Code URI")
220 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=" + res):
221 raise Exception("Failed to initiate DPP Authentication")
222 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
223 if ev is None:
224 raise Exception("DPP authentication did not succeed (Responder)")
225 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
226 if ev is None:
227 raise Exception("DPP authentication did not succeed (Initiator)")
228 ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=2)
229 if ev is None:
230 raise Exception("DPP configuration result not seen (Enrollee)")
231 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=2)
232 if ev is None:
233 raise Exception("DPP configuration result not seen (Responder)")
234 dev[0].request("DPP_STOP_LISTEN")
235 dev[1].request("DPP_STOP_LISTEN")
236 dev[0].dump_monitor()
237 dev[1].dump_monitor()
238
239 def test_dpp_qr_code_auth_broadcast(dev, apdev):
240 """DPP QR Code and authentication exchange (broadcast)"""
241 check_dpp_capab(dev[0])
242 check_dpp_capab(dev[1])
243 logger.info("dev0 displays QR Code")
244 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1")
245 if "FAIL" in res:
246 raise Exception("Failed to generate bootstrapping info")
247 id0 = int(res)
248 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
249
250 logger.info("dev1 scans QR Code")
251 res = dev[1].request("DPP_QR_CODE " + uri0)
252 if "FAIL" in res:
253 raise Exception("Failed to parse QR Code URI")
254 id1 = int(res)
255
256 logger.info("dev1 initiates DPP Authentication")
257 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
258 raise Exception("Failed to start listen operation")
259 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d" % id1):
260 raise Exception("Failed to initiate DPP Authentication")
261 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
262 if ev is None:
263 raise Exception("DPP authentication did not succeed (Responder)")
264 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
265 if ev is None:
266 raise Exception("DPP authentication did not succeed (Initiator)")
267 dev[0].request("DPP_STOP_LISTEN")
268
269 def test_dpp_qr_code_auth_unicast(dev, apdev):
270 """DPP QR Code and authentication exchange (unicast)"""
271 run_dpp_qr_code_auth_unicast(dev, apdev, None)
272
273 def test_dpp_qr_code_auth_unicast_ap_enrollee(dev, apdev):
274 """DPP QR Code and authentication exchange (AP enrollee)"""
275 run_dpp_qr_code_auth_unicast(dev, apdev, None, netrole="ap")
276
277 def test_dpp_qr_code_curve_prime256v1(dev, apdev):
278 """DPP QR Code and curve prime256v1"""
279 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1")
280
281 def test_dpp_qr_code_curve_secp384r1(dev, apdev):
282 """DPP QR Code and curve secp384r1"""
283 run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1")
284
285 def test_dpp_qr_code_curve_secp521r1(dev, apdev):
286 """DPP QR Code and curve secp521r1"""
287 run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1")
288
289 def test_dpp_qr_code_curve_brainpoolP256r1(dev, apdev):
290 """DPP QR Code and curve brainpoolP256r1"""
291 run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP256r1")
292
293 def test_dpp_qr_code_curve_brainpoolP384r1(dev, apdev):
294 """DPP QR Code and curve brainpoolP384r1"""
295 run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP384r1")
296
297 def test_dpp_qr_code_curve_brainpoolP512r1(dev, apdev):
298 """DPP QR Code and curve brainpoolP512r1"""
299 run_dpp_qr_code_auth_unicast(dev, apdev, "brainpoolP512r1")
300
301 def test_dpp_qr_code_set_key(dev, apdev):
302 """DPP QR Code and fixed bootstrapping key"""
303 run_dpp_qr_code_auth_unicast(dev, apdev, None, key="30770201010420e5143ac74682cc6869a830e8f5301a5fa569130ac329b1d7dd6f2a7495dbcbe1a00a06082a8648ce3d030107a144034200045e13e167c33dbc7d85541e5509600aa8139bbb3e39e25898992c5d01be92039ee2850f17e71506ded0d6b25677441eae249f8e225c68dd15a6354dca54006383")
304
305 def run_dpp_qr_code_auth_unicast(dev, apdev, curve, netrole=None, key=None,
306 require_conf_success=False, init_extra=None,
307 require_conf_failure=False,
308 configurator=False, conf_curve=None):
309 check_dpp_capab(dev[0], curve and "brainpool" in curve)
310 check_dpp_capab(dev[1], curve and "brainpool" in curve)
311 if configurator:
312 logger.info("Create configurator on dev1")
313 cmd = "DPP_CONFIGURATOR_ADD"
314 if conf_curve:
315 cmd += " curve=" + conf_curve
316 res = dev[1].request(cmd);
317 if "FAIL" in res:
318 raise Exception("Failed to add configurator")
319 conf_id = int(res)
320
321 logger.info("dev0 displays QR Code")
322 addr = dev[0].own_addr().replace(':', '')
323 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
324 if curve:
325 cmd += " curve=" + curve
326 if key:
327 cmd += " key=" + key
328 res = dev[0].request(cmd)
329 if "FAIL" in res:
330 raise Exception("Failed to generate bootstrapping info")
331 id0 = int(res)
332 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
333
334 logger.info("dev1 scans QR Code")
335 res = dev[1].request("DPP_QR_CODE " + uri0)
336 if "FAIL" in res:
337 raise Exception("Failed to parse QR Code URI")
338 id1 = int(res)
339
340 logger.info("dev1 initiates DPP Authentication")
341 cmd = "DPP_LISTEN 2412"
342 if netrole:
343 cmd += " netrole=" + netrole
344 if "OK" not in dev[0].request(cmd):
345 raise Exception("Failed to start listen operation")
346 cmd = "DPP_AUTH_INIT peer=%d" % id1
347 if init_extra:
348 cmd += " " + init_extra
349 if configurator:
350 cmd += " configurator=%d" % conf_id
351 if "OK" not in dev[1].request(cmd):
352 raise Exception("Failed to initiate DPP Authentication")
353 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
354 if ev is None:
355 raise Exception("DPP authentication did not succeed (Responder)")
356 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
357 if ev is None:
358 raise Exception("DPP authentication did not succeed (Initiator)")
359 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
360 if ev is None:
361 raise Exception("DPP configuration not completed (Configurator)")
362 ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
363 if ev is None:
364 raise Exception("DPP configuration not completed (Enrollee)")
365 if require_conf_success:
366 if "DPP-CONF-FAILED" in ev:
367 raise Exception("DPP configuration failed")
368 if require_conf_failure:
369 if "DPP-CONF-SUCCESS" in ev:
370 raise Exception("DPP configuration succeeded unexpectedly")
371 dev[0].request("DPP_STOP_LISTEN")
372 dev[0].dump_monitor()
373 dev[1].dump_monitor()
374
375 def test_dpp_qr_code_auth_mutual(dev, apdev):
376 """DPP QR Code and authentication exchange (mutual)"""
377 check_dpp_capab(dev[0])
378 check_dpp_capab(dev[1])
379 logger.info("dev0 displays QR Code")
380 addr = dev[0].own_addr().replace(':', '')
381 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
382 if "FAIL" in res:
383 raise Exception("Failed to generate bootstrapping info")
384 id0 = int(res)
385 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
386
387 logger.info("dev1 scans QR Code")
388 res = dev[1].request("DPP_QR_CODE " + uri0)
389 if "FAIL" in res:
390 raise Exception("Failed to parse QR Code URI")
391 id1 = int(res)
392
393 logger.info("dev1 displays QR Code")
394 addr = dev[1].own_addr().replace(':', '')
395 res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
396 if "FAIL" in res:
397 raise Exception("Failed to generate bootstrapping info")
398 id1b = int(res)
399 uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
400
401 logger.info("dev0 scans QR Code")
402 res = dev[0].request("DPP_QR_CODE " + uri1b)
403 if "FAIL" in res:
404 raise Exception("Failed to parse QR Code URI")
405 id0b = int(res)
406
407 logger.info("dev1 initiates DPP Authentication")
408 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
409 raise Exception("Failed to start listen operation")
410 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
411 raise Exception("Failed to initiate DPP Authentication")
412
413 ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5)
414 if ev is None:
415 raise Exception("DPP authentication direction not indicated (Initiator)")
416 if "mutual=1" not in ev:
417 raise Exception("Mutual authentication not used")
418
419 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
420 if ev is None:
421 raise Exception("DPP authentication did not succeed (Responder)")
422 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
423 if ev is None:
424 raise Exception("DPP authentication did not succeed (Initiator)")
425 dev[0].request("DPP_STOP_LISTEN")
426
427 def test_dpp_qr_code_auth_mutual2(dev, apdev):
428 """DPP QR Code and authentication exchange (mutual2)"""
429 check_dpp_capab(dev[0])
430 check_dpp_capab(dev[1])
431 logger.info("dev0 displays QR Code")
432 addr = dev[0].own_addr().replace(':', '')
433 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
434 if "FAIL" in res:
435 raise Exception("Failed to generate bootstrapping info")
436 id0 = int(res)
437 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
438
439 logger.info("dev1 scans QR Code")
440 res = dev[1].request("DPP_QR_CODE " + uri0)
441 if "FAIL" in res:
442 raise Exception("Failed to parse QR Code URI")
443 id1 = int(res)
444
445 logger.info("dev1 displays QR Code")
446 addr = dev[1].own_addr().replace(':', '')
447 res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
448 if "FAIL" in res:
449 raise Exception("Failed to generate bootstrapping info")
450 id1b = int(res)
451 uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
452
453 logger.info("dev1 initiates DPP Authentication")
454 if "OK" not in dev[0].request("DPP_LISTEN 2412 qr=mutual"):
455 raise Exception("Failed to start listen operation")
456 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
457 raise Exception("Failed to initiate DPP Authentication")
458
459 ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5)
460 if ev is None:
461 raise Exception("Pending response not reported")
462 ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5)
463 if ev is None:
464 raise Exception("QR Code scan for mutual authentication not requested")
465
466 logger.info("dev0 scans QR Code")
467 res = dev[0].request("DPP_QR_CODE " + uri1b)
468 if "FAIL" in res:
469 raise Exception("Failed to parse QR Code URI")
470 id0b = int(res)
471
472 ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5)
473 if ev is None:
474 raise Exception("DPP authentication direction not indicated (Initiator)")
475 if "mutual=1" not in ev:
476 raise Exception("Mutual authentication not used")
477
478 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
479 if ev is None:
480 raise Exception("DPP authentication did not succeed (Responder)")
481 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
482 if ev is None:
483 raise Exception("DPP authentication did not succeed (Initiator)")
484 dev[0].request("DPP_STOP_LISTEN")
485
486 def test_dpp_qr_code_auth_mutual_p_256(dev, apdev):
487 """DPP QR Code and authentication exchange (mutual, autogen P-256)"""
488 run_dpp_qr_code_auth_mutual(dev, apdev, "P-256")
489
490 def test_dpp_qr_code_auth_mutual_p_384(dev, apdev):
491 """DPP QR Code and authentication exchange (mutual, autogen P-384)"""
492 run_dpp_qr_code_auth_mutual(dev, apdev, "P-384")
493
494 def test_dpp_qr_code_auth_mutual_p_521(dev, apdev):
495 """DPP QR Code and authentication exchange (mutual, autogen P-521)"""
496 run_dpp_qr_code_auth_mutual(dev, apdev, "P-521")
497
498 def test_dpp_qr_code_auth_mutual_bp_256(dev, apdev):
499 """DPP QR Code and authentication exchange (mutual, autogen BP-256)"""
500 run_dpp_qr_code_auth_mutual(dev, apdev, "BP-256")
501
502 def test_dpp_qr_code_auth_mutual_bp_384(dev, apdev):
503 """DPP QR Code and authentication exchange (mutual, autogen BP-384)"""
504 run_dpp_qr_code_auth_mutual(dev, apdev, "BP-384")
505
506 def test_dpp_qr_code_auth_mutual_bp_512(dev, apdev):
507 """DPP QR Code and authentication exchange (mutual, autogen BP-512)"""
508 run_dpp_qr_code_auth_mutual(dev, apdev, "BP-512")
509
510 def run_dpp_qr_code_auth_mutual(dev, apdev, curve):
511 check_dpp_capab(dev[0], curve and "BP-" in curve)
512 check_dpp_capab(dev[1], curve and "BP-" in curve)
513 logger.info("dev0 displays QR Code")
514 addr = dev[0].own_addr().replace(':', '')
515 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
516 cmd += " curve=" + curve
517 res = dev[0].request(cmd)
518 if "FAIL" in res:
519 raise Exception("Failed to generate bootstrapping info")
520 id0 = int(res)
521 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
522
523 logger.info("dev1 scans QR Code")
524 res = dev[1].request("DPP_QR_CODE " + uri0)
525 if "FAIL" in res:
526 raise Exception("Failed to parse QR Code URI")
527 id1 = int(res)
528
529 logger.info("dev1 initiates DPP Authentication")
530 if "OK" not in dev[0].request("DPP_LISTEN 2412 qr=mutual"):
531 raise Exception("Failed to start listen operation")
532 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d" % (id1)):
533 raise Exception("Failed to initiate DPP Authentication")
534
535 ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5)
536 if ev is None:
537 raise Exception("Pending response not reported")
538 uri = ev.split(' ')[1]
539
540 ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5)
541 if ev is None:
542 raise Exception("QR Code scan for mutual authentication not requested")
543
544 logger.info("dev0 scans QR Code")
545 res = dev[0].request("DPP_QR_CODE " + uri)
546 if "FAIL" in res:
547 raise Exception("Failed to parse QR Code URI")
548
549 ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5)
550 if ev is None:
551 raise Exception("DPP authentication direction not indicated (Initiator)")
552 if "mutual=1" not in ev:
553 raise Exception("Mutual authentication not used")
554
555 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
556 if ev is None:
557 raise Exception("DPP authentication did not succeed (Responder)")
558 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
559 if ev is None:
560 raise Exception("DPP authentication did not succeed (Initiator)")
561 dev[0].request("DPP_STOP_LISTEN")
562
563 def test_dpp_auth_resp_retries(dev, apdev):
564 """DPP Authentication Response retries"""
565 check_dpp_capab(dev[0])
566 check_dpp_capab(dev[1])
567 dev[0].set("dpp_resp_max_tries", "3")
568 dev[0].set("dpp_resp_retry_time", "100")
569
570 logger.info("dev0 displays QR Code")
571 addr = dev[0].own_addr().replace(':', '')
572 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
573 if "FAIL" in res:
574 raise Exception("Failed to generate bootstrapping info")
575 id0 = int(res)
576 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
577
578 logger.info("dev1 scans QR Code")
579 res = dev[1].request("DPP_QR_CODE " + uri0)
580 if "FAIL" in res:
581 raise Exception("Failed to parse QR Code URI")
582 id1 = int(res)
583
584 logger.info("dev1 displays QR Code")
585 addr = dev[1].own_addr().replace(':', '')
586 res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
587 if "FAIL" in res:
588 raise Exception("Failed to generate bootstrapping info")
589 id1b = int(res)
590 uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
591
592 logger.info("dev1 initiates DPP Authentication")
593 if "OK" not in dev[0].request("DPP_LISTEN 2412 qr=mutual"):
594 raise Exception("Failed to start listen operation")
595 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
596 raise Exception("Failed to initiate DPP Authentication")
597
598 ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5)
599 if ev is None:
600 raise Exception("Pending response not reported")
601 ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5)
602 if ev is None:
603 raise Exception("QR Code scan for mutual authentication not requested")
604
605 # Stop Initiator from listening to frames to force retransmission of the
606 # DPP Authentication Response frame with Status=0
607 dev[1].request("DPP_STOP_LISTEN")
608
609 dev[1].dump_monitor()
610 dev[0].dump_monitor()
611
612 logger.info("dev0 scans QR Code")
613 res = dev[0].request("DPP_QR_CODE " + uri1b)
614 if "FAIL" in res:
615 raise Exception("Failed to parse QR Code URI")
616 id0b = int(res)
617
618 ev = dev[0].wait_event(["DPP-TX"], timeout=5)
619 if ev is None or "type=1" not in ev:
620 raise Exception("DPP Authentication Response not sent")
621 ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=5)
622 if ev is None:
623 raise Exception("TX status for DPP Authentication Response not reported")
624 if "result=no-ACK" not in ev:
625 raise Exception("Unexpected TX status for Authentication Response: " + ev)
626
627 ev = dev[0].wait_event(["DPP-TX"], timeout=15)
628 if ev is None or "type=1" not in ev:
629 raise Exception("DPP Authentication Response retransmission not sent")
630
631 def test_dpp_qr_code_auth_mutual_not_used(dev, apdev):
632 """DPP QR Code and authentication exchange (mutual not used)"""
633 check_dpp_capab(dev[0])
634 check_dpp_capab(dev[1])
635 logger.info("dev0 displays QR Code")
636 addr = dev[0].own_addr().replace(':', '')
637 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
638 if "FAIL" in res:
639 raise Exception("Failed to generate bootstrapping info")
640 id0 = int(res)
641 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
642
643 logger.info("dev1 scans QR Code")
644 res = dev[1].request("DPP_QR_CODE " + uri0)
645 if "FAIL" in res:
646 raise Exception("Failed to parse QR Code URI")
647 id1 = int(res)
648
649 logger.info("dev1 displays QR Code")
650 addr = dev[1].own_addr().replace(':', '')
651 res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
652 if "FAIL" in res:
653 raise Exception("Failed to generate bootstrapping info")
654 id1b = int(res)
655 uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
656
657 logger.info("dev0 does not scan QR Code")
658
659 logger.info("dev1 initiates DPP Authentication")
660 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
661 raise Exception("Failed to start listen operation")
662 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b)):
663 raise Exception("Failed to initiate DPP Authentication")
664
665 ev = dev[1].wait_event(["DPP-AUTH-DIRECTION"], timeout=5)
666 if ev is None:
667 raise Exception("DPP authentication direction not indicated (Initiator)")
668 if "mutual=0" not in ev:
669 raise Exception("Mutual authentication not used")
670
671 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
672 if ev is None:
673 raise Exception("DPP authentication did not succeed (Responder)")
674 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
675 if ev is None:
676 raise Exception("DPP authentication did not succeed (Initiator)")
677 dev[0].request("DPP_STOP_LISTEN")
678
679 def test_dpp_qr_code_auth_mutual_curve_mismatch(dev, apdev):
680 """DPP QR Code and authentication exchange (mutual/mismatch)"""
681 check_dpp_capab(dev[0])
682 check_dpp_capab(dev[1])
683 logger.info("dev0 displays QR Code")
684 addr = dev[0].own_addr().replace(':', '')
685 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
686 if "FAIL" in res:
687 raise Exception("Failed to generate bootstrapping info")
688 id0 = int(res)
689 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
690
691 logger.info("dev1 scans QR Code")
692 res = dev[1].request("DPP_QR_CODE " + uri0)
693 if "FAIL" in res:
694 raise Exception("Failed to parse QR Code URI")
695 id1 = int(res)
696
697 logger.info("dev1 displays QR Code")
698 addr = dev[1].own_addr().replace(':', '')
699 res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr + " curve=secp384r1")
700 if "FAIL" in res:
701 raise Exception("Failed to generate bootstrapping info")
702 id1b = int(res)
703 uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
704
705 logger.info("dev0 scans QR Code")
706 res = dev[0].request("DPP_QR_CODE " + uri1b)
707 if "FAIL" in res:
708 raise Exception("Failed to parse QR Code URI")
709 id0b = int(res)
710
711 res = dev[1].request("DPP_AUTH_INIT peer=%d own=%d" % (id1, id1b))
712 if "FAIL" not in res:
713 raise Exception("DPP_AUTH_INIT accepted unexpectedly")
714
715 def test_dpp_qr_code_auth_hostapd_mutual2(dev, apdev):
716 """DPP QR Code and authentication exchange (hostapd mutual2)"""
717 check_dpp_capab(dev[0])
718 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
719 check_dpp_capab(hapd)
720
721 logger.info("AP displays QR Code")
722 addr = hapd.own_addr().replace(':', '')
723 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
724 res = hapd.request(cmd)
725 if "FAIL" in res:
726 raise Exception("Failed to generate bootstrapping info")
727 id_h = int(res)
728 uri_h = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
729
730 logger.info("dev0 scans QR Code")
731 res = dev[0].request("DPP_QR_CODE " + uri_h)
732 if "FAIL" in res:
733 raise Exception("Failed to parse QR Code URI")
734 id0 = int(res)
735
736 logger.info("dev0 displays QR Code")
737 addr = dev[0].own_addr().replace(':', '')
738 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
739 if "FAIL" in res:
740 raise Exception("Failed to generate bootstrapping info")
741 id0b = int(res)
742 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0b)
743
744 logger.info("dev0 initiates DPP Authentication")
745 if "OK" not in hapd.request("DPP_LISTEN 2412 qr=mutual"):
746 raise Exception("Failed to start listen operation")
747 if "OK" not in dev[0].request("DPP_AUTH_INIT peer=%d own=%d" % (id0, id0b)):
748 raise Exception("Failed to initiate DPP Authentication")
749
750 ev = dev[0].wait_event(["DPP-RESPONSE-PENDING"], timeout=5)
751 if ev is None:
752 raise Exception("Pending response not reported")
753 ev = hapd.wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5)
754 if ev is None:
755 raise Exception("QR Code scan for mutual authentication not requested")
756
757 logger.info("AP scans QR Code")
758 res = hapd.request("DPP_QR_CODE " + uri0)
759 if "FAIL" in res:
760 raise Exception("Failed to parse QR Code URI")
761
762 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
763 if ev is None:
764 raise Exception("DPP authentication did not succeed (Responder)")
765 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
766 if ev is None:
767 raise Exception("DPP authentication did not succeed (Initiator)")
768 hapd.request("DPP_STOP_LISTEN")
769
770 def test_dpp_qr_code_listen_continue(dev, apdev):
771 """DPP QR Code and listen operation needing continuation"""
772 check_dpp_capab(dev[0])
773 check_dpp_capab(dev[1])
774 logger.info("dev0 displays QR Code")
775 addr = dev[0].own_addr().replace(':', '')
776 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
777 if "FAIL" in res:
778 raise Exception("Failed to generate bootstrapping info")
779 id0 = int(res)
780 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
781
782 logger.info("dev1 scans QR Code")
783 res = dev[1].request("DPP_QR_CODE " + uri0)
784 if "FAIL" in res:
785 raise Exception("Failed to parse QR Code URI")
786 id1 = int(res)
787
788 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
789 raise Exception("Failed to start listen operation")
790 logger.info("Wait for listen to expire and get restarted")
791 time.sleep(5.5)
792 logger.info("dev1 initiates DPP Authentication")
793 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d" % id1):
794 raise Exception("Failed to initiate DPP Authentication")
795 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
796 if ev is None:
797 raise Exception("DPP authentication did not succeed (Responder)")
798 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
799 if ev is None:
800 raise Exception("DPP authentication did not succeed (Initiator)")
801 dev[0].request("DPP_STOP_LISTEN")
802
803 def test_dpp_qr_code_auth_initiator_enrollee(dev, apdev):
804 """DPP QR Code and authentication exchange (Initiator in Enrollee role)"""
805 check_dpp_capab(dev[0])
806 check_dpp_capab(dev[1])
807 dev[0].request("SET gas_address3 1")
808 dev[1].request("SET gas_address3 1")
809 logger.info("dev0 displays QR Code")
810 addr = dev[0].own_addr().replace(':', '')
811 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
812 if "FAIL" in res:
813 raise Exception("Failed to generate bootstrapping info")
814 id0 = int(res)
815 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
816
817 logger.info("dev1 scans QR Code")
818 res = dev[1].request("DPP_QR_CODE " + uri0)
819 if "FAIL" in res:
820 raise Exception("Failed to parse QR Code URI")
821 id1 = int(res)
822
823 logger.info("dev1 initiates DPP Authentication")
824 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
825 raise Exception("Failed to start listen operation")
826 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=enrollee" % id1):
827 raise Exception("Failed to initiate DPP Authentication")
828 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
829 if ev is None:
830 raise Exception("DPP authentication did not succeed (Responder)")
831 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
832 if ev is None:
833 raise Exception("DPP authentication did not succeed (Initiator)")
834
835 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
836 if ev is None:
837 raise Exception("DPP configuration did not succeed (Configurator)")
838 ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=5)
839 if ev is None:
840 raise Exception("DPP configuration did not succeed (Enrollee)")
841
842 dev[0].request("DPP_STOP_LISTEN")
843
844 def test_dpp_qr_code_auth_initiator_either_1(dev, apdev):
845 """DPP QR Code and authentication exchange (Initiator in either role)"""
846 run_dpp_qr_code_auth_initiator_either(dev, apdev, None, dev[1], dev[0])
847
848 def test_dpp_qr_code_auth_initiator_either_2(dev, apdev):
849 """DPP QR Code and authentication exchange (Initiator in either role)"""
850 run_dpp_qr_code_auth_initiator_either(dev, apdev, "enrollee",
851 dev[1], dev[0])
852
853 def test_dpp_qr_code_auth_initiator_either_3(dev, apdev):
854 """DPP QR Code and authentication exchange (Initiator in either role)"""
855 run_dpp_qr_code_auth_initiator_either(dev, apdev, "configurator",
856 dev[0], dev[1])
857
858 def run_dpp_qr_code_auth_initiator_either(dev, apdev, resp_role,
859 conf_dev, enrollee_dev):
860 check_dpp_capab(dev[0])
861 check_dpp_capab(dev[1])
862 logger.info("dev0 displays QR Code")
863 addr = dev[0].own_addr().replace(':', '')
864 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
865 if "FAIL" in res:
866 raise Exception("Failed to generate bootstrapping info")
867 id0 = int(res)
868 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
869
870 logger.info("dev1 scans QR Code")
871 res = dev[1].request("DPP_QR_CODE " + uri0)
872 if "FAIL" in res:
873 raise Exception("Failed to parse QR Code URI")
874 id1 = int(res)
875
876 logger.info("dev1 initiates DPP Authentication")
877 cmd = "DPP_LISTEN 2412"
878 if resp_role:
879 cmd += " role=" + resp_role
880 if "OK" not in dev[0].request(cmd):
881 raise Exception("Failed to start listen operation")
882 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=either" % id1):
883 raise Exception("Failed to initiate DPP Authentication")
884 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
885 if ev is None:
886 raise Exception("DPP authentication did not succeed (Responder)")
887 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
888 if ev is None:
889 raise Exception("DPP authentication did not succeed (Initiator)")
890
891 ev = conf_dev.wait_event(["DPP-CONF-SENT"], timeout=5)
892 if ev is None:
893 raise Exception("DPP configuration did not succeed (Configurator)")
894 ev = enrollee_dev.wait_event(["DPP-CONF-FAILED"], timeout=5)
895 if ev is None:
896 raise Exception("DPP configuration did not succeed (Enrollee)")
897
898 dev[0].request("DPP_STOP_LISTEN")
899
900 def run_init_incompatible_roles(dev, role="enrollee"):
901 check_dpp_capab(dev[0])
902 check_dpp_capab(dev[1])
903 logger.info("dev0 displays QR Code")
904 addr = dev[0].own_addr().replace(':', '')
905 res = dev[0].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
906 if "FAIL" in res:
907 raise Exception("Failed to generate bootstrapping info")
908 id0 = int(res)
909 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
910
911 logger.info("dev1 scans QR Code")
912 res = dev[1].request("DPP_QR_CODE " + uri0)
913 if "FAIL" in res:
914 raise Exception("Failed to parse QR Code URI")
915 id1 = int(res)
916
917 logger.info("dev1 initiates DPP Authentication")
918 if "OK" not in dev[0].request("DPP_LISTEN 2412 role=%s" % role):
919 raise Exception("Failed to start listen operation")
920 return id1
921
922 def test_dpp_qr_code_auth_incompatible_roles(dev, apdev):
923 """DPP QR Code and authentication exchange (incompatible roles)"""
924 id1 = run_init_incompatible_roles(dev)
925 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=enrollee" % id1):
926 raise Exception("Failed to initiate DPP Authentication")
927 ev = dev[1].wait_event(["DPP-NOT-COMPATIBLE"], timeout=5)
928 if ev is None:
929 raise Exception("DPP-NOT-COMPATIBLE event on initiator timed out")
930 ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1)
931 if ev is None:
932 raise Exception("DPP-NOT-COMPATIBLE event on responder timed out")
933
934 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=configurator" % id1):
935 raise Exception("Failed to initiate DPP Authentication")
936 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
937 if ev is None:
938 raise Exception("DPP authentication did not succeed (Responder)")
939 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
940 if ev is None:
941 raise Exception("DPP authentication did not succeed (Initiator)")
942 dev[0].request("DPP_STOP_LISTEN")
943
944 def test_dpp_qr_code_auth_incompatible_roles2(dev, apdev):
945 """DPP QR Code and authentication exchange (incompatible roles 2)"""
946 id1 = run_init_incompatible_roles(dev, role="configurator")
947 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=configurator" % id1):
948 raise Exception("Failed to initiate DPP Authentication")
949 ev = dev[1].wait_event(["DPP-NOT-COMPATIBLE"], timeout=5)
950 if ev is None:
951 raise Exception("DPP-NOT-COMPATIBLE event on initiator timed out")
952 ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1)
953 if ev is None:
954 raise Exception("DPP-NOT-COMPATIBLE event on responder timed out")
955
956 def test_dpp_qr_code_auth_incompatible_roles_failure(dev, apdev):
957 """DPP QR Code and authentication exchange (incompatible roles failure)"""
958 id1 = run_init_incompatible_roles(dev, role="configurator")
959 with alloc_fail(dev[0], 1, "dpp_auth_build_resp_status"):
960 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=configurator" % id1):
961 raise Exception("Failed to initiate DPP Authentication")
962 ev = dev[0].wait_event(["DPP-NOT-COMPATIBLE"], timeout=1)
963 if ev is None:
964 raise Exception("DPP-NOT-COMPATIBLE event on responder timed out")
965
966 def test_dpp_qr_code_auth_incompatible_roles_failure2(dev, apdev):
967 """DPP QR Code and authentication exchange (incompatible roles failure 2)"""
968 id1 = run_init_incompatible_roles(dev, role="configurator")
969 with alloc_fail(dev[1], 1, "dpp_auth_resp_rx_status"):
970 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=configurator" % id1):
971 raise Exception("Failed to initiate DPP Authentication")
972 wait_fail_trigger(dev[1], "GET_ALLOC_FAIL")
973
974 def test_dpp_qr_code_auth_incompatible_roles_failure3(dev, apdev):
975 """DPP QR Code and authentication exchange (incompatible roles failure 3)"""
976 id1 = run_init_incompatible_roles(dev, role="configurator")
977 with fail_test(dev[1], 1, "dpp_auth_resp_rx_status"):
978 if "OK" not in dev[1].request("DPP_AUTH_INIT peer=%d role=configurator" % id1):
979 raise Exception("Failed to initiate DPP Authentication")
980 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
981 if ev is None or "AES-SIV decryption failed" not in ev:
982 raise Exception("AES-SIV decryption failure not reported")
983
984 def test_dpp_qr_code_auth_neg_chan(dev, apdev):
985 """DPP QR Code and authentication exchange with requested different channel"""
986 check_dpp_capab(dev[0])
987 check_dpp_capab(dev[1])
988
989 logger.info("Create configurator on dev1")
990 cmd = "DPP_CONFIGURATOR_ADD"
991 res = dev[1].request(cmd);
992 if "FAIL" in res:
993 raise Exception("Failed to add configurator")
994 conf_id = int(res)
995
996 logger.info("dev0 displays QR Code")
997 addr = dev[0].own_addr().replace(':', '')
998 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
999 res = dev[0].request(cmd)
1000 if "FAIL" in res:
1001 raise Exception("Failed to generate bootstrapping info")
1002 id0 = int(res)
1003 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
1004
1005 logger.info("dev1 scans QR Code")
1006 res = dev[1].request("DPP_QR_CODE " + uri0)
1007 if "FAIL" in res:
1008 raise Exception("Failed to parse QR Code URI")
1009 id1 = int(res)
1010
1011 logger.info("dev1 initiates DPP Authentication")
1012 cmd = "DPP_LISTEN 2412"
1013 if "OK" not in dev[0].request(cmd):
1014 raise Exception("Failed to start listen operation")
1015 cmd = "DPP_AUTH_INIT peer=%d configurator=%d conf=sta-dpp neg_freq=2462" % (id1, conf_id)
1016 if "OK" not in dev[1].request(cmd):
1017 raise Exception("Failed to initiate DPP Authentication")
1018
1019 ev = dev[1].wait_event(["DPP-TX"], timeout=5)
1020 if ev is None:
1021 raise Exception("DPP Authentication Request not sent")
1022 if "freq=2412 type=0" not in ev:
1023 raise Exception("Unexpected TX data for Authentication Request: " + ev)
1024
1025 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
1026 if ev is None:
1027 raise Exception("DPP Authentication Request not received")
1028 if "freq=2412 type=0" not in ev:
1029 raise Exception("Unexpected RX data for Authentication Request: " + ev)
1030
1031 ev = dev[1].wait_event(["DPP-TX-STATUS"], timeout=5)
1032 if ev is None:
1033 raise Exception("TX status for DPP Authentication Request not reported")
1034 if "freq=2412 result=SUCCESS" not in ev:
1035 raise Exception("Unexpected TX status for Authentication Request: " + ev)
1036
1037 ev = dev[0].wait_event(["DPP-TX"], timeout=5)
1038 if ev is None:
1039 raise Exception("DPP Authentication Response not sent")
1040 if "freq=2462 type=1" not in ev:
1041 raise Exception("Unexpected TX data for Authentication Response: " + ev)
1042
1043 ev = dev[1].wait_event(["DPP-RX"], timeout=5)
1044 if ev is None:
1045 raise Exception("DPP Authentication Response not received")
1046 if "freq=2462 type=1" not in ev:
1047 raise Exception("Unexpected RX data for Authentication Response: " + ev)
1048
1049 ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=5)
1050 if ev is None:
1051 raise Exception("TX status for DPP Authentication Response not reported")
1052 if "freq=2462 result=SUCCESS" not in ev:
1053 raise Exception("Unexpected TX status for Authentication Response: " + ev)
1054
1055 ev = dev[1].wait_event(["DPP-TX"], timeout=5)
1056 if ev is None:
1057 raise Exception("DPP Authentication Confirm not sent")
1058 if "freq=2462 type=2" not in ev:
1059 raise Exception("Unexpected TX data for Authentication Confirm: " + ev)
1060
1061 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
1062 if ev is None:
1063 raise Exception("DPP Authentication Confirm not received")
1064 if "freq=2462 type=2" not in ev:
1065 raise Exception("Unexpected RX data for Authentication Confirm: " + ev)
1066
1067 ev = dev[1].wait_event(["DPP-TX-STATUS"], timeout=5)
1068 if ev is None:
1069 raise Exception("TX status for DPP Authentication Confirm not reported")
1070 if "freq=2462 result=SUCCESS" not in ev:
1071 raise Exception("Unexpected TX status for Authentication Confirm: " + ev)
1072
1073 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
1074 if ev is None:
1075 raise Exception("DPP authentication did not succeed (Responder)")
1076 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
1077 if ev is None:
1078 raise Exception("DPP authentication did not succeed (Initiator)")
1079 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
1080 if ev is None:
1081 raise Exception("DPP configuration not completed (Configurator)")
1082 ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
1083 if ev is None:
1084 raise Exception("DPP configuration not completed (Enrollee)")
1085 if "DPP-CONF-FAILED" in ev:
1086 raise Exception("DPP configuration failed")
1087 dev[0].request("DPP_STOP_LISTEN")
1088 dev[0].dump_monitor()
1089 dev[1].dump_monitor()
1090
1091 def test_dpp_config_legacy(dev, apdev):
1092 """DPP Config Object for legacy network using passphrase"""
1093 check_dpp_capab(dev[1])
1094 conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}'
1095 dev[1].set("dpp_config_obj_override", conf)
1096 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1097 require_conf_success=True)
1098
1099 def test_dpp_config_legacy_psk_hex(dev, apdev):
1100 """DPP Config Object for legacy network using PSK"""
1101 check_dpp_capab(dev[1])
1102 conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"' + 32*"12" + '"}}'
1103 dev[1].set("dpp_config_obj_override", conf)
1104 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1105 require_conf_success=True)
1106
1107 def test_dpp_config_fragmentation(dev, apdev):
1108 """DPP Config Object for legacy network requiring fragmentation"""
1109 check_dpp_capab(dev[1])
1110 conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' '
1111 dev[1].set("dpp_config_obj_override", conf)
1112 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1113 require_conf_success=True)
1114
1115 def test_dpp_config_legacy_gen(dev, apdev):
1116 """Generate DPP Config Object for legacy network"""
1117 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1118 init_extra="conf=sta-psk pass=%s" % "passphrase".encode("hex"),
1119 require_conf_success=True)
1120
1121 def test_dpp_config_legacy_gen_psk(dev, apdev):
1122 """Generate DPP Config Object for legacy network (PSK)"""
1123 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1124 init_extra="conf=sta-psk psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef",
1125 require_conf_success=True)
1126
1127 def test_dpp_config_dpp_gen_prime256v1(dev, apdev):
1128 """Generate DPP Config Object for DPP network (P-256)"""
1129 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1130 init_extra="conf=sta-dpp",
1131 require_conf_success=True,
1132 configurator=True)
1133
1134 def test_dpp_config_dpp_gen_secp384r1(dev, apdev):
1135 """Generate DPP Config Object for DPP network (P-384)"""
1136 run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
1137 init_extra="conf=sta-dpp",
1138 require_conf_success=True,
1139 configurator=True)
1140
1141 def test_dpp_config_dpp_gen_secp521r1(dev, apdev):
1142 """Generate DPP Config Object for DPP network (P-521)"""
1143 run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
1144 init_extra="conf=sta-dpp",
1145 require_conf_success=True,
1146 configurator=True)
1147
1148 def test_dpp_config_dpp_gen_prime256v1_prime256v1(dev, apdev):
1149 """Generate DPP Config Object for DPP network (P-256 + P-256)"""
1150 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1151 init_extra="conf=sta-dpp",
1152 require_conf_success=True,
1153 configurator=True,
1154 conf_curve="prime256v1")
1155
1156 def test_dpp_config_dpp_gen_prime256v1_secp384r1(dev, apdev):
1157 """Generate DPP Config Object for DPP network (P-256 + P-384)"""
1158 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1159 init_extra="conf=sta-dpp",
1160 require_conf_success=True,
1161 configurator=True,
1162 conf_curve="secp384r1")
1163
1164 def test_dpp_config_dpp_gen_prime256v1_secp521r1(dev, apdev):
1165 """Generate DPP Config Object for DPP network (P-256 + P-521)"""
1166 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1167 init_extra="conf=sta-dpp",
1168 require_conf_success=True,
1169 configurator=True,
1170 conf_curve="secp521r1")
1171
1172 def test_dpp_config_dpp_gen_secp384r1_prime256v1(dev, apdev):
1173 """Generate DPP Config Object for DPP network (P-384 + P-256)"""
1174 run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
1175 init_extra="conf=sta-dpp",
1176 require_conf_success=True,
1177 configurator=True,
1178 conf_curve="prime256v1")
1179
1180 def test_dpp_config_dpp_gen_secp384r1_secp384r1(dev, apdev):
1181 """Generate DPP Config Object for DPP network (P-384 + P-384)"""
1182 run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
1183 init_extra="conf=sta-dpp",
1184 require_conf_success=True,
1185 configurator=True,
1186 conf_curve="secp384r1")
1187
1188 def test_dpp_config_dpp_gen_secp384r1_secp521r1(dev, apdev):
1189 """Generate DPP Config Object for DPP network (P-384 + P-521)"""
1190 run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
1191 init_extra="conf=sta-dpp",
1192 require_conf_success=True,
1193 configurator=True,
1194 conf_curve="secp521r1")
1195
1196 def test_dpp_config_dpp_gen_secp521r1_prime256v1(dev, apdev):
1197 """Generate DPP Config Object for DPP network (P-521 + P-256)"""
1198 run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
1199 init_extra="conf=sta-dpp",
1200 require_conf_success=True,
1201 configurator=True,
1202 conf_curve="prime256v1")
1203
1204 def test_dpp_config_dpp_gen_secp521r1_secp384r1(dev, apdev):
1205 """Generate DPP Config Object for DPP network (P-521 + P-384)"""
1206 run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
1207 init_extra="conf=sta-dpp",
1208 require_conf_success=True,
1209 configurator=True,
1210 conf_curve="secp384r1")
1211
1212 def test_dpp_config_dpp_gen_secp521r1_secp521r1(dev, apdev):
1213 """Generate DPP Config Object for DPP network (P-521 + P-521)"""
1214 run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
1215 init_extra="conf=sta-dpp",
1216 require_conf_success=True,
1217 configurator=True,
1218 conf_curve="secp521r1")
1219
1220 def test_dpp_config_dpp_gen_expiry(dev, apdev):
1221 """Generate DPP Config Object for DPP network with expiry value"""
1222 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1223 init_extra="conf=sta-dpp expiry=%d" % (time.time() + 1000),
1224 require_conf_success=True,
1225 configurator=True)
1226
1227 def test_dpp_config_dpp_gen_expired_key(dev, apdev):
1228 """Generate DPP Config Object for DPP network with expiry value"""
1229 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1230 init_extra="conf=sta-dpp expiry=%d" % (time.time() - 10),
1231 require_conf_failure=True,
1232 configurator=True)
1233
1234 def test_dpp_config_dpp_override_prime256v1(dev, apdev):
1235 """DPP Config Object override (P-256)"""
1236 check_dpp_capab(dev[0])
1237 check_dpp_capab(dev[1])
1238 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiYVRGNEpFR0lQS1NaMFh2OXpkQ01qbS10bjVYcE1zWUlWWjl3eVNBejFnSSIsInkiOiJRR2NIV0FfNnJiVTlYRFhBenRvWC1NNVEzc3VUbk1hcUVoVUx0bjdTU1h3In19._sm6YswxMf6hJLVTyYoU1uYUeY2VVkUNjrzjSiEhY42StD_RWowStEE-9CRsdCvLmsTptZ72_g40vTFwdId20A","csign":{"kty":"EC","crv":"P-256","x":"W4-Y5N1Pkos3UWb9A5qme0KUYRtY3CVUpekx_MapZ9s","y":"Et-M4NSF4NGjvh2VCh4B1sJ9eSCZ4RNzP2DBdP137VE","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU"}}}'
1239 dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
1240 dev[1].set("dpp_config_obj_override", conf)
1241 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1242 require_conf_success=True)
1243
1244 def test_dpp_config_dpp_override_secp384r1(dev, apdev):
1245 """DPP Config Object override (P-384)"""
1246 check_dpp_capab(dev[0])
1247 check_dpp_capab(dev[1])
1248 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJabi1iMndjbjRLM2pGQklkYmhGZkpVTHJTXzdESS0yMWxFQi02R3gxNjl3IiwiYWxnIjoiRVMzODQifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0zODQiLCJ4IjoickdrSGg1UUZsOUtfWjdqYUZkVVhmbThoY1RTRjM1b25Xb1NIRXVsbVNzWW9oX1RXZGpoRjhiVGdiS0ZRN2tBViIsInkiOiJBbU1QVDA5VmFENWpGdzMwTUFKQlp2VkZXeGNlVVlKLXR5blQ0bVJ5N0xOZWxhZ0dEWHpfOExaRlpOU2FaNUdLIn19.Yn_F7m-bbOQ5PlaYQJ9-1qsuqYQ6V-rAv8nWw1COKiCYwwbt3WFBJ8DljY0dPrlg5CHJC4saXwkytpI-CpELW1yUdzYb4Lrun07d20Eo_g10ICyOl5sqQCAUElKMe_Xr","csign":{"kty":"EC","crv":"P-384","x":"dmTyXXiPV2Y8a01fujL-jo08gvzyby23XmzOtzjAiujKQZZgPJsbhfEKrZDlc6ey","y":"H5Z0av5c7bqInxYb2_OOJdNiMhVf3zlcULR0516ZZitOY4U31KhL4wl4KGV7g2XW","kid":"Zn-b2wcn4K3jFBIdbhFfJULrS_7DI-21lEB-6Gx169w"}}}'
1249 dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
1250 dev[1].set("dpp_config_obj_override", conf)
1251 run_dpp_qr_code_auth_unicast(dev, apdev, "secp384r1",
1252 require_conf_success=True)
1253
1254 def test_dpp_config_dpp_override_secp521r1(dev, apdev):
1255 """DPP Config Object override (P-521)"""
1256 check_dpp_capab(dev[0])
1257 check_dpp_capab(dev[1])
1258 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"dpp","signedConnector":"eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJMZkhKY3hnV2ZKcG1uS2IwenZRT0F2VDB2b0ZKc0JjZnBmYzgxY3Y5ZXFnIiwiYWxnIjoiRVM1MTIifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC01MjEiLCJ4IjoiQVJlUFBrMFNISkRRR2NWbnlmM3lfbTlaQllHNjFJeElIbDN1NkdwRHVhMkU1WVd4TE1BSUtMMnZuUGtlSGFVRXljRmZaZlpYZ2JlNkViUUxMVkRVUm1VUSIsInkiOiJBWUtaYlNwUkFFNjJVYm9YZ2c1ZWRBVENzbEpzTlpwcm9RR1dUcW9Md04weXkzQkVoT3ZRZmZrOWhaR2lKZ295TzFobXFRRVRrS0pXb2tIYTBCQUpLSGZtIn19.ACEZLyPk13cM_OFScpLoCElQ2t1sxq5z2d_W_3_QslTQQe5SFiH_o8ycL4632YLAH4RV0gZcMKKRMtZdHgBYHjkzASDqgY-_aYN2SBmpfl8hw0YdDlUJWX3DJf-ofqNAlTbnGmhpSg69cEAhFn41Xgvx2MdwYcPVncxxESVOtWl5zNLK","csign":{"kty":"EC","crv":"P-521","x":"ADiOI_YJOAipEXHB-SpGl4KqokX8m8h3BVYCc8dgiwssZ061-nIIY3O1SIO6Re4Jjfy53RPgzDG6jitOgOGLtzZs","y":"AZKggKaQi0ExutSpJAU3-lqDV03sBQLA9C7KabfWoAn8qD6Vk4jU0WAJdt-wBBTF9o1nVuiqS2OxMVYrxN4lOz79","kid":"LfHJcxgWfJpmnKb0zvQOAvT0voFJsBcfpfc81cv9eqg"}}}'
1259 dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
1260 dev[1].set("dpp_config_obj_override", conf)
1261 run_dpp_qr_code_auth_unicast(dev, apdev, "secp521r1",
1262 require_conf_success=True)
1263
1264 def test_dpp_config_override_objects(dev, apdev):
1265 """Generate DPP Config Object and override objects)"""
1266 check_dpp_capab(dev[1])
1267 discovery = '{\n"ssid":"mywifi"\n}'
1268 groups = '[\n {"groupId":"home","netRole":"sta"},\n {"groupId":"cottage","netRole":"sta"}\n]'
1269 dev[1].set("dpp_discovery_override", discovery)
1270 dev[1].set("dpp_groups_override", groups)
1271 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1272 init_extra="conf=sta-dpp",
1273 require_conf_success=True,
1274 configurator=True)
1275
1276 def build_conf_obj(kty="EC", crv="P-256",
1277 x="W4-Y5N1Pkos3UWb9A5qme0KUYRtY3CVUpekx_MapZ9s",
1278 y="Et-M4NSF4NGjvh2VCh4B1sJ9eSCZ4RNzP2DBdP137VE",
1279 kid="TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU",
1280 prot_hdr='{"typ":"dppCon","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"ES256"}',
1281 signed_connector=None,
1282 no_signed_connector=False,
1283 csign=True):
1284 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{'
1285 conf += '"akm":"dpp",'
1286
1287 if signed_connector:
1288 conn = signed_connector
1289 conf += '"signedConnector":"%s",' % conn
1290 elif not no_signed_connector:
1291 payload = '{"groups":[{"groupId":"*","netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}'
1292 sign = "_sm6YswxMf6hJLVTyYoU1uYUeY2VVkUNjrzjSiEhY42StD_RWowStEE-9CRsdCvLmsTptZ72_g40vTFwdId20A"
1293 conn = base64.urlsafe_b64encode(prot_hdr).rstrip('=') + '.'
1294 conn += base64.urlsafe_b64encode(payload).rstrip('=') + '.'
1295 conn += sign
1296 conf += '"signedConnector":"%s",' % conn
1297
1298 if csign:
1299 conf += '"csign":{'
1300 if kty:
1301 conf += '"kty":"%s",' % kty
1302 if crv:
1303 conf += '"crv":"%s",' % crv
1304 if x:
1305 conf += '"x":"%s",' % x
1306 if y:
1307 conf += '"y":"%s",' % y
1308 if kid:
1309 conf += '"kid":"%s"' % kid
1310 conf = conf.rstrip(',')
1311 conf += '}'
1312 else:
1313 conf = conf.rstrip(',')
1314
1315 conf += '}}'
1316
1317 return conf
1318
1319 def run_dpp_config_error(dev, apdev, conf,
1320 skip_net_access_key_mismatch=True):
1321 check_dpp_capab(dev[0])
1322 check_dpp_capab(dev[1])
1323 if skip_net_access_key_mismatch:
1324 dev[0].set("dpp_ignore_netaccesskey_mismatch", "1")
1325 dev[1].set("dpp_config_obj_override", conf)
1326 run_dpp_qr_code_auth_unicast(dev, apdev, "prime256v1",
1327 require_conf_failure=True)
1328
1329 def test_dpp_config_jwk_error_no_kty(dev, apdev):
1330 """DPP Config Object JWK error - no kty"""
1331 run_dpp_config_error(dev, apdev, build_conf_obj(kty=None))
1332
1333 def test_dpp_config_jwk_error_unexpected_kty(dev, apdev):
1334 """DPP Config Object JWK error - unexpected kty"""
1335 run_dpp_config_error(dev, apdev, build_conf_obj(kty="unknown"))
1336
1337 def test_dpp_config_jwk_error_no_crv(dev, apdev):
1338 """DPP Config Object JWK error - no crv"""
1339 run_dpp_config_error(dev, apdev, build_conf_obj(crv=None))
1340
1341 def test_dpp_config_jwk_error_unsupported_crv(dev, apdev):
1342 """DPP Config Object JWK error - unsupported curve"""
1343 run_dpp_config_error(dev, apdev, build_conf_obj(crv="unsupported"))
1344
1345 def test_dpp_config_jwk_error_no_x(dev, apdev):
1346 """DPP Config Object JWK error - no x"""
1347 run_dpp_config_error(dev, apdev, build_conf_obj(x=None))
1348
1349 def test_dpp_config_jwk_error_invalid_x(dev, apdev):
1350 """DPP Config Object JWK error - invalid x"""
1351 run_dpp_config_error(dev, apdev, build_conf_obj(x="MTIz"))
1352
1353 def test_dpp_config_jwk_error_no_y(dev, apdev):
1354 """DPP Config Object JWK error - no y"""
1355 run_dpp_config_error(dev, apdev, build_conf_obj(y=None))
1356
1357 def test_dpp_config_jwk_error_invalid_y(dev, apdev):
1358 """DPP Config Object JWK error - invalid y"""
1359 run_dpp_config_error(dev, apdev, build_conf_obj(y="MTIz"))
1360
1361 def test_dpp_config_jwk_error_invalid_xy(dev, apdev):
1362 """DPP Config Object JWK error - invalid x,y"""
1363 conf = build_conf_obj(x="MDEyMzQ1Njc4OWFiY2RlZjAxMjM0NTY3ODlhYmNkZWY",
1364 y="MDEyMzQ1Njc4OWFiY2RlZjAxMjM0NTY3ODlhYmNkZWY")
1365 run_dpp_config_error(dev, apdev, conf)
1366
1367 def test_dpp_config_jwk_error_no_kid(dev, apdev):
1368 """DPP Config Object JWK error - no kid"""
1369 run_dpp_config_error(dev, apdev, build_conf_obj(kid=None))
1370
1371 def test_dpp_config_jws_error_prot_hdr_not_an_object(dev, apdev):
1372 """DPP Config Object JWS error - protected header not an object"""
1373 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr="1"))
1374
1375 def test_dpp_config_jws_error_prot_hdr_no_typ(dev, apdev):
1376 """DPP Config Object JWS error - protected header - no typ"""
1377 prot_hdr='{"kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"ES256"}'
1378 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr))
1379
1380 def test_dpp_config_jws_error_prot_hdr_unsupported_typ(dev, apdev):
1381 """DPP Config Object JWS error - protected header - unsupported typ"""
1382 prot_hdr='{"typ":"unsupported","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"ES256"}'
1383 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr))
1384
1385 def test_dpp_config_jws_error_prot_hdr_no_alg(dev, apdev):
1386 """DPP Config Object JWS error - protected header - no alg"""
1387 prot_hdr='{"typ":"dppCon","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU"}'
1388 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr))
1389
1390 def test_dpp_config_jws_error_prot_hdr_unexpected_alg(dev, apdev):
1391 """DPP Config Object JWS error - protected header - unexpected alg"""
1392 prot_hdr='{"typ":"dppCon","kid":"TnGKjIlNZaatrEAYrbbjiB67rjkL_AGVWXO6q9hDJKU","alg":"unexpected"}'
1393 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr))
1394
1395 def test_dpp_config_jws_error_prot_hdr_no_kid(dev, apdev):
1396 """DPP Config Object JWS error - protected header - no kid"""
1397 prot_hdr='{"typ":"dppCon","alg":"ES256"}'
1398 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr))
1399
1400 def test_dpp_config_jws_error_prot_hdr_unexpected_kid(dev, apdev):
1401 """DPP Config Object JWS error - protected header - unexpected kid"""
1402 prot_hdr='{"typ":"dppCon","kid":"MTIz","alg":"ES256"}'
1403 run_dpp_config_error(dev, apdev, build_conf_obj(prot_hdr=prot_hdr))
1404
1405 def test_dpp_config_signed_connector_error_no_dot_1(dev, apdev):
1406 """DPP Config Object signedConnector error - no dot(1)"""
1407 conn = "MTIz"
1408 run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn))
1409
1410 def test_dpp_config_signed_connector_error_no_dot_2(dev, apdev):
1411 """DPP Config Object signedConnector error - no dot(2)"""
1412 conn = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.MTIz"
1413 run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn))
1414
1415 def test_dpp_config_signed_connector_error_unexpected_signature_len(dev, apdev):
1416 """DPP Config Object signedConnector error - unexpected signature length"""
1417 conn = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.MTIz.MTIz"
1418 run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn))
1419
1420 def test_dpp_config_signed_connector_error_invalid_signature_der(dev, apdev):
1421 """DPP Config Object signedConnector error - invalid signature DER"""
1422 conn = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJUbkdLaklsTlphYXRyRUFZcmJiamlCNjdyamtMX0FHVldYTzZxOWhESktVIiwiYWxnIjoiRVMyNTYifQ.MTIz.MTI"
1423 run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn))
1424
1425 def test_dpp_config_no_csign(dev, apdev):
1426 """DPP Config Object error - no csign"""
1427 run_dpp_config_error(dev, apdev, build_conf_obj(csign=False))
1428
1429 def test_dpp_config_no_signed_connector(dev, apdev):
1430 """DPP Config Object error - no signedConnector"""
1431 run_dpp_config_error(dev, apdev, build_conf_obj(no_signed_connector=True))
1432
1433 def test_dpp_config_unexpected_signed_connector_char(dev, apdev):
1434 """DPP Config Object error - unexpected signedConnector character"""
1435 run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector='a\nb'))
1436
1437 def test_dpp_config_root_not_an_object(dev, apdev):
1438 """DPP Config Object error - root not an object"""
1439 conf = "1"
1440 run_dpp_config_error(dev, apdev, conf)
1441
1442 def test_dpp_config_no_wi_fi_tech(dev, apdev):
1443 """DPP Config Object error - no wi-fi_tech"""
1444 conf = "{}"
1445 run_dpp_config_error(dev, apdev, conf)
1446
1447 def test_dpp_config_unsupported_wi_fi_tech(dev, apdev):
1448 """DPP Config Object error - unsupported wi-fi_tech"""
1449 conf = '{"wi-fi_tech":"unsupported"}'
1450 run_dpp_config_error(dev, apdev, conf)
1451
1452 def test_dpp_config_no_discovery(dev, apdev):
1453 """DPP Config Object error - no discovery"""
1454 conf = '{"wi-fi_tech":"infra"}'
1455 run_dpp_config_error(dev, apdev, conf)
1456
1457 def test_dpp_config_no_discovery_ssid(dev, apdev):
1458 """DPP Config Object error - no discovery::ssid"""
1459 conf = '{"wi-fi_tech":"infra","discovery":{}}'
1460 run_dpp_config_error(dev, apdev, conf)
1461
1462 def test_dpp_config_too_long_discovery_ssid(dev, apdev):
1463 """DPP Config Object error - too long discovery::ssid"""
1464 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"%s"}}' % (33*'A')
1465 run_dpp_config_error(dev, apdev, conf)
1466
1467 def test_dpp_config_no_cred(dev, apdev):
1468 """DPP Config Object error - no cred"""
1469 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"}}'
1470 run_dpp_config_error(dev, apdev, conf)
1471
1472 def test_dpp_config_no_cred_akm(dev, apdev):
1473 """DPP Config Object error - no cred::akm"""
1474 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{}}'
1475 run_dpp_config_error(dev, apdev, conf)
1476
1477 def test_dpp_config_unsupported_cred_akm(dev, apdev):
1478 """DPP Config Object error - unsupported cred::akm"""
1479 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"unsupported"}}'
1480 run_dpp_config_error(dev, apdev, conf)
1481
1482 def test_dpp_config_error_legacy_no_pass(dev, apdev):
1483 """DPP Config Object legacy error - no pass/psk"""
1484 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk"}}'
1485 run_dpp_config_error(dev, apdev, conf)
1486
1487 def test_dpp_config_error_legacy_too_short_pass(dev, apdev):
1488 """DPP Config Object legacy error - too short pass/psk"""
1489 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"1"}}'
1490 run_dpp_config_error(dev, apdev, conf)
1491
1492 def test_dpp_config_error_legacy_too_long_pass(dev, apdev):
1493 """DPP Config Object legacy error - too long pass/psk"""
1494 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"%s"}}' % (64*'A')
1495 run_dpp_config_error(dev, apdev, conf)
1496
1497 def test_dpp_config_error_legacy_psk_with_sae(dev, apdev):
1498 """DPP Config Object legacy error - psk_hex with SAE"""
1499 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"sae","psk_hex":"%s"}}' % (32*"12")
1500 run_dpp_config_error(dev, apdev, conf)
1501
1502 def test_dpp_config_error_legacy_no_pass_for_sae(dev, apdev):
1503 """DPP Config Object legacy error - no pass for SAE"""
1504 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk+sae","psk_hex":"%s"}}' % (32*"12")
1505 run_dpp_config_error(dev, apdev, conf)
1506
1507 def test_dpp_config_error_legacy_invalid_psk(dev, apdev):
1508 """DPP Config Object legacy error - invalid psk_hex"""
1509 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"%s"}}' % (32*"qa")
1510 run_dpp_config_error(dev, apdev, conf)
1511
1512 def test_dpp_config_error_legacy_too_short_psk(dev, apdev):
1513 """DPP Config Object legacy error - too short psk_hex"""
1514 conf = '{"wi-fi_tech":"infra","discovery":{"ssid":"test"},"cred":{"akm":"psk","psk_hex":"%s"}}' % (31*"12")
1515 run_dpp_config_error(dev, apdev, conf)
1516
1517 def ecdsa_sign(pkey, message, alg="sha256"):
1518 sign = OpenSSL.crypto.sign(pkey, message, alg)
1519 a,b = struct.unpack('BB', sign[0:2])
1520 if a != 0x30:
1521 raise Exception("Invalid DER encoding of ECDSA signature")
1522 if b != len(sign) - 2:
1523 raise Exception("Invalid length of ECDSA signature")
1524 sign = sign[2:]
1525
1526 a,b = struct.unpack('BB', sign[0:2])
1527 if a != 0x02:
1528 raise Exception("Invalid DER encoding of ECDSA signature r")
1529 if b > len(sign) - 2:
1530 raise Exception("Invalid length of ECDSA signature r")
1531 sign = sign[2:]
1532 if b == 32:
1533 r = sign[0:32]
1534 sign = sign[32:]
1535 elif b == 33:
1536 r = sign[1:33]
1537 sign = sign[33:]
1538 else:
1539 raise Exception("Invalid length of ECDSA signature r")
1540
1541 a,b = struct.unpack('BB', sign[0:2])
1542 if a != 0x02:
1543 raise Exception("Invalid DER encoding of ECDSA signature s")
1544 if b > len(sign) - 2:
1545 raise Exception("Invalid length of ECDSA signature s")
1546 sign = sign[2:]
1547 if b == 32:
1548 s = sign[0:32]
1549 sign = sign[32:]
1550 elif b == 33:
1551 s = sign[1:33]
1552 sign = sign[33:]
1553 else:
1554 raise Exception("Invalid length of ECDSA signature s")
1555 if len(sign) != 0:
1556 raise Exception("Extra data at the end of ECDSA signature")
1557
1558 raw_sign = r + s
1559 return base64.urlsafe_b64encode(raw_sign).rstrip('=')
1560
1561 p256_priv_key = """-----BEGIN EC PRIVATE KEY-----
1562 MHcCAQEEIBVQij9ah629f1pu3tarDQGQvrzHgAkgYd1jHGiLxNajoAoGCCqGSM49
1563 AwEHoUQDQgAEAC9d2/JirKu72F2qLuv5jEFMD1Cqu9EiyGk7cOzn/2DJ51p2mEoW
1564 n03N6XRvTC+G7WPol9Ng97NAM2sK57+F/Q==
1565 -----END EC PRIVATE KEY-----"""
1566 p256_pub_key_x = binascii.unhexlify("002f5ddbf262acabbbd85daa2eebf98c414c0f50aabbd122c8693b70ece7ff60")
1567 p256_pub_key_y = binascii.unhexlify("c9e75a76984a169f4dcde9746f4c2f86ed63e897d360f7b340336b0ae7bf85fd")
1568
1569 def run_dpp_config_connector(dev, apdev, expiry=None, payload=None,
1570 skip_net_access_key_mismatch=True):
1571 if not openssl_imported:
1572 raise HwsimSkip("OpenSSL python method not available")
1573 pkey = OpenSSL.crypto.load_privatekey(OpenSSL.crypto.FILETYPE_PEM,
1574 p256_priv_key)
1575 x = base64.urlsafe_b64encode(p256_pub_key_x).rstrip('=')
1576 y = base64.urlsafe_b64encode(p256_pub_key_y).rstrip('=')
1577
1578 pubkey = '\04' + p256_pub_key_x + p256_pub_key_y
1579 kid = base64.urlsafe_b64encode(hashlib.sha256(pubkey).digest()).rstrip('=')
1580
1581 prot_hdr = '{"typ":"dppCon","kid":"%s","alg":"ES256"}' % kid
1582
1583 if not payload:
1584 payload = '{"groups":[{"groupId":"*","netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}'
1585 if expiry:
1586 payload += ',"expiry":"%s"' % expiry
1587 payload += '}'
1588 conn = base64.urlsafe_b64encode(prot_hdr).rstrip('=') + '.'
1589 conn += base64.urlsafe_b64encode(payload).rstrip('=')
1590 sign = ecdsa_sign(pkey, conn)
1591 conn += '.' + sign
1592 run_dpp_config_error(dev, apdev,
1593 build_conf_obj(x=x, y=y, signed_connector=conn),
1594 skip_net_access_key_mismatch=skip_net_access_key_mismatch)
1595
1596 def test_dpp_config_connector_error_ext_sign(dev, apdev):
1597 """DPP Config Object connector error - external signature calculation"""
1598 run_dpp_config_connector(dev, apdev)
1599
1600 def test_dpp_config_connector_error_too_short_timestamp(dev, apdev):
1601 """DPP Config Object connector error - too short timestamp"""
1602 run_dpp_config_connector(dev, apdev, expiry="1")
1603
1604 def test_dpp_config_connector_error_invalid_timestamp(dev, apdev):
1605 """DPP Config Object connector error - invalid timestamp"""
1606 run_dpp_config_connector(dev, apdev, expiry=19*"1")
1607
1608 def test_dpp_config_connector_error_invalid_timestamp_date(dev, apdev):
1609 """DPP Config Object connector error - invalid timestamp date"""
1610 run_dpp_config_connector(dev, apdev, expiry="9999-99-99T99:99:99Z")
1611
1612 def test_dpp_config_connector_error_invalid_time_zone(dev, apdev):
1613 """DPP Config Object connector error - invalid time zone"""
1614 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00*")
1615
1616 def test_dpp_config_connector_error_invalid_time_zone_2(dev, apdev):
1617 """DPP Config Object connector error - invalid time zone 2"""
1618 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00+")
1619
1620 def test_dpp_config_connector_error_expired_1(dev, apdev):
1621 """DPP Config Object connector error - expired 1"""
1622 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00")
1623
1624 def test_dpp_config_connector_error_expired_2(dev, apdev):
1625 """DPP Config Object connector error - expired 2"""
1626 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00Z")
1627
1628 def test_dpp_config_connector_error_expired_3(dev, apdev):
1629 """DPP Config Object connector error - expired 3"""
1630 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00+01")
1631
1632 def test_dpp_config_connector_error_expired_4(dev, apdev):
1633 """DPP Config Object connector error - expired 4"""
1634 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00+01:02")
1635
1636 def test_dpp_config_connector_error_expired_5(dev, apdev):
1637 """DPP Config Object connector error - expired 5"""
1638 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00-01")
1639
1640 def test_dpp_config_connector_error_expired_6(dev, apdev):
1641 """DPP Config Object connector error - expired 6"""
1642 run_dpp_config_connector(dev, apdev, expiry="2018-01-01T00:00:00-01:02")
1643
1644 def test_dpp_config_connector_error_no_groups(dev, apdev):
1645 """DPP Config Object connector error - no groups"""
1646 payload = '{"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}'
1647 run_dpp_config_connector(dev, apdev, payload=payload)
1648
1649 def test_dpp_config_connector_error_empty_groups(dev, apdev):
1650 """DPP Config Object connector error - empty groups"""
1651 payload = '{"groups":[],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}'
1652 run_dpp_config_connector(dev, apdev, payload=payload)
1653
1654 def test_dpp_config_connector_error_missing_group_id(dev, apdev):
1655 """DPP Config Object connector error - missing groupId"""
1656 payload = '{"groups":[{"netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}'
1657 run_dpp_config_connector(dev, apdev, payload=payload)
1658
1659 def test_dpp_config_connector_error_missing_net_role(dev, apdev):
1660 """DPP Config Object connector error - missing netRole"""
1661 payload = '{"groups":[{"groupId":"*"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}'
1662 run_dpp_config_connector(dev, apdev, payload=payload)
1663
1664 def test_dpp_config_connector_error_missing_net_access_key(dev, apdev):
1665 """DPP Config Object connector error - missing netAccessKey"""
1666 payload = '{"groups":[{"groupId":"*","netRole":"sta"}]}'
1667 run_dpp_config_connector(dev, apdev, payload=payload)
1668
1669 def test_dpp_config_connector_error_net_access_key_mismatch(dev, apdev):
1670 """DPP Config Object connector error - netAccessKey mismatch"""
1671 payload = '{"groups":[{"groupId":"*","netRole":"sta"}],"netAccessKey":{"kty":"EC","crv":"P-256","x":"aTF4JEGIPKSZ0Xv9zdCMjm-tn5XpMsYIVZ9wySAz1gI","y":"QGcHWA_6rbU9XDXAztoX-M5Q3suTnMaqEhULtn7SSXw"}}'
1672 run_dpp_config_connector(dev, apdev, payload=payload,
1673 skip_net_access_key_mismatch=False)
1674
1675 def test_dpp_gas_timeout(dev, apdev):
1676 """DPP and GAS server timeout for a query"""
1677 check_dpp_capab(dev[0])
1678 check_dpp_capab(dev[1])
1679 logger.info("dev0 displays QR Code")
1680 addr = dev[0].own_addr().replace(':', '')
1681 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
1682 res = dev[0].request(cmd)
1683 if "FAIL" in res:
1684 raise Exception("Failed to generate bootstrapping info")
1685 id0 = int(res)
1686 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
1687
1688 logger.info("dev1 scans QR Code")
1689 res = dev[1].request("DPP_QR_CODE " + uri0)
1690 if "FAIL" in res:
1691 raise Exception("Failed to parse QR Code URI")
1692 id1 = int(res)
1693
1694 logger.info("dev1 initiates DPP Authentication")
1695 dev[0].set("ext_mgmt_frame_handling", "1")
1696 cmd = "DPP_LISTEN 2412"
1697 if "OK" not in dev[0].request(cmd):
1698 raise Exception("Failed to start listen operation")
1699
1700 # Force GAS fragmentation
1701 conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' '
1702 dev[1].set("dpp_config_obj_override", conf)
1703
1704 cmd = "DPP_AUTH_INIT peer=%d" % id1
1705 if "OK" not in dev[1].request(cmd):
1706 raise Exception("Failed to initiate DPP Authentication")
1707
1708 # DPP Authentication Request
1709 msg = dev[0].mgmt_rx()
1710 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
1711 raise Exception("MGMT_RX_PROCESS failed")
1712
1713 # DPP Authentication Confirmation
1714 msg = dev[0].mgmt_rx()
1715 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
1716 raise Exception("MGMT_RX_PROCESS failed")
1717
1718 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
1719 if ev is None:
1720 raise Exception("DPP authentication did not succeed (Responder)")
1721 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
1722 if ev is None:
1723 raise Exception("DPP authentication did not succeed (Initiator)")
1724
1725 # DPP Configuration Response (GAS Initial Response frame)
1726 msg = dev[0].mgmt_rx()
1727 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
1728 raise Exception("MGMT_RX_PROCESS failed")
1729
1730 # GAS Comeback Response frame
1731 msg = dev[0].mgmt_rx()
1732 # Do not continue to force timeout on GAS server
1733
1734 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
1735 if ev is None:
1736 raise Exception("GAS result not reported (Enrollee)")
1737 if "result=TIMEOUT" not in ev:
1738 raise Exception("Unexpected GAS result (Enrollee): " + ev)
1739 dev[0].set("ext_mgmt_frame_handling", "0")
1740
1741 ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=15)
1742 if ev is None:
1743 raise Exception("DPP configuration failure not reported (Configurator)")
1744
1745 ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=1)
1746 if ev is None:
1747 raise Exception("DPP configuration failure not reported (Enrollee)")
1748
1749 def test_dpp_akm_sha256(dev, apdev):
1750 """DPP AKM (SHA256)"""
1751 run_dpp_akm(dev, apdev, 32)
1752
1753 def test_dpp_akm_sha384(dev, apdev):
1754 """DPP AKM (SHA384)"""
1755 run_dpp_akm(dev, apdev, 48)
1756
1757 def test_dpp_akm_sha512(dev, apdev):
1758 """DPP AKM (SHA512)"""
1759 run_dpp_akm(dev, apdev, 64)
1760
1761 def run_dpp_akm(dev, apdev, pmk_len):
1762 check_dpp_capab(dev[0])
1763 check_dpp_capab(dev[1])
1764 params = { "ssid": "dpp",
1765 "wpa": "2",
1766 "wpa_key_mgmt": "DPP",
1767 "rsn_pairwise": "CCMP",
1768 "ieee80211w": "2" }
1769 try:
1770 hapd = hostapd.add_ap(apdev[0], params)
1771 except:
1772 raise HwsimSkip("DPP not supported")
1773
1774 id = dev[0].connect("dpp", key_mgmt="DPP", ieee80211w="2", scan_freq="2412",
1775 wait_connect=False)
1776 ev = dev[0].wait_event(["CTRL-EVENT-NETWORK-NOT-FOUND"], timeout=2)
1777 if not ev:
1778 raise Exception("Network mismatch not reported")
1779 dev[0].request("DISCONNECT")
1780 dev[0].dump_monitor()
1781
1782 bssid = hapd.own_addr()
1783 pmkid = 16*'11'
1784 akmp = 2**23
1785 pmk = pmk_len*'22'
1786 cmd = "PMKSA_ADD %d %s %s %s 30240 43200 %d 0" % (id, bssid, pmkid, pmk, akmp)
1787 if "OK" not in dev[0].request(cmd):
1788 raise Exception("PMKSA_ADD failed (wpa_supplicant)")
1789 dev[0].select_network(id, freq="2412")
1790 ev = dev[0].wait_event(["CTRL-EVENT-ASSOC-REJECT"], timeout=2)
1791 dev[0].request("DISCONNECT")
1792 dev[0].dump_monitor()
1793 if not ev:
1794 raise Exception("Association attempt was not rejected")
1795 if "status_code=53" not in ev:
1796 raise Exception("Unexpected status code: " + ev)
1797
1798 addr = dev[0].own_addr()
1799 cmd = "PMKSA_ADD %s %s %s 0 %d" % (addr, pmkid, pmk, akmp)
1800 if "OK" not in hapd.request(cmd):
1801 raise Exception("PMKSA_ADD failed (hostapd)")
1802
1803 dev[0].select_network(id, freq="2412")
1804 dev[0].wait_connected()
1805 val = dev[0].get_status_field("key_mgmt")
1806 if val != "DPP":
1807 raise Exception("Unexpected key_mgmt: " + val)
1808
1809 params1_csign = "3059301306072a8648ce3d020106082a8648ce3d03010703420004d02e5bd81a120762b5f0f2994777f5d40297238a6c294fd575cdf35fabec44c050a6421c401d98d659fd2ed13c961cc8287944dd3202f516977800d3ab2f39ee"
1810 params1_ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJzOEFrYjg5bTV4UGhoYk5UbTVmVVo0eVBzNU5VMkdxYXNRY3hXUWhtQVFRIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIwOHF4TlNYRzRWemdCV3BjVUdNSmc1czNvbElOVFJsRVQ1aERpNkRKY3ZjIiwieSI6IlVhaGFYQXpKRVpRQk1YaHRUQnlZZVlrOWtJYjk5UDA3UV9NcW9TVVZTVEkifX0.a5_nfMVr7Qe1SW0ZL3u6oQRm5NUCYUSfixDAJOUFN3XUfECBZ6E8fm8xjeSfdOytgRidTz0CTlIRjzPQo82dmQ"
1811 params1_ap_netaccesskey = "30770201010420f6531d17f29dfab655b7c9e923478d5a345164c489aadd44a3519c3e9dcc792da00a06082a8648ce3d030107a14403420004d3cab13525c6e15ce0056a5c506309839b37a2520d4d19444f98438ba0c972f751a85a5c0cc911940131786d4c1c9879893d9086fdf4fd3b43f32aa125154932"
1812 params1_sta_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJzOEFrYjg5bTV4UGhoYk5UbTVmVVo0eVBzNU5VMkdxYXNRY3hXUWhtQVFRIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6InN0YSJ9XSwibmV0QWNjZXNzS2V5Ijp7Imt0eSI6IkVDIiwiY3J2IjoiUC0yNTYiLCJ4IjoiZWMzR3NqQ3lQMzVBUUZOQUJJdEltQnN4WXVyMGJZX1dES1lfSE9zUGdjNCIsInkiOiJTRS1HVllkdWVnTFhLMU1TQXZNMEx2QWdLREpTNWoyQVhCbE9PMTdUSTRBIn19.PDK9zsGlK-e1pEOmNxVeJfCS8pNeay6ckIS1TXCQsR64AR-9wFPCNVjqOxWvVKltehyMFqVAtOcv0IrjtMJFqQ"
1813 params1_sta_netaccesskey = "30770201010420bc33380c26fd2168b69cd8242ed1df07ba89aa4813f8d4e8523de6ca3f8dd28ba00a06082a8648ce3d030107a1440342000479cdc6b230b23f7e40405340048b48981b3162eaf46d8fd60ca63f1ceb0f81ce484f8655876e7a02d72b531202f3342ef020283252e63d805c194e3b5ed32380"
1814
1815 def test_dpp_network_introduction(dev, apdev):
1816 """DPP network introduction"""
1817 check_dpp_capab(dev[0])
1818 check_dpp_capab(dev[1])
1819
1820 params = { "ssid": "dpp",
1821 "wpa": "2",
1822 "wpa_key_mgmt": "DPP",
1823 "ieee80211w": "2",
1824 "rsn_pairwise": "CCMP",
1825 "dpp_connector": params1_ap_connector,
1826 "dpp_csign": params1_csign,
1827 "dpp_netaccesskey": params1_ap_netaccesskey }
1828 try:
1829 hapd = hostapd.add_ap(apdev[0], params)
1830 except:
1831 raise HwsimSkip("DPP not supported")
1832
1833 id = dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
1834 ieee80211w="2",
1835 dpp_csign=params1_csign,
1836 dpp_connector=params1_sta_connector,
1837 dpp_netaccesskey=params1_sta_netaccesskey)
1838 val = dev[0].get_status_field("key_mgmt")
1839 if val != "DPP":
1840 raise Exception("Unexpected key_mgmt: " + val)
1841
1842 def test_dpp_and_sae_akm(dev, apdev):
1843 """DPP and SAE AKMs"""
1844 check_dpp_capab(dev[0])
1845 check_dpp_capab(dev[1])
1846 if "SAE" not in dev[1].get_capability("auth_alg"):
1847 raise HwsimSkip("SAE not supported")
1848
1849 params = { "ssid": "dpp+sae",
1850 "wpa": "2",
1851 "wpa_key_mgmt": "DPP SAE",
1852 "ieee80211w": "2",
1853 "rsn_pairwise": "CCMP",
1854 "sae_password": "sae-password",
1855 "dpp_connector": params1_ap_connector,
1856 "dpp_csign": params1_csign,
1857 "dpp_netaccesskey": params1_ap_netaccesskey }
1858 try:
1859 hapd = hostapd.add_ap(apdev[0], params)
1860 except:
1861 raise HwsimSkip("DPP not supported")
1862
1863 id = dev[0].connect("dpp+sae", key_mgmt="DPP", scan_freq="2412",
1864 ieee80211w="2",
1865 dpp_csign=params1_csign,
1866 dpp_connector=params1_sta_connector,
1867 dpp_netaccesskey=params1_sta_netaccesskey)
1868 val = dev[0].get_status_field("key_mgmt")
1869 if val != "DPP":
1870 raise Exception("Unexpected key_mgmt for DPP: " + val)
1871
1872 id = dev[1].connect("dpp+sae", key_mgmt="SAE", scan_freq="2412",
1873 ieee80211w="2", psk="sae-password")
1874 val = dev[1].get_status_field("key_mgmt")
1875 if val != "SAE":
1876 raise Exception("Unexpected key_mgmt for SAE: " + val)
1877
1878 def test_dpp_ap_config(dev, apdev):
1879 """DPP and AP configuration"""
1880 run_dpp_ap_config(dev, apdev)
1881
1882 def test_dpp_ap_config_p256_p256(dev, apdev):
1883 """DPP and AP configuration (P-256 + P-256)"""
1884 run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-256")
1885
1886 def test_dpp_ap_config_p256_p384(dev, apdev):
1887 """DPP and AP configuration (P-256 + P-384)"""
1888 run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-384")
1889
1890 def test_dpp_ap_config_p256_p521(dev, apdev):
1891 """DPP and AP configuration (P-256 + P-521)"""
1892 run_dpp_ap_config(dev, apdev, curve="P-256", conf_curve="P-521")
1893
1894 def test_dpp_ap_config_p384_p256(dev, apdev):
1895 """DPP and AP configuration (P-384 + P-256)"""
1896 run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-256")
1897
1898 def test_dpp_ap_config_p384_p384(dev, apdev):
1899 """DPP and AP configuration (P-384 + P-384)"""
1900 run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-384")
1901
1902 def test_dpp_ap_config_p384_p521(dev, apdev):
1903 """DPP and AP configuration (P-384 + P-521)"""
1904 run_dpp_ap_config(dev, apdev, curve="P-384", conf_curve="P-521")
1905
1906 def test_dpp_ap_config_p521_p256(dev, apdev):
1907 """DPP and AP configuration (P-521 + P-256)"""
1908 run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-256")
1909
1910 def test_dpp_ap_config_p521_p384(dev, apdev):
1911 """DPP and AP configuration (P-521 + P-384)"""
1912 run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-384")
1913
1914 def test_dpp_ap_config_p521_p521(dev, apdev):
1915 """DPP and AP configuration (P-521 + P-521)"""
1916 run_dpp_ap_config(dev, apdev, curve="P-521", conf_curve="P-521")
1917
1918 def test_dpp_ap_config_reconfig_configurator(dev, apdev):
1919 """DPP and AP configuration with Configurator reconfiguration"""
1920 run_dpp_ap_config(dev, apdev, reconf_configurator=True)
1921
1922 def update_hapd_config(hapd):
1923 ev = hapd.wait_event(["DPP-CONFOBJ-SSID"], timeout=1)
1924 if ev is None:
1925 raise Exception("SSID not reported (AP)")
1926 ssid = ev.split(' ')[1]
1927
1928 ev = hapd.wait_event(["DPP-CONNECTOR"], timeout=1)
1929 if ev is None:
1930 raise Exception("Connector not reported (AP)")
1931 connector = ev.split(' ')[1]
1932
1933 ev = hapd.wait_event(["DPP-C-SIGN-KEY"], timeout=1)
1934 if ev is None:
1935 raise Exception("C-sign-key not reported (AP)")
1936 p = ev.split(' ')
1937 csign = p[1]
1938
1939 ev = hapd.wait_event(["DPP-NET-ACCESS-KEY"], timeout=1)
1940 if ev is None:
1941 raise Exception("netAccessKey not reported (AP)")
1942 p = ev.split(' ')
1943 net_access_key = p[1]
1944 net_access_key_expiry = p[2] if len(p) > 2 else None
1945
1946 logger.info("Update AP configuration to use key_mgmt=DPP")
1947 hapd.disable()
1948 hapd.set("ssid", ssid)
1949 hapd.set("wpa", "2")
1950 hapd.set("wpa_key_mgmt", "DPP")
1951 hapd.set("ieee80211w", "2")
1952 hapd.set("rsn_pairwise", "CCMP")
1953 hapd.set("dpp_connector", connector)
1954 hapd.set("dpp_csign", csign)
1955 hapd.set("dpp_netaccesskey", net_access_key)
1956 if net_access_key_expiry:
1957 hapd.set("dpp_netaccesskey_expiry", net_access_key_expiry)
1958 hapd.enable()
1959
1960 def run_dpp_ap_config(dev, apdev, curve=None, conf_curve=None,
1961 reconf_configurator=False):
1962 check_dpp_capab(dev[0])
1963 check_dpp_capab(dev[1])
1964 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
1965 check_dpp_capab(hapd)
1966
1967 addr = hapd.own_addr().replace(':', '')
1968 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
1969 if curve:
1970 cmd += " curve=" + curve
1971 res = hapd.request(cmd)
1972 if "FAIL" in res:
1973 raise Exception("Failed to generate bootstrapping info")
1974 id_h = int(res)
1975 uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
1976
1977 cmd = "DPP_CONFIGURATOR_ADD"
1978 if conf_curve:
1979 cmd += " curve=" + conf_curve
1980 res = dev[0].request(cmd);
1981 if "FAIL" in res:
1982 raise Exception("Failed to add configurator")
1983 conf_id = int(res)
1984
1985 if reconf_configurator:
1986 csign = dev[0].request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id)
1987 if "FAIL" in csign or len(csign) == 0:
1988 raise Exception("DPP_CONFIGURATOR_GET_KEY failed")
1989
1990 res = dev[0].request("DPP_QR_CODE " + uri)
1991 if "FAIL" in res:
1992 raise Exception("Failed to parse QR Code URI")
1993 id = int(res)
1994
1995 cmd = "DPP_AUTH_INIT peer=%d conf=ap-dpp configurator=%d" % (id, conf_id)
1996 if "OK" not in dev[0].request(cmd):
1997 raise Exception("Failed to initiate DPP Authentication")
1998 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
1999 if ev is None:
2000 raise Exception("DPP authentication did not succeed (Responder)")
2001 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2002 if ev is None:
2003 raise Exception("DPP authentication did not succeed (Initiator)")
2004 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
2005 if ev is None:
2006 raise Exception("DPP configuration not completed (Configurator)")
2007 ev = hapd.wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
2008 if ev is None:
2009 raise Exception("DPP configuration not completed (Enrollee)")
2010 if "DPP-CONF-FAILED" in ev:
2011 raise Exception("DPP configuration failed")
2012
2013 update_hapd_config(hapd)
2014
2015 addr = dev[1].own_addr().replace(':', '')
2016 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
2017 if curve:
2018 cmd += " curve=" + curve
2019 res = dev[1].request(cmd)
2020 if "FAIL" in res:
2021 raise Exception("Failed to generate bootstrapping info")
2022 id1 = int(res)
2023 uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1)
2024
2025 res = dev[0].request("DPP_QR_CODE " + uri1)
2026 if "FAIL" in res:
2027 raise Exception("Failed to parse QR Code URI")
2028 id0b = int(res)
2029
2030 if reconf_configurator:
2031 res = dev[0].request("DPP_CONFIGURATOR_REMOVE %d" % conf_id)
2032 if "OK" not in res:
2033 raise Exception("DPP_CONFIGURATOR_REMOVE failed")
2034 cmd = "DPP_CONFIGURATOR_ADD"
2035 if conf_curve:
2036 cmd += " curve=" + conf_curve
2037 cmd += " key=" + csign
2038 res = dev[0].request(cmd);
2039 if "FAIL" in res:
2040 raise Exception("Failed to add configurator (reconf)")
2041 conf_id = int(res)
2042
2043 cmd = "DPP_LISTEN 2412"
2044 if "OK" not in dev[1].request(cmd):
2045 raise Exception("Failed to start listen operation")
2046 cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id0b, conf_id)
2047 if "OK" not in dev[0].request(cmd):
2048 raise Exception("Failed to initiate DPP Authentication")
2049 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2050 if ev is None:
2051 raise Exception("DPP authentication did not succeed (Responder)")
2052 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2053 if ev is None:
2054 raise Exception("DPP authentication did not succeed (Initiator)")
2055 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
2056 if ev is None:
2057 raise Exception("DPP configuration not completed (Configurator)")
2058 ev = dev[1].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
2059 if ev is None:
2060 raise Exception("DPP configuration not completed (Enrollee)")
2061 dev[1].request("DPP_STOP_LISTEN")
2062
2063 ev = dev[1].wait_event(["DPP-CONFOBJ-SSID"], timeout=1)
2064 if ev is None:
2065 raise Exception("SSID not reported")
2066 ssid = ev.split(' ')[1]
2067
2068 ev = dev[1].wait_event(["DPP-CONNECTOR"], timeout=1)
2069 if ev is None:
2070 raise Exception("Connector not reported")
2071 connector = ev.split(' ')[1]
2072
2073 ev = dev[1].wait_event(["DPP-C-SIGN-KEY"], timeout=1)
2074 if ev is None:
2075 raise Exception("C-sign-key not reported")
2076 p = ev.split(' ')
2077 csign = p[1]
2078
2079 ev = dev[1].wait_event(["DPP-NET-ACCESS-KEY"], timeout=1)
2080 if ev is None:
2081 raise Exception("netAccessKey not reported")
2082 p = ev.split(' ')
2083 net_access_key = p[1]
2084 net_access_key_expiry = p[2] if len(p) > 2 else None
2085
2086 dev[1].dump_monitor()
2087
2088 id = dev[1].connect(ssid, key_mgmt="DPP", ieee80211w="2", scan_freq="2412",
2089 only_add_network=True)
2090 dev[1].set_network_quoted(id, "dpp_connector", connector)
2091 dev[1].set_network(id, "dpp_csign", csign)
2092 dev[1].set_network(id, "dpp_netaccesskey", net_access_key)
2093 if net_access_key_expiry:
2094 dev[1].set_network(id, "dpp_netaccess_expiry", net_access_key_expiry)
2095
2096 logger.info("Check data connection")
2097 dev[1].select_network(id, freq="2412")
2098 dev[1].wait_connected()
2099
2100 def test_dpp_auto_connect_1(dev, apdev):
2101 """DPP and auto connect (1)"""
2102 try:
2103 run_dpp_auto_connect(dev, apdev, 1)
2104 finally:
2105 dev[0].set("dpp_config_processing", "0")
2106
2107 def test_dpp_auto_connect_2(dev, apdev):
2108 """DPP and auto connect (2)"""
2109 try:
2110 run_dpp_auto_connect(dev, apdev, 2)
2111 finally:
2112 dev[0].set("dpp_config_processing", "0")
2113
2114 def test_dpp_auto_connect_2_connect_cmd(dev, apdev):
2115 """DPP and auto connect (2) using connect_cmd"""
2116 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
2117 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
2118 dev_new = [ wpas, dev[1] ]
2119 try:
2120 run_dpp_auto_connect(dev_new, apdev, 2)
2121 finally:
2122 wpas.set("dpp_config_processing", "0")
2123
2124 def run_dpp_auto_connect(dev, apdev, processing):
2125 check_dpp_capab(dev[0])
2126 check_dpp_capab(dev[1])
2127
2128 csign = "30770201010420768240a3fc89d6662d9782f120527fe7fb9edc6366ab0b9c7dde96125cfd250fa00a06082a8648ce3d030107a144034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708"
2129 csign_pub = "3059301306072a8648ce3d020106082a8648ce3d030107034200042908e1baf7bf413cc66f9e878a03e8bb1835ba94b033dbe3d6969fc8575d5eb5dfda1cb81c95cee21d0cd7d92ba30541ffa05cb6296f5dd808b0c1c2a83c0708"
2130 ap_connector = "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiJwYWtZbXVzd1dCdWpSYTl5OEsweDViaTVrT3VNT3dzZHRlaml2UG55ZHZzIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIiwibmV0Um9sZSI6ImFwIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiIybU5vNXZuRkI5bEw3d1VWb1hJbGVPYzBNSEE1QXZKbnpwZXZULVVTYzVNIiwieSI6IlhzS3dqVHJlLTg5WWdpU3pKaG9CN1haeUttTU05OTl3V2ZaSVl0bi01Q3MifX0.XhjFpZgcSa7G2lHy0OCYTvaZFRo5Hyx6b7g7oYyusLC7C_73AJ4_BxEZQVYJXAtDuGvb3dXSkHEKxREP9Q6Qeg"
2131 ap_netaccesskey = "30770201010420ceba752db2ad5200fa7bc565b9c05c69b7eb006751b0b329b0279de1c19ca67ca00a06082a8648ce3d030107a14403420004da6368e6f9c507d94bef0515a1722578e73430703902f267ce97af4fe51273935ec2b08d3adefbcf588224b3261a01ed76722a630cf7df7059f64862d9fee42b"
2132
2133 params = { "ssid": "test",
2134 "wpa": "2",
2135 "wpa_key_mgmt": "DPP",
2136 "ieee80211w": "2",
2137 "rsn_pairwise": "CCMP",
2138 "dpp_connector": ap_connector,
2139 "dpp_csign": csign_pub,
2140 "dpp_netaccesskey": ap_netaccesskey }
2141 try:
2142 hapd = hostapd.add_ap(apdev[0], params)
2143 except:
2144 raise HwsimSkip("DPP not supported")
2145
2146 cmd = "DPP_CONFIGURATOR_ADD key=" + csign
2147 res = dev[1].request(cmd)
2148 if "FAIL" in res:
2149 raise Exception("DPP_CONFIGURATOR_ADD failed")
2150 conf_id = int(res)
2151
2152 dev[0].set("dpp_config_processing", str(processing))
2153 addr = dev[0].own_addr().replace(':', '')
2154 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
2155 res = dev[0].request(cmd)
2156 if "FAIL" in res:
2157 raise Exception("Failed to generate bootstrapping info")
2158 id0 = int(res)
2159 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2160
2161 res = dev[1].request("DPP_QR_CODE " + uri0)
2162 if "FAIL" in res:
2163 raise Exception("Failed to parse QR Code URI")
2164 id1 = int(res)
2165
2166 cmd = "DPP_LISTEN 2412"
2167 if "OK" not in dev[0].request(cmd):
2168 raise Exception("Failed to start listen operation")
2169
2170 cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id)
2171 if "OK" not in dev[1].request(cmd):
2172 raise Exception("Failed to initiate DPP Authentication")
2173 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=10)
2174 if ev is None:
2175 raise Exception("DPP configuration not completed (Configurator)")
2176 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=2)
2177 if ev is None:
2178 raise Exception("DPP configuration not completed (Enrollee)")
2179 ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
2180 if ev is None:
2181 raise Exception("DPP network profile not generated")
2182 id = ev.split(' ')[1]
2183
2184 if processing == 1:
2185 dev[0].select_network(id, freq=2412)
2186
2187 dev[0].wait_connected()
2188 hwsim_utils.test_connectivity(dev[0], hapd)
2189
2190 def test_dpp_auto_connect_legacy(dev, apdev):
2191 """DPP and auto connect (legacy)"""
2192 try:
2193 run_dpp_auto_connect_legacy(dev, apdev)
2194 finally:
2195 dev[0].set("dpp_config_processing", "0")
2196
2197 def test_dpp_auto_connect_legacy_sae_1(dev, apdev):
2198 """DPP and auto connect (legacy SAE)"""
2199 try:
2200 run_dpp_auto_connect_legacy(dev, apdev, conf='sta-sae', psk_sae=True)
2201 finally:
2202 dev[0].set("dpp_config_processing", "0")
2203
2204 def test_dpp_auto_connect_legacy_sae_2(dev, apdev):
2205 """DPP and auto connect (legacy SAE)"""
2206 try:
2207 run_dpp_auto_connect_legacy(dev, apdev, conf='sta-sae', sae_only=True)
2208 finally:
2209 dev[0].set("dpp_config_processing", "0")
2210
2211 def test_dpp_auto_connect_legacy_psk_sae_1(dev, apdev):
2212 """DPP and auto connect (legacy PSK+SAE)"""
2213 try:
2214 run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk-sae',
2215 psk_sae=True)
2216 finally:
2217 dev[0].set("dpp_config_processing", "0")
2218
2219 def test_dpp_auto_connect_legacy_psk_sae_2(dev, apdev):
2220 """DPP and auto connect (legacy PSK+SAE)"""
2221 try:
2222 run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk-sae',
2223 sae_only=True)
2224 finally:
2225 dev[0].set("dpp_config_processing", "0")
2226
2227 def test_dpp_auto_connect_legacy_psk_sae_3(dev, apdev):
2228 """DPP and auto connect (legacy PSK+SAE)"""
2229 try:
2230 run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk-sae')
2231 finally:
2232 dev[0].set("dpp_config_processing", "0")
2233
2234 def run_dpp_auto_connect_legacy(dev, apdev, conf='sta-psk',
2235 psk_sae=False, sae_only=False):
2236 check_dpp_capab(dev[0])
2237 check_dpp_capab(dev[1])
2238
2239 params = hostapd.wpa2_params(ssid="dpp-legacy",
2240 passphrase="secret passphrase")
2241 if sae_only:
2242 params['wpa_key_mgmt'] = 'SAE'
2243 params['ieee80211w'] = '2'
2244 elif psk_sae:
2245 params['wpa_key_mgmt'] = 'WPA-PSK SAE'
2246 params['ieee80211w'] = '1'
2247 params['sae_require_mfp'] = '1'
2248
2249 hapd = hostapd.add_ap(apdev[0], params)
2250
2251 dev[0].set("dpp_config_processing", "2")
2252 addr = dev[0].own_addr().replace(':', '')
2253 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
2254 res = dev[0].request(cmd)
2255 if "FAIL" in res:
2256 raise Exception("Failed to generate bootstrapping info")
2257 id0 = int(res)
2258 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2259
2260 res = dev[1].request("DPP_QR_CODE " + uri0)
2261 if "FAIL" in res:
2262 raise Exception("Failed to parse QR Code URI")
2263 id1 = int(res)
2264
2265 cmd = "DPP_LISTEN 2412"
2266 if "OK" not in dev[0].request(cmd):
2267 raise Exception("Failed to start listen operation")
2268
2269 cmd = "DPP_AUTH_INIT peer=%d conf=%s ssid=%s pass=%s" % (id1, conf, "dpp-legacy".encode("hex"), "secret passphrase".encode("hex"))
2270 if "OK" not in dev[1].request(cmd):
2271 raise Exception("Failed to initiate DPP Authentication")
2272 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=10)
2273 if ev is None:
2274 raise Exception("DPP configuration not completed (Configurator)")
2275 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=2)
2276 if ev is None:
2277 raise Exception("DPP configuration not completed (Enrollee)")
2278 ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
2279 if ev is None:
2280 raise Exception("DPP network profile not generated")
2281 id = ev.split(' ')[1]
2282
2283 dev[0].wait_connected()
2284
2285 def test_dpp_auto_connect_legacy_pmf_required(dev, apdev):
2286 """DPP and auto connect (legacy, PMF required)"""
2287 try:
2288 run_dpp_auto_connect_legacy_pmf_required(dev, apdev)
2289 finally:
2290 dev[0].set("dpp_config_processing", "0")
2291
2292 def run_dpp_auto_connect_legacy_pmf_required(dev, apdev):
2293 check_dpp_capab(dev[0])
2294 check_dpp_capab(dev[1])
2295
2296 params = hostapd.wpa2_params(ssid="dpp-legacy",
2297 passphrase="secret passphrase")
2298 params['wpa_key_mgmt'] = "WPA-PSK-SHA256"
2299 params['ieee80211w'] = "2"
2300 hapd = hostapd.add_ap(apdev[0], params)
2301
2302 dev[0].set("dpp_config_processing", "2")
2303 addr = dev[0].own_addr().replace(':', '')
2304 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
2305 res = dev[0].request(cmd)
2306 if "FAIL" in res:
2307 raise Exception("Failed to generate bootstrapping info")
2308 id0 = int(res)
2309 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2310
2311 res = dev[1].request("DPP_QR_CODE " + uri0)
2312 if "FAIL" in res:
2313 raise Exception("Failed to parse QR Code URI")
2314 id1 = int(res)
2315
2316 cmd = "DPP_LISTEN 2412"
2317 if "OK" not in dev[0].request(cmd):
2318 raise Exception("Failed to start listen operation")
2319
2320 cmd = "DPP_AUTH_INIT peer=%d conf=sta-psk ssid=%s pass=%s" % (id1, "dpp-legacy".encode("hex"), "secret passphrase".encode("hex"))
2321 if "OK" not in dev[1].request(cmd):
2322 raise Exception("Failed to initiate DPP Authentication")
2323 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=10)
2324 if ev is None:
2325 raise Exception("DPP configuration not completed (Configurator)")
2326 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=2)
2327 if ev is None:
2328 raise Exception("DPP configuration not completed (Enrollee)")
2329 ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
2330 if ev is None:
2331 raise Exception("DPP network profile not generated")
2332 id = ev.split(' ')[1]
2333
2334 dev[0].wait_connected()
2335
2336 def test_dpp_qr_code_auth_responder_configurator(dev, apdev):
2337 """DPP QR Code and responder as the configurator"""
2338 run_dpp_qr_code_auth_responder_configurator(dev, apdev, "")
2339
2340 def test_dpp_qr_code_auth_responder_configurator_group_id(dev, apdev):
2341 """DPP QR Code and responder as the configurator with group_id)"""
2342 run_dpp_qr_code_auth_responder_configurator(dev, apdev,
2343 " group_id=test-group")
2344
2345 def run_dpp_qr_code_auth_responder_configurator(dev, apdev, extra):
2346 check_dpp_capab(dev[0])
2347 check_dpp_capab(dev[1])
2348 cmd = "DPP_CONFIGURATOR_ADD"
2349 res = dev[0].request(cmd);
2350 if "FAIL" in res:
2351 raise Exception("Failed to add configurator")
2352 conf_id = int(res)
2353
2354 addr = dev[0].own_addr().replace(':', '')
2355 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
2356 res = dev[0].request(cmd)
2357 if "FAIL" in res:
2358 raise Exception("Failed to generate bootstrapping info")
2359 id0 = int(res)
2360 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2361
2362 res = dev[1].request("DPP_QR_CODE " + uri0)
2363 if "FAIL" in res:
2364 raise Exception("Failed to parse QR Code URI")
2365 id1 = int(res)
2366
2367 dev[0].set("dpp_configurator_params",
2368 " conf=sta-dpp configurator=%d%s" % (conf_id, extra));
2369 cmd = "DPP_LISTEN 2412 role=configurator"
2370 if "OK" not in dev[0].request(cmd):
2371 raise Exception("Failed to start listen operation")
2372 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
2373 if "OK" not in dev[1].request(cmd):
2374 raise Exception("Failed to initiate DPP Authentication")
2375 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2376 if ev is None:
2377 raise Exception("DPP authentication did not succeed (Responder)")
2378 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2379 if ev is None:
2380 raise Exception("DPP authentication did not succeed (Initiator)")
2381 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
2382 if ev is None:
2383 raise Exception("DPP configuration not completed (Configurator)")
2384 ev = dev[1].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
2385 if ev is None:
2386 raise Exception("DPP configuration not completed (Enrollee)")
2387 dev[0].request("DPP_STOP_LISTEN")
2388 dev[0].dump_monitor()
2389 dev[1].dump_monitor()
2390
2391 def test_dpp_qr_code_hostapd_init(dev, apdev):
2392 """DPP QR Code and hostapd as initiator"""
2393 check_dpp_capab(dev[0])
2394 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
2395 "channel": "6" })
2396 check_dpp_capab(hapd)
2397
2398 cmd = "DPP_CONFIGURATOR_ADD"
2399 res = dev[0].request(cmd);
2400 if "FAIL" in res:
2401 raise Exception("Failed to add configurator")
2402 conf_id = int(res)
2403
2404 addr = dev[0].own_addr().replace(':', '')
2405 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/6 mac=" + addr
2406 res = dev[0].request(cmd)
2407 if "FAIL" in res:
2408 raise Exception("Failed to generate bootstrapping info")
2409 id0 = int(res)
2410 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2411
2412 dev[0].set("dpp_configurator_params",
2413 " conf=ap-dpp configurator=%d" % conf_id);
2414 cmd = "DPP_LISTEN 2437 role=configurator"
2415 if "OK" not in dev[0].request(cmd):
2416 raise Exception("Failed to start listen operation")
2417
2418 res = hapd.request("DPP_QR_CODE " + uri0)
2419 if "FAIL" in res:
2420 raise Exception("Failed to parse QR Code URI")
2421 id1 = int(res)
2422
2423 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
2424 if "OK" not in hapd.request(cmd):
2425 raise Exception("Failed to initiate DPP Authentication")
2426 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2427 if ev is None:
2428 raise Exception("DPP authentication did not succeed (Responder)")
2429 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2430 if ev is None:
2431 raise Exception("DPP authentication did not succeed (Initiator)")
2432 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
2433 if ev is None:
2434 raise Exception("DPP configuration not completed (Configurator)")
2435 ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
2436 if ev is None:
2437 raise Exception("DPP configuration not completed (Enrollee)")
2438 dev[0].request("DPP_STOP_LISTEN")
2439 dev[0].dump_monitor()
2440
2441 def test_dpp_qr_code_hostapd_init_offchannel(dev, apdev):
2442 """DPP QR Code and hostapd as initiator (offchannel)"""
2443 run_dpp_qr_code_hostapd_init_offchannel(dev, apdev, None)
2444
2445 def test_dpp_qr_code_hostapd_init_offchannel_neg_freq(dev, apdev):
2446 """DPP QR Code and hostapd as initiator (offchannel, neg_freq)"""
2447 run_dpp_qr_code_hostapd_init_offchannel(dev, apdev, "neg_freq=2437")
2448
2449 def run_dpp_qr_code_hostapd_init_offchannel(dev, apdev, extra):
2450 check_dpp_capab(dev[0])
2451 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
2452 "channel": "6" })
2453 check_dpp_capab(hapd)
2454
2455 cmd = "DPP_CONFIGURATOR_ADD"
2456 res = dev[0].request(cmd);
2457 if "FAIL" in res:
2458 raise Exception("Failed to add configurator")
2459 conf_id = int(res)
2460
2461 addr = dev[0].own_addr().replace(':', '')
2462 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1,81/11 mac=" + addr
2463 res = dev[0].request(cmd)
2464 if "FAIL" in res:
2465 raise Exception("Failed to generate bootstrapping info")
2466 id0 = int(res)
2467 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2468
2469 dev[0].set("dpp_configurator_params",
2470 " conf=ap-dpp configurator=%d" % conf_id);
2471 cmd = "DPP_LISTEN 2462 role=configurator"
2472 if "OK" not in dev[0].request(cmd):
2473 raise Exception("Failed to start listen operation")
2474
2475 res = hapd.request("DPP_QR_CODE " + uri0)
2476 if "FAIL" in res:
2477 raise Exception("Failed to parse QR Code URI")
2478 id1 = int(res)
2479
2480 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
2481 if extra:
2482 cmd += " " + extra
2483 if "OK" not in hapd.request(cmd):
2484 raise Exception("Failed to initiate DPP Authentication")
2485 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2486 if ev is None:
2487 raise Exception("DPP authentication did not succeed (Responder)")
2488 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2489 if ev is None:
2490 raise Exception("DPP authentication did not succeed (Initiator)")
2491 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
2492 if ev is None:
2493 raise Exception("DPP configuration not completed (Configurator)")
2494 ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
2495 if ev is None:
2496 raise Exception("DPP configuration not completed (Enrollee)")
2497 dev[0].request("DPP_STOP_LISTEN")
2498 dev[0].dump_monitor()
2499
2500 def test_dpp_test_vector_p_256(dev, apdev):
2501 """DPP P-256 test vector (mutual auth)"""
2502 check_dpp_capab(dev[0])
2503 check_dpp_capab(dev[1])
2504
2505 # Responder bootstrapping key
2506 priv = "54ce181a98525f217216f59b245f60e9df30ac7f6b26c939418cfc3c42d1afa0"
2507 addr = dev[0].own_addr().replace(':', '')
2508 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/11 mac=" + addr + " key=30310201010420" + priv + "a00a06082a8648ce3d030107"
2509 res = dev[0].request(cmd)
2510 if "FAIL" in res:
2511 raise Exception("Failed to generate bootstrapping info")
2512 id0 = int(res)
2513 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2514
2515 # Responder protocol keypair override
2516 priv = "f798ed2e19286f6a6efe210b1863badb99af2a14b497634dbfd2a97394fb5aa5"
2517 dev[0].set("dpp_protocol_key_override",
2518 "30310201010420" + priv + "a00a06082a8648ce3d030107")
2519
2520 dev[0].set("dpp_nonce_override", "3d0cfb011ca916d796f7029ff0b43393")
2521
2522 # Initiator bootstrapping key
2523 priv = "15b2a83c5a0a38b61f2aa8200ee4994b8afdc01c58507d10d0a38f7eedf051bb"
2524 cmd = "DPP_BOOTSTRAP_GEN type=qrcode key=30310201010420" + priv + "a00a06082a8648ce3d030107"
2525 res = dev[1].request(cmd)
2526 if "FAIL" in res:
2527 raise Exception("Failed to generate bootstrapping info")
2528 id1 = int(res)
2529 uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1)
2530
2531 # Initiator protocol keypair override
2532 priv = "a87de9afbb406c96e5f79a3df895ecac3ad406f95da66314c8cb3165e0c61783"
2533 dev[1].set("dpp_protocol_key_override",
2534 "30310201010420" + priv + "a00a06082a8648ce3d030107")
2535
2536 dev[1].set("dpp_nonce_override", "13f4602a16daeb69712263b9c46cba31")
2537
2538 res = dev[1].request("DPP_QR_CODE " + uri0)
2539 if "FAIL" in res:
2540 raise Exception("Failed to parse QR Code URI")
2541 id1peer = int(res)
2542
2543 res = dev[0].request("DPP_QR_CODE " + uri1)
2544 if "FAIL" in res:
2545 raise Exception("Failed to parse QR Code URI")
2546 id0peer = int(res)
2547
2548 cmd = "DPP_LISTEN 2462 qr=mutual"
2549 if "OK" not in dev[0].request(cmd):
2550 raise Exception("Failed to start listen operation")
2551
2552 cmd = "DPP_AUTH_INIT peer=%d own=%d neg_freq=2412" % (id1peer, id1)
2553 if "OK" not in dev[1].request(cmd):
2554 raise Exception("Failed to initiate operation")
2555
2556 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2557 if ev is None:
2558 raise Exception("DPP authentication did not succeed (Initiator)")
2559 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2560 if ev is None:
2561 raise Exception("DPP authentication did not succeed (Responder)")
2562
2563 def test_dpp_test_vector_p_256_b(dev, apdev):
2564 """DPP P-256 test vector (Responder-only auth)"""
2565 check_dpp_capab(dev[0])
2566 check_dpp_capab(dev[1])
2567
2568 # Responder bootstrapping key
2569 priv = "54ce181a98525f217216f59b245f60e9df30ac7f6b26c939418cfc3c42d1afa0"
2570 addr = dev[0].own_addr().replace(':', '')
2571 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/11 mac=" + addr + " key=30310201010420" + priv + "a00a06082a8648ce3d030107"
2572 res = dev[0].request(cmd)
2573 if "FAIL" in res:
2574 raise Exception("Failed to generate bootstrapping info")
2575 id0 = int(res)
2576 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2577
2578 # Responder protocol keypair override
2579 priv = "f798ed2e19286f6a6efe210b1863badb99af2a14b497634dbfd2a97394fb5aa5"
2580 dev[0].set("dpp_protocol_key_override",
2581 "30310201010420" + priv + "a00a06082a8648ce3d030107")
2582
2583 dev[0].set("dpp_nonce_override", "3d0cfb011ca916d796f7029ff0b43393")
2584
2585 # Initiator bootstrapping key
2586 priv = "15b2a83c5a0a38b61f2aa8200ee4994b8afdc01c58507d10d0a38f7eedf051bb"
2587 cmd = "DPP_BOOTSTRAP_GEN type=qrcode key=30310201010420" + priv + "a00a06082a8648ce3d030107"
2588 res = dev[1].request(cmd)
2589 if "FAIL" in res:
2590 raise Exception("Failed to generate bootstrapping info")
2591 id1 = int(res)
2592 uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1)
2593
2594 # Initiator protocol keypair override
2595 priv = "a87de9afbb406c96e5f79a3df895ecac3ad406f95da66314c8cb3165e0c61783"
2596 dev[1].set("dpp_protocol_key_override",
2597 "30310201010420" + priv + "a00a06082a8648ce3d030107")
2598
2599 dev[1].set("dpp_nonce_override", "13f4602a16daeb69712263b9c46cba31")
2600
2601 res = dev[1].request("DPP_QR_CODE " + uri0)
2602 if "FAIL" in res:
2603 raise Exception("Failed to parse QR Code URI")
2604 id1peer = int(res)
2605
2606 cmd = "DPP_LISTEN 2462"
2607 if "OK" not in dev[0].request(cmd):
2608 raise Exception("Failed to start listen operation")
2609
2610 cmd = "DPP_AUTH_INIT peer=%d own=%d neg_freq=2412" % (id1peer, id1)
2611 if "OK" not in dev[1].request(cmd):
2612 raise Exception("Failed to initiate operation")
2613
2614 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2615 if ev is None:
2616 raise Exception("DPP authentication did not succeed (Initiator)")
2617 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2618 if ev is None:
2619 raise Exception("DPP authentication did not succeed (Responder)")
2620
2621 def der_priv_key_p_521(priv):
2622 if len(priv) != 2 * 66:
2623 raise Exception("Unexpected der_priv_key_p_521 parameter: " + priv)
2624 der_prefix = "3081500201010442"
2625 der_postfix = "a00706052b81040023"
2626 return der_prefix + priv + der_postfix
2627
2628 def test_dpp_test_vector_p_521(dev, apdev):
2629 """DPP P-521 test vector (mutual auth)"""
2630 check_dpp_capab(dev[0])
2631 check_dpp_capab(dev[1])
2632
2633 # Responder bootstrapping key
2634 priv = "0061e54f518cdf859735da3dd64c6f72c2f086f41a6fd52915152ea2fe0f24ddaecd8883730c9c9fd82cf7c043a41021696388cf5190b731dd83638bcd56d8b6c743"
2635 addr = dev[0].own_addr().replace(':', '')
2636 #cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/11 mac=" + addr + " key=" + der_prefix + priv + der_postfix
2637 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/11 mac=" + addr + " key=" + der_priv_key_p_521(priv)
2638 res = dev[0].request(cmd)
2639 if "FAIL" in res:
2640 raise Exception("Failed to generate bootstrapping info")
2641 id0 = int(res)
2642 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
2643
2644 # Responder protocol keypair override
2645 priv = "01d8b7b17cd1b0a33f7c66fb4220999329cdaf4f8b44b2ffadde8ab8ed8abffa9f5358c5b1caae26709ca4fb78e52a4d08f2e4f24111a36a6f440d20a0000ff51597"
2646 dev[0].set("dpp_protocol_key_override", der_priv_key_p_521(priv))
2647
2648 dev[0].set("dpp_nonce_override",
2649 "d749a782012eb0a8595af30b2dfc8d0880d004ebddb55ecc5afbdef18c400e01")
2650
2651 # Initiator bootstrapping key
2652 priv = "0060c10df14af5ef27f6e362d31bdd9eeb44be77a323ba64b08f3f03d58b92cbfe05c182a91660caa081ca344243c47b5aa088bcdf738840eb35f0218b9f26881e02"
2653 cmd = "DPP_BOOTSTRAP_GEN type=qrcode key=" + der_priv_key_p_521(priv)
2654 res = dev[1].request(cmd)
2655 if "FAIL" in res:
2656 raise Exception("Failed to generate bootstrapping info")
2657 id1 = int(res)
2658 uri1 = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1)
2659
2660 # Initiator protocol keypair override
2661 priv = "019c1c08caaeec38fb931894699b095bc3ab8c1ec7ef0622d2e3eba821477c8c6fca41774f21166ad98aebda37c067d9aa08a8a2e1b5c44c61f2bae02a61f85d9661"
2662 dev[1].set("dpp_protocol_key_override", der_priv_key_p_521(priv))
2663
2664 dev[1].set("dpp_nonce_override",
2665 "de972af3847bec3ba2aedd9f5c21cfdec7bf0bc5fe8b276cbcd0267807fb15b0")
2666
2667 res = dev[1].request("DPP_QR_CODE " + uri0)
2668 if "FAIL" in res:
2669 raise Exception("Failed to parse QR Code URI")
2670 id1peer = int(res)
2671
2672 res = dev[0].request("DPP_QR_CODE " + uri1)
2673 if "FAIL" in res:
2674 raise Exception("Failed to parse QR Code URI")
2675 id0peer = int(res)
2676
2677 cmd = "DPP_LISTEN 2462 qr=mutual"
2678 if "OK" not in dev[0].request(cmd):
2679 raise Exception("Failed to start listen operation")
2680
2681 cmd = "DPP_AUTH_INIT peer=%d own=%d neg_freq=2412" % (id1peer, id1)
2682 if "OK" not in dev[1].request(cmd):
2683 raise Exception("Failed to initiate operation")
2684
2685 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2686 if ev is None:
2687 raise Exception("DPP authentication did not succeed (Initiator)")
2688 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2689 if ev is None:
2690 raise Exception("DPP authentication did not succeed (Responder)")
2691
2692 def test_dpp_pkex(dev, apdev):
2693 """DPP and PKEX"""
2694 run_dpp_pkex(dev, apdev)
2695
2696 def test_dpp_pkex_p256(dev, apdev):
2697 """DPP and PKEX (P-256)"""
2698 run_dpp_pkex(dev, apdev, "P-256")
2699
2700 def test_dpp_pkex_p384(dev, apdev):
2701 """DPP and PKEX (P-384)"""
2702 run_dpp_pkex(dev, apdev, "P-384")
2703
2704 def test_dpp_pkex_p521(dev, apdev):
2705 """DPP and PKEX (P-521)"""
2706 run_dpp_pkex(dev, apdev, "P-521")
2707
2708 def test_dpp_pkex_bp256(dev, apdev):
2709 """DPP and PKEX (BP-256)"""
2710 run_dpp_pkex(dev, apdev, "brainpoolP256r1")
2711
2712 def test_dpp_pkex_bp384(dev, apdev):
2713 """DPP and PKEX (BP-384)"""
2714 run_dpp_pkex(dev, apdev, "brainpoolP384r1")
2715
2716 def test_dpp_pkex_bp512(dev, apdev):
2717 """DPP and PKEX (BP-512)"""
2718 run_dpp_pkex(dev, apdev, "brainpoolP512r1")
2719
2720 def test_dpp_pkex_config(dev, apdev):
2721 """DPP and PKEX with initiator as the configurator"""
2722 check_dpp_capab(dev[1])
2723
2724 cmd = "DPP_CONFIGURATOR_ADD"
2725 res = dev[1].request(cmd);
2726 if "FAIL" in res:
2727 raise Exception("Failed to add configurator")
2728 conf_id = int(res)
2729
2730 run_dpp_pkex(dev, apdev,
2731 init_extra="conf=sta-dpp configurator=%d" % (conf_id),
2732 check_config=True)
2733
2734 def test_dpp_pkex_no_identifier(dev, apdev):
2735 """DPP and PKEX without identifier"""
2736 run_dpp_pkex(dev, apdev, identifier_i=None, identifier_r=None)
2737
2738 def test_dpp_pkex_identifier_mismatch(dev, apdev):
2739 """DPP and PKEX with different identifiers"""
2740 run_dpp_pkex(dev, apdev, identifier_i="foo", identifier_r="bar",
2741 expect_no_resp=True)
2742
2743 def test_dpp_pkex_identifier_mismatch2(dev, apdev):
2744 """DPP and PKEX with initiator using identifier and the responder not"""
2745 run_dpp_pkex(dev, apdev, identifier_i="foo", identifier_r=None,
2746 expect_no_resp=True)
2747
2748 def test_dpp_pkex_identifier_mismatch3(dev, apdev):
2749 """DPP and PKEX with responder using identifier and the initiator not"""
2750 run_dpp_pkex(dev, apdev, identifier_i=None, identifier_r="bar",
2751 expect_no_resp=True)
2752
2753 def run_dpp_pkex(dev, apdev, curve=None, init_extra="", check_config=False,
2754 identifier_i="test", identifier_r="test",
2755 expect_no_resp=False):
2756 check_dpp_capab(dev[0], curve and "brainpool" in curve)
2757 check_dpp_capab(dev[1], curve and "brainpool" in curve)
2758
2759 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2760 if curve:
2761 cmd += " curve=" + curve
2762 res = dev[0].request(cmd)
2763 if "FAIL" in res:
2764 raise Exception("Failed to generate bootstrapping info")
2765 id0 = int(res)
2766
2767 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2768 if curve:
2769 cmd += " curve=" + curve
2770 res = dev[1].request(cmd)
2771 if "FAIL" in res:
2772 raise Exception("Failed to generate bootstrapping info")
2773 id1 = int(res)
2774
2775 identifier = " identifier=" + identifier_r if identifier_r else ""
2776 cmd = "DPP_PKEX_ADD own=%d%s code=secret" % (id0, identifier)
2777 res = dev[0].request(cmd)
2778 if "FAIL" in res:
2779 raise Exception("Failed to set PKEX data (responder)")
2780 cmd = "DPP_LISTEN 2437"
2781 if "OK" not in dev[0].request(cmd):
2782 raise Exception("Failed to start listen operation")
2783
2784 identifier = " identifier=" + identifier_i if identifier_i else ""
2785 cmd = "DPP_PKEX_ADD own=%d%s init=1 %s code=secret" % (id1, identifier,
2786 init_extra)
2787 res = dev[1].request(cmd)
2788 if "FAIL" in res:
2789 raise Exception("Failed to set PKEX data (initiator)")
2790
2791 if expect_no_resp:
2792 ev = dev[0].wait_event(["DPP-RX"], timeout=10)
2793 if ev is None:
2794 raise Exception("DPP PKEX frame not received")
2795 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=1)
2796 if ev is not None:
2797 raise Exception("DPP authentication succeeded")
2798 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=0.1)
2799 if ev is not None:
2800 raise Exception("DPP authentication succeeded")
2801 return
2802
2803 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2804 if ev is None:
2805 raise Exception("DPP authentication did not succeed (Initiator)")
2806 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2807 if ev is None:
2808 raise Exception("DPP authentication did not succeed (Responder)")
2809
2810 if check_config:
2811 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
2812 if ev is None:
2813 raise Exception("DPP configuration not completed (Configurator)")
2814 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
2815 if ev is None:
2816 raise Exception("DPP configuration not completed (Enrollee)")
2817
2818 def test_dpp_pkex_5ghz(dev, apdev):
2819 """DPP and PKEX on 5 GHz"""
2820 try:
2821 dev[0].request("SET country US")
2822 dev[1].request("SET country US")
2823 ev = dev[0].wait_event(["CTRL-EVENT-REGDOM-CHANGE"], timeout=1)
2824 if ev is None:
2825 ev = dev[0].wait_global_event(["CTRL-EVENT-REGDOM-CHANGE"],
2826 timeout=1)
2827 run_dpp_pkex_5ghz(dev, apdev)
2828 finally:
2829 dev[0].request("SET country 00")
2830 dev[1].request("SET country 00")
2831 subprocess.call(['iw', 'reg', 'set', '00'])
2832
2833 def run_dpp_pkex_5ghz(dev, apdev):
2834 check_dpp_capab(dev[0])
2835 check_dpp_capab(dev[1])
2836
2837 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2838 res = dev[0].request(cmd)
2839 if "FAIL" in res:
2840 raise Exception("Failed to generate bootstrapping info")
2841 id0 = int(res)
2842
2843 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2844 res = dev[1].request(cmd)
2845 if "FAIL" in res:
2846 raise Exception("Failed to generate bootstrapping info")
2847 id1 = int(res)
2848
2849 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
2850 res = dev[0].request(cmd)
2851 if "FAIL" in res:
2852 raise Exception("Failed to set PKEX data (responder)")
2853 cmd = "DPP_LISTEN 5745"
2854 if "OK" not in dev[0].request(cmd):
2855 raise Exception("Failed to start listen operation")
2856
2857 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % (id1)
2858 res = dev[1].request(cmd)
2859 if "FAIL" in res:
2860 raise Exception("Failed to set PKEX data (initiator)")
2861
2862 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS", "DPP-FAIL"], timeout=20)
2863 if ev is None or "DPP-AUTH-SUCCESS" not in ev:
2864 raise Exception("DPP authentication did not succeed (Initiator)")
2865 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2866 if ev is None:
2867 raise Exception("DPP authentication did not succeed (Responder)")
2868
2869 def test_dpp_pkex_test_vector(dev, apdev):
2870 """DPP and PKEX (P-256) test vector"""
2871 check_dpp_capab(dev[0])
2872 check_dpp_capab(dev[1])
2873
2874 init_addr = "ac:64:91:f4:52:07"
2875 resp_addr = "6e:5e:ce:6e:f3:dd"
2876
2877 identifier = "joes_key"
2878 code = "thisisreallysecret"
2879
2880 # Initiator bootstrapping private key
2881 init_priv = "5941b51acfc702cdc1c347264beb2920db88eb1a0bf03a211868b1632233c269"
2882
2883 # Responder bootstrapping private key
2884 resp_priv = "2ae8956293f49986b6d0b8169a86805d9232babb5f6813fdfe96f19d59536c60"
2885
2886 # Initiator x/X keypair override
2887 init_x_priv = "8365c5ed93d751bef2d92b410dc6adfd95670889183fac1bd66759ad85c3187a"
2888
2889 # Responder y/Y keypair override
2890 resp_y_priv = "d98faa24d7dd3f592665d71a95c862bfd02c4c48acb0c515a41cbc6e929675ea"
2891
2892 p256_prefix = "30310201010420"
2893 p256_postfix = "a00a06082a8648ce3d030107"
2894
2895 dev[0].set("dpp_pkex_own_mac_override", resp_addr)
2896 dev[0].set("dpp_pkex_peer_mac_override", init_addr)
2897 dev[1].set("dpp_pkex_own_mac_override", init_addr)
2898 dev[1].set("dpp_pkex_peer_mac_override", resp_addr)
2899
2900 # Responder bootstrapping key
2901 cmd = "DPP_BOOTSTRAP_GEN type=pkex key=" + p256_prefix + resp_priv + p256_postfix
2902 res = dev[0].request(cmd)
2903 if "FAIL" in res:
2904 raise Exception("Failed to generate bootstrapping info")
2905 id0 = int(res)
2906
2907 # Responder y/Y keypair override
2908 dev[0].set("dpp_pkex_ephemeral_key_override",
2909 p256_prefix + resp_y_priv + p256_postfix)
2910
2911 # Initiator bootstrapping key
2912 cmd = "DPP_BOOTSTRAP_GEN type=pkex key=" + p256_prefix + init_priv + p256_postfix
2913 res = dev[1].request(cmd)
2914 if "FAIL" in res:
2915 raise Exception("Failed to generate bootstrapping info")
2916 id1 = int(res)
2917
2918 # Initiator x/X keypair override
2919 dev[1].set("dpp_pkex_ephemeral_key_override",
2920 p256_prefix + init_x_priv + p256_postfix)
2921
2922 cmd = "DPP_PKEX_ADD own=%d identifier=%s code=%s" % (id0, identifier, code)
2923 res = dev[0].request(cmd)
2924 if "FAIL" in res:
2925 raise Exception("Failed to set PKEX data (responder)")
2926 cmd = "DPP_LISTEN 2437"
2927 if "OK" not in dev[0].request(cmd):
2928 raise Exception("Failed to start listen operation")
2929
2930 cmd = "DPP_PKEX_ADD own=%d identifier=%s init=1 code=%s" % (id1, identifier, code)
2931 res = dev[1].request(cmd)
2932 if "FAIL" in res:
2933 raise Exception("Failed to set PKEX data (initiator)")
2934
2935 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2936 if ev is None:
2937 raise Exception("DPP authentication did not succeed (Initiator)")
2938 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2939 if ev is None:
2940 raise Exception("DPP authentication did not succeed (Responder)")
2941
2942 def test_dpp_pkex_code_mismatch(dev, apdev):
2943 """DPP and PKEX with mismatching code"""
2944 check_dpp_capab(dev[0])
2945 check_dpp_capab(dev[1])
2946
2947 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2948 res = dev[0].request(cmd)
2949 if "FAIL" in res:
2950 raise Exception("Failed to generate bootstrapping info")
2951 id0 = int(res)
2952
2953 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2954 res = dev[1].request(cmd)
2955 if "FAIL" in res:
2956 raise Exception("Failed to generate bootstrapping info")
2957 id1 = int(res)
2958
2959 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
2960 res = dev[0].request(cmd)
2961 if "FAIL" in res:
2962 raise Exception("Failed to set PKEX data (responder)")
2963 cmd = "DPP_LISTEN 2437"
2964 if "OK" not in dev[0].request(cmd):
2965 raise Exception("Failed to start listen operation")
2966
2967 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=unknown" % id1
2968 res = dev[1].request(cmd)
2969 if "FAIL" in res:
2970 raise Exception("Failed to set PKEX data (initiator)")
2971
2972 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
2973 if ev is None:
2974 raise Exception("Failure not reported")
2975 if "possible PKEX code mismatch" not in ev:
2976 raise Exception("Unexpected result: " + ev)
2977
2978 dev[0].dump_monitor()
2979 dev[1].dump_monitor()
2980
2981 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
2982 res = dev[1].request(cmd)
2983 if "FAIL" in res:
2984 raise Exception("Failed to set PKEX data (initiator, retry)")
2985
2986 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2987 if ev is None:
2988 raise Exception("DPP authentication did not succeed (Initiator, retry)")
2989 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
2990 if ev is None:
2991 raise Exception("DPP authentication did not succeed (Responder, retry)")
2992
2993 def test_dpp_pkex_code_mismatch_limit(dev, apdev):
2994 """DPP and PKEX with mismatching code limit"""
2995 check_dpp_capab(dev[0])
2996 check_dpp_capab(dev[1])
2997
2998 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
2999 res = dev[0].request(cmd)
3000 if "FAIL" in res:
3001 raise Exception("Failed to generate bootstrapping info")
3002 id0 = int(res)
3003
3004 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3005 res = dev[1].request(cmd)
3006 if "FAIL" in res:
3007 raise Exception("Failed to generate bootstrapping info")
3008 id1 = int(res)
3009
3010 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3011 res = dev[0].request(cmd)
3012 if "FAIL" in res:
3013 raise Exception("Failed to set PKEX data (responder)")
3014 cmd = "DPP_LISTEN 2437"
3015 if "OK" not in dev[0].request(cmd):
3016 raise Exception("Failed to start listen operation")
3017
3018 for i in range(5):
3019 dev[0].dump_monitor()
3020 dev[1].dump_monitor()
3021 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=unknown" % id1
3022 res = dev[1].request(cmd)
3023 if "FAIL" in res:
3024 raise Exception("Failed to set PKEX data (initiator)")
3025
3026 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
3027 if ev is None:
3028 raise Exception("Failure not reported")
3029 if "possible PKEX code mismatch" not in ev:
3030 raise Exception("Unexpected result: " + ev)
3031
3032 ev = dev[0].wait_event(["DPP-PKEX-T-LIMIT"], timeout=1)
3033 if ev is None:
3034 raise Exception("PKEX t limit not reported")
3035
3036 def test_dpp_pkex_curve_mismatch(dev, apdev):
3037 """DPP and PKEX with mismatching curve"""
3038 check_dpp_capab(dev[0])
3039 check_dpp_capab(dev[1])
3040
3041 cmd = "DPP_BOOTSTRAP_GEN type=pkex curve=P-256"
3042 res = dev[0].request(cmd)
3043 if "FAIL" in res:
3044 raise Exception("Failed to generate bootstrapping info")
3045 id0 = int(res)
3046
3047 cmd = "DPP_BOOTSTRAP_GEN type=pkex curve=P-384"
3048 res = dev[1].request(cmd)
3049 if "FAIL" in res:
3050 raise Exception("Failed to generate bootstrapping info")
3051 id1 = int(res)
3052
3053 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3054 res = dev[0].request(cmd)
3055 if "FAIL" in res:
3056 raise Exception("Failed to set PKEX data (responder)")
3057 cmd = "DPP_LISTEN 2437"
3058 if "OK" not in dev[0].request(cmd):
3059 raise Exception("Failed to start listen operation")
3060
3061 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
3062 res = dev[1].request(cmd)
3063 if "FAIL" in res:
3064 raise Exception("Failed to set PKEX data (initiator)")
3065
3066 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
3067 if ev is None:
3068 raise Exception("Failure not reported (dev 0)")
3069 if "Mismatching PKEX curve: peer=20 own=19" not in ev:
3070 raise Exception("Unexpected result: " + ev)
3071
3072 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
3073 if ev is None:
3074 raise Exception("Failure not reported (dev 1)")
3075 if "Peer indicated mismatching PKEX group - proposed 19" not in ev:
3076 raise Exception("Unexpected result: " + ev)
3077
3078 def test_dpp_pkex_curve_mismatch_failure(dev, apdev):
3079 """DPP and PKEX with mismatching curve (local failure)"""
3080 run_dpp_pkex_curve_mismatch_failure(dev, apdev, "=dpp_pkex_rx_exchange_req")
3081
3082 def test_dpp_pkex_curve_mismatch_failure2(dev, apdev):
3083 """DPP and PKEX with mismatching curve (local failure 2)"""
3084 run_dpp_pkex_curve_mismatch_failure(dev, apdev,
3085 "dpp_pkex_build_exchange_resp")
3086
3087 def run_dpp_pkex_curve_mismatch_failure(dev, apdev, func):
3088 check_dpp_capab(dev[0])
3089 check_dpp_capab(dev[1])
3090
3091 cmd = "DPP_BOOTSTRAP_GEN type=pkex curve=P-256"
3092 res = dev[0].request(cmd)
3093 if "FAIL" in res:
3094 raise Exception("Failed to generate bootstrapping info")
3095 id0 = int(res)
3096
3097 cmd = "DPP_BOOTSTRAP_GEN type=pkex curve=P-384"
3098 res = dev[1].request(cmd)
3099 if "FAIL" in res:
3100 raise Exception("Failed to generate bootstrapping info")
3101 id1 = int(res)
3102
3103 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3104 res = dev[0].request(cmd)
3105 if "FAIL" in res:
3106 raise Exception("Failed to set PKEX data (responder)")
3107 cmd = "DPP_LISTEN 2437"
3108 if "OK" not in dev[0].request(cmd):
3109 raise Exception("Failed to start listen operation")
3110
3111 with alloc_fail(dev[0], 1, func):
3112 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
3113 res = dev[1].request(cmd)
3114 if "FAIL" in res:
3115 raise Exception("Failed to set PKEX data (initiator)")
3116
3117 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
3118 if ev is None:
3119 raise Exception("Failure not reported (dev 0)")
3120 if "Mismatching PKEX curve: peer=20 own=19" not in ev:
3121 raise Exception("Unexpected result: " + ev)
3122
3123 def test_dpp_pkex_exchange_resp_processing_failure(dev, apdev):
3124 """DPP and PKEX with local failure in processing Exchange Resp"""
3125 check_dpp_capab(dev[0])
3126 check_dpp_capab(dev[1])
3127
3128 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3129 res = dev[0].request(cmd)
3130 if "FAIL" in res:
3131 raise Exception("Failed to generate bootstrapping info")
3132 id0 = int(res)
3133
3134 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3135 res = dev[1].request(cmd)
3136 if "FAIL" in res:
3137 raise Exception("Failed to generate bootstrapping info")
3138 id1 = int(res)
3139
3140 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3141 res = dev[0].request(cmd)
3142 if "FAIL" in res:
3143 raise Exception("Failed to set PKEX data (responder)")
3144 cmd = "DPP_LISTEN 2437"
3145 if "OK" not in dev[0].request(cmd):
3146 raise Exception("Failed to start listen operation")
3147
3148 with fail_test(dev[1], 1, "dpp_pkex_derive_Qr;dpp_pkex_rx_exchange_resp"):
3149 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
3150 res = dev[1].request(cmd)
3151 if "FAIL" in res:
3152 raise Exception("Failed to set PKEX data (initiator)")
3153 wait_fail_trigger(dev[1], "GET_FAIL")
3154
3155 def test_dpp_pkex_commit_reveal_req_processing_failure(dev, apdev):
3156 """DPP and PKEX with local failure in processing Commit Reveal Req"""
3157 check_dpp_capab(dev[0])
3158 check_dpp_capab(dev[1])
3159
3160 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3161 res = dev[0].request(cmd)
3162 if "FAIL" in res:
3163 raise Exception("Failed to generate bootstrapping info")
3164 id0 = int(res)
3165
3166 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3167 res = dev[1].request(cmd)
3168 if "FAIL" in res:
3169 raise Exception("Failed to generate bootstrapping info")
3170 id1 = int(res)
3171
3172 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3173 res = dev[0].request(cmd)
3174 if "FAIL" in res:
3175 raise Exception("Failed to set PKEX data (responder)")
3176 cmd = "DPP_LISTEN 2437"
3177 if "OK" not in dev[0].request(cmd):
3178 raise Exception("Failed to start listen operation")
3179
3180 with alloc_fail(dev[0], 1,
3181 "dpp_get_pubkey_point;dpp_pkex_rx_commit_reveal_req"):
3182 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
3183 res = dev[1].request(cmd)
3184 if "FAIL" in res:
3185 raise Exception("Failed to set PKEX data (initiator)")
3186 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
3187
3188 def test_dpp_pkex_config2(dev, apdev):
3189 """DPP and PKEX with responder as the configurator"""
3190 check_dpp_capab(dev[0])
3191
3192 cmd = "DPP_CONFIGURATOR_ADD"
3193 res = dev[0].request(cmd);
3194 if "FAIL" in res:
3195 raise Exception("Failed to add configurator")
3196 conf_id = int(res)
3197
3198 dev[0].set("dpp_configurator_params",
3199 " conf=sta-dpp configurator=%d" % conf_id);
3200 run_dpp_pkex2(dev, apdev)
3201
3202 def run_dpp_pkex2(dev, apdev, curve=None, init_extra=""):
3203 check_dpp_capab(dev[0])
3204 check_dpp_capab(dev[1])
3205
3206 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3207 if curve:
3208 cmd += " curve=" + curve
3209 res = dev[0].request(cmd)
3210 if "FAIL" in res:
3211 raise Exception("Failed to generate bootstrapping info")
3212 id0 = int(res)
3213
3214 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3215 if curve:
3216 cmd += " curve=" + curve
3217 res = dev[1].request(cmd)
3218 if "FAIL" in res:
3219 raise Exception("Failed to generate bootstrapping info")
3220 id1 = int(res)
3221
3222 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3223 res = dev[0].request(cmd)
3224 if "FAIL" in res:
3225 raise Exception("Failed to set PKEX data (responder)")
3226 cmd = "DPP_LISTEN 2437 role=configurator"
3227 if "OK" not in dev[0].request(cmd):
3228 raise Exception("Failed to start listen operation")
3229
3230 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 role=enrollee %s code=secret" % (id1, init_extra)
3231 res = dev[1].request(cmd)
3232 if "FAIL" in res:
3233 raise Exception("Failed to set PKEX data (initiator)")
3234
3235 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3236 if ev is None:
3237 raise Exception("DPP authentication did not succeed (Initiator)")
3238 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3239 if ev is None:
3240 raise Exception("DPP authentication did not succeed (Responder)")
3241
3242 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
3243 if ev is None:
3244 raise Exception("DPP configuration not completed (Configurator)")
3245 ev = dev[1].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3246 if ev is None:
3247 raise Exception("DPP configuration not completed (Enrollee)")
3248
3249 def test_dpp_pkex_no_responder(dev, apdev):
3250 """DPP and PKEX with no responder (retry behavior)"""
3251 check_dpp_capab(dev[0])
3252
3253 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3254 res = dev[0].request(cmd)
3255 if "FAIL" in res:
3256 raise Exception("Failed to generate bootstrapping info")
3257 id0 = int(res)
3258
3259 cmd = "DPP_PKEX_ADD own=%d init=1 identifier=test code=secret" % (id0)
3260 res = dev[0].request(cmd)
3261 if "FAIL" in res:
3262 raise Exception("Failed to set PKEX data (initiator)")
3263
3264 ev = dev[0].wait_event(["DPP-FAIL"], timeout=15)
3265 if ev is None:
3266 raise Exception("DPP PKEX failure not reported")
3267 if "No response from PKEX peer" not in ev:
3268 raise Exception("Unexpected failure reason: " + ev)
3269
3270 def test_dpp_pkex_after_retry(dev, apdev):
3271 """DPP and PKEX completing after retry"""
3272 check_dpp_capab(dev[0])
3273
3274 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3275 res = dev[0].request(cmd)
3276 if "FAIL" in res:
3277 raise Exception("Failed to generate bootstrapping info")
3278 id0 = int(res)
3279
3280 cmd = "DPP_PKEX_ADD own=%d init=1 identifier=test code=secret" % (id0)
3281 res = dev[0].request(cmd)
3282 if "FAIL" in res:
3283 raise Exception("Failed to set PKEX data (initiator)")
3284
3285 time.sleep(0.1)
3286 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3287 res = dev[1].request(cmd)
3288 if "FAIL" in res:
3289 raise Exception("Failed to generate bootstrapping info")
3290 id1 = int(res)
3291
3292 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id1)
3293 res = dev[1].request(cmd)
3294 if "FAIL" in res:
3295 raise Exception("Failed to set PKEX data (responder)")
3296 cmd = "DPP_LISTEN 2437"
3297 if "OK" not in dev[1].request(cmd):
3298 raise Exception("Failed to start listen operation")
3299
3300 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=10)
3301 if ev is None:
3302 raise Exception("DPP authentication did not succeed (Responder)")
3303 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3304 if ev is None:
3305 raise Exception("DPP authentication did not succeed (Initiator)")
3306 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
3307 if ev is None:
3308 raise Exception("DPP configuration not completed (Configurator)")
3309 # Ignore Enrollee result since configurator was not set here
3310
3311 def test_dpp_pkex_hostapd_responder(dev, apdev):
3312 """DPP PKEX with hostapd as responder"""
3313 check_dpp_capab(dev[0])
3314 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
3315 "channel": "6" })
3316 check_dpp_capab(hapd)
3317
3318 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3319 res = hapd.request(cmd)
3320 if "FAIL" in res:
3321 raise Exception("Failed to generate bootstrapping info (hostapd)")
3322 id_h = int(res)
3323
3324 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id_h)
3325 res = hapd.request(cmd)
3326 if "FAIL" in res:
3327 raise Exception("Failed to set PKEX data (responder/hostapd)")
3328
3329 cmd = "DPP_CONFIGURATOR_ADD"
3330 res = dev[0].request(cmd);
3331 if "FAIL" in res:
3332 raise Exception("Failed to add configurator")
3333 conf_id = int(res)
3334
3335 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3336 res = dev[0].request(cmd)
3337 if "FAIL" in res:
3338 raise Exception("Failed to generate bootstrapping info (wpa_supplicant)")
3339 id0 = int(res)
3340
3341 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 conf=ap-dpp configurator=%d code=secret" % (id0, conf_id)
3342 res = dev[0].request(cmd)
3343 if "FAIL" in res:
3344 raise Exception("Failed to set PKEX data (initiator/wpa_supplicant)")
3345
3346 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3347 if ev is None:
3348 raise Exception("DPP authentication did not succeed (Initiator)")
3349 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3350 if ev is None:
3351 raise Exception("DPP authentication did not succeed (Responder)")
3352 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
3353 if ev is None:
3354 raise Exception("DPP configuration not completed (Configurator)")
3355 ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3356 if ev is None:
3357 raise Exception("DPP configuration not completed (Enrollee)")
3358 dev[0].request("DPP_STOP_LISTEN")
3359 dev[0].dump_monitor()
3360
3361 def test_dpp_pkex_hostapd_initiator(dev, apdev):
3362 """DPP PKEX with hostapd as initiator"""
3363 check_dpp_capab(dev[0])
3364 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
3365 "channel": "6" })
3366 check_dpp_capab(hapd)
3367
3368 cmd = "DPP_CONFIGURATOR_ADD"
3369 res = dev[0].request(cmd);
3370 if "FAIL" in res:
3371 raise Exception("Failed to add configurator")
3372 conf_id = int(res)
3373
3374 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3375 res = dev[0].request(cmd)
3376 if "FAIL" in res:
3377 raise Exception("Failed to generate bootstrapping info (wpa_supplicant)")
3378 id0 = int(res)
3379
3380 dev[0].set("dpp_configurator_params",
3381 " conf=ap-dpp configurator=%d" % conf_id);
3382
3383 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
3384 res = dev[0].request(cmd)
3385 if "FAIL" in res:
3386 raise Exception("Failed to set PKEX data (responder/wpa_supplicant)")
3387
3388 cmd = "DPP_LISTEN 2437 role=configurator"
3389 if "OK" not in dev[0].request(cmd):
3390 raise Exception("Failed to start listen operation")
3391
3392 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
3393 res = hapd.request(cmd)
3394 if "FAIL" in res:
3395 raise Exception("Failed to generate bootstrapping info (hostapd)")
3396 id_h = int(res)
3397
3398 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 role=enrollee code=secret" % (id_h)
3399 res = hapd.request(cmd)
3400 if "FAIL" in res:
3401 raise Exception("Failed to set PKEX data (initiator/hostapd)")
3402
3403 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3404 if ev is None:
3405 raise Exception("DPP authentication did not succeed (Initiator)")
3406 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3407 if ev is None:
3408 raise Exception("DPP authentication did not succeed (Responder)")
3409 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
3410 if ev is None:
3411 raise Exception("DPP configuration not completed (Configurator)")
3412 ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3413 if ev is None:
3414 raise Exception("DPP configuration not completed (Enrollee)")
3415 dev[0].request("DPP_STOP_LISTEN")
3416 dev[0].dump_monitor()
3417
3418 def test_dpp_hostapd_configurator(dev, apdev):
3419 """DPP with hostapd as configurator/initiator"""
3420 check_dpp_capab(dev[0])
3421 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
3422 "channel": "1" })
3423 check_dpp_capab(hapd)
3424
3425 cmd = "DPP_CONFIGURATOR_ADD"
3426 res = hapd.request(cmd);
3427 if "FAIL" in res:
3428 raise Exception("Failed to add configurator")
3429 conf_id = int(res)
3430
3431 addr = dev[0].own_addr().replace(':', '')
3432 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3433 res = dev[0].request(cmd)
3434 if "FAIL" in res:
3435 raise Exception("Failed to generate bootstrapping info")
3436 id0 = int(res)
3437 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
3438
3439 res = hapd.request("DPP_QR_CODE " + uri0)
3440 if "FAIL" in res:
3441 raise Exception("Failed to parse QR Code URI")
3442 id1 = int(res)
3443
3444 res = hapd.request("DPP_BOOTSTRAP_INFO %d" % id0)
3445 if "FAIL" in res:
3446 raise Exception("DPP_BOOTSTRAP_INFO failed")
3447 if "type=QRCODE" not in res:
3448 raise Exception("DPP_BOOTSTRAP_INFO did not report correct type")
3449 if "mac_addr=" + dev[0].own_addr() not in res:
3450 raise Exception("DPP_BOOTSTRAP_INFO did not report correct mac_addr")
3451
3452 cmd = "DPP_LISTEN 2412"
3453 if "OK" not in dev[0].request(cmd):
3454 raise Exception("Failed to start listen operation")
3455 cmd = "DPP_AUTH_INIT peer=%d configurator=%d conf=sta-dpp" % (id1, conf_id)
3456 if "OK" not in hapd.request(cmd):
3457 raise Exception("Failed to initiate DPP Authentication")
3458
3459 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3460 if ev is None:
3461 raise Exception("DPP authentication did not succeed (Responder)")
3462 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3463 if ev is None:
3464 raise Exception("DPP authentication did not succeed (Initiator)")
3465 ev = hapd.wait_event(["DPP-CONF-SENT"], timeout=5)
3466 if ev is None:
3467 raise Exception("DPP configuration not completed (Configurator)")
3468 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3469 if ev is None:
3470 raise Exception("DPP configuration not completed (Enrollee)")
3471 dev[0].request("DPP_STOP_LISTEN")
3472 dev[0].dump_monitor()
3473
3474 def test_dpp_hostapd_configurator_responder(dev, apdev):
3475 """DPP with hostapd as configurator/responder"""
3476 check_dpp_capab(dev[0])
3477 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured",
3478 "channel": "1" })
3479 check_dpp_capab(hapd)
3480
3481 cmd = "DPP_CONFIGURATOR_ADD"
3482 res = hapd.request(cmd);
3483 if "FAIL" in res:
3484 raise Exception("Failed to add configurator")
3485 conf_id = int(res)
3486
3487 hapd.set("dpp_configurator_params",
3488 " conf=sta-dpp configurator=%d" % conf_id);
3489
3490 addr = hapd.own_addr().replace(':', '')
3491 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3492 res = hapd.request(cmd)
3493 if "FAIL" in res:
3494 raise Exception("Failed to generate bootstrapping info")
3495 id0 = int(res)
3496 uri0 = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id0)
3497
3498 res = dev[0].request("DPP_QR_CODE " + uri0)
3499 if "FAIL" in res:
3500 raise Exception("Failed to parse QR Code URI")
3501 id1 = int(res)
3502
3503 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % (id1)
3504 if "OK" not in dev[0].request(cmd):
3505 raise Exception("Failed to initiate DPP Authentication")
3506
3507 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3508 if ev is None:
3509 raise Exception("DPP authentication did not succeed (Responder)")
3510 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3511 if ev is None:
3512 raise Exception("DPP authentication did not succeed (Initiator)")
3513 ev = hapd.wait_event(["DPP-CONF-SENT"], timeout=5)
3514 if ev is None:
3515 raise Exception("DPP configuration not completed (Configurator)")
3516 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3517 if ev is None:
3518 raise Exception("DPP configuration not completed (Enrollee)")
3519 dev[0].request("DPP_STOP_LISTEN")
3520 dev[0].dump_monitor()
3521
3522 def test_dpp_own_config(dev, apdev):
3523 """DPP configurator signing own connector"""
3524 try:
3525 run_dpp_own_config(dev, apdev)
3526 finally:
3527 dev[0].set("dpp_config_processing", "0")
3528
3529 def test_dpp_own_config_group_id(dev, apdev):
3530 """DPP configurator signing own connector"""
3531 try:
3532 run_dpp_own_config(dev, apdev, extra=" group_id=test-group")
3533 finally:
3534 dev[0].set("dpp_config_processing", "0")
3535
3536 def test_dpp_own_config_curve_mismatch(dev, apdev):
3537 """DPP configurator signing own connector using mismatching curve"""
3538 try:
3539 run_dpp_own_config(dev, apdev, own_curve="BP-384", expect_failure=True)
3540 finally:
3541 dev[0].set("dpp_config_processing", "0")
3542
3543 def run_dpp_own_config(dev, apdev, own_curve=None, expect_failure=False,
3544 extra=""):
3545 check_dpp_capab(dev[0], own_curve and "BP" in own_curve)
3546 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
3547 check_dpp_capab(hapd)
3548
3549 addr = hapd.own_addr().replace(':', '')
3550 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3551 res = hapd.request(cmd)
3552 if "FAIL" in res:
3553 raise Exception("Failed to generate bootstrapping info")
3554 id_h = int(res)
3555 uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
3556
3557 cmd = "DPP_CONFIGURATOR_ADD"
3558 res = dev[0].request(cmd);
3559 if "FAIL" in res:
3560 raise Exception("Failed to add configurator")
3561 conf_id = int(res)
3562
3563 res = dev[0].request("DPP_QR_CODE " + uri)
3564 if "FAIL" in res:
3565 raise Exception("Failed to parse QR Code URI")
3566 id = int(res)
3567
3568 cmd = "DPP_AUTH_INIT peer=%d conf=ap-dpp configurator=%d%s" % (id, conf_id, extra)
3569 if "OK" not in dev[0].request(cmd):
3570 raise Exception("Failed to initiate DPP Authentication")
3571 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3572 if ev is None:
3573 raise Exception("DPP authentication did not succeed (Responder)")
3574 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3575 if ev is None:
3576 raise Exception("DPP authentication did not succeed (Initiator)")
3577 ev = dev[0].wait_event(["DPP-CONF-SENT"], timeout=5)
3578 if ev is None:
3579 raise Exception("DPP configuration not completed (Configurator)")
3580 ev = hapd.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3581 if ev is None:
3582 raise Exception("DPP configuration not completed (Enrollee)")
3583
3584 update_hapd_config(hapd)
3585
3586 dev[0].set("dpp_config_processing", "1")
3587 cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d%s" % (conf_id, extra)
3588 if own_curve:
3589 cmd += " curve=" + own_curve
3590 res = dev[0].request(cmd)
3591 if "FAIL" in res:
3592 raise Exception("Failed to generate own configuration")
3593
3594 ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
3595 if ev is None:
3596 raise Exception("DPP network profile not generated")
3597 id = ev.split(' ')[1]
3598 dev[0].select_network(id, freq="2412")
3599 if expect_failure:
3600 ev = dev[0].wait_event(["CTRL-EVENT-CONNECTED"], timeout=1)
3601 if ev is not None:
3602 raise Exception("Unexpected connection");
3603 dev[0].request("DISCONNECT")
3604 else:
3605 dev[0].wait_connected()
3606
3607 def test_dpp_own_config_ap(dev, apdev):
3608 """DPP configurator (AP) signing own connector"""
3609 try:
3610 run_dpp_own_config_ap(dev, apdev)
3611 finally:
3612 dev[0].set("dpp_config_processing", "0")
3613
3614 def test_dpp_own_config_ap_group_id(dev, apdev):
3615 """DPP configurator (AP) signing own connector (group_id)"""
3616 try:
3617 run_dpp_own_config_ap(dev, apdev, extra=" group_id=test-group")
3618 finally:
3619 dev[0].set("dpp_config_processing", "0")
3620
3621 def test_dpp_own_config_ap_reconf(dev, apdev):
3622 """DPP configurator (AP) signing own connector and configurator reconf"""
3623 try:
3624 run_dpp_own_config_ap(dev, apdev)
3625 finally:
3626 dev[0].set("dpp_config_processing", "0")
3627
3628 def run_dpp_own_config_ap(dev, apdev, reconf_configurator=False, extra=""):
3629 check_dpp_capab(dev[0])
3630 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
3631 check_dpp_capab(hapd)
3632
3633 cmd = "DPP_CONFIGURATOR_ADD"
3634 res = hapd.request(cmd);
3635 if "FAIL" in res:
3636 raise Exception("Failed to add configurator")
3637 conf_id = int(res)
3638
3639 if reconf_configurator:
3640 csign = hapd.request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id)
3641 if "FAIL" in csign or len(csign) == 0:
3642 raise Exception("DPP_CONFIGURATOR_GET_KEY failed")
3643
3644 cmd = "DPP_CONFIGURATOR_SIGN conf=ap-dpp configurator=%d%s" % (conf_id, extra)
3645 res = hapd.request(cmd)
3646 if "FAIL" in res:
3647 raise Exception("Failed to generate own configuration")
3648 update_hapd_config(hapd)
3649
3650 if reconf_configurator:
3651 res = hapd.request("DPP_CONFIGURATOR_REMOVE %d" % conf_id)
3652 if "OK" not in res:
3653 raise Exception("DPP_CONFIGURATOR_REMOVE failed")
3654 cmd = "DPP_CONFIGURATOR_ADD key=" + csign
3655 res = hapd.request(cmd);
3656 if "FAIL" in res:
3657 raise Exception("Failed to add configurator (reconf)")
3658 conf_id = int(res)
3659
3660 addr = dev[0].own_addr().replace(':', '')
3661 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3662 res = dev[0].request(cmd)
3663 if "FAIL" in res:
3664 raise Exception("Failed to generate bootstrapping info")
3665 id = int(res)
3666 uri = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id)
3667
3668 res = hapd.request("DPP_QR_CODE " + uri)
3669 if "FAIL" in res:
3670 raise Exception("Failed to parse QR Code URI")
3671 id = int(res)
3672
3673 dev[0].set("dpp_config_processing", "2")
3674 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
3675 raise Exception("Failed to start listen operation")
3676 cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d%s" % (id, conf_id, extra)
3677 if "OK" not in hapd.request(cmd):
3678 raise Exception("Failed to initiate DPP Authentication")
3679 ev = hapd.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
3680 if ev is None:
3681 raise Exception("DPP authentication did not succeed (Initiator)")
3682 ev = hapd.wait_event(["DPP-CONF-SENT"], timeout=5)
3683 if ev is None:
3684 raise Exception("DPP configuration not completed (Configurator)")
3685 ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
3686 if ev is None:
3687 raise Exception("DPP configuration not completed (Enrollee)")
3688 if "DPP-CONF-RECEIVED" not in ev:
3689 raise Exception("DPP configuration failed (Enrollee)")
3690
3691 dev[0].wait_connected()
3692
3693 def test_dpp_intro_mismatch(dev, apdev):
3694 """DPP network introduction mismatch cases"""
3695 try:
3696 wpas = None
3697 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
3698 wpas.interface_add("wlan5")
3699 check_dpp_capab(wpas)
3700 run_dpp_intro_mismatch(dev, apdev, wpas)
3701 finally:
3702 dev[0].set("dpp_config_processing", "0")
3703 dev[2].set("dpp_config_processing", "0")
3704 if wpas:
3705 wpas.set("dpp_config_processing", "0")
3706
3707 def run_dpp_intro_mismatch(dev, apdev, wpas):
3708 check_dpp_capab(dev[0])
3709 check_dpp_capab(dev[1])
3710 check_dpp_capab(dev[2])
3711
3712 logger.info("Start AP in unconfigured state")
3713 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
3714 check_dpp_capab(hapd)
3715
3716 addr = hapd.own_addr().replace(':', '')
3717 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3718 res = hapd.request(cmd)
3719 if "FAIL" in res:
3720 raise Exception("Failed to generate bootstrapping info")
3721 id_h = int(res)
3722 uri = hapd.request("DPP_BOOTSTRAP_GET_URI %d" % id_h)
3723
3724 logger.info("Provision AP with DPP configuration")
3725 res = dev[1].request("DPP_CONFIGURATOR_ADD");
3726 if "FAIL" in res:
3727 raise Exception("Failed to add configurator")
3728 conf_id = int(res)
3729
3730 res = dev[1].request("DPP_QR_CODE " + uri)
3731 if "FAIL" in res:
3732 raise Exception("Failed to parse QR Code URI")
3733 id = int(res)
3734
3735 dev[1].set("dpp_groups_override", '[{"groupId":"a","netRole":"ap"}]')
3736 cmd = "DPP_AUTH_INIT peer=%d conf=ap-dpp configurator=%d" % (id, conf_id)
3737 if "OK" not in dev[1].request(cmd):
3738 raise Exception("Failed to initiate DPP Authentication")
3739 update_hapd_config(hapd)
3740
3741 logger.info("Provision STA0 with DPP Connector that has mismatching groupId")
3742 dev[0].set("dpp_config_processing", "2")
3743 addr = dev[0].own_addr().replace(':', '')
3744 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3745 res = dev[0].request(cmd)
3746 if "FAIL" in res:
3747 raise Exception("Failed to generate bootstrapping info")
3748 id0 = int(res)
3749 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
3750
3751 res = dev[1].request("DPP_QR_CODE " + uri0)
3752 if "FAIL" in res:
3753 raise Exception("Failed to parse QR Code URI")
3754 id1 = int(res)
3755
3756 cmd = "DPP_LISTEN 2412"
3757 if "OK" not in dev[0].request(cmd):
3758 raise Exception("Failed to start listen operation")
3759
3760 dev[1].set("dpp_groups_override", '[{"groupId":"b","netRole":"sta"}]')
3761 cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id)
3762 if "OK" not in dev[1].request(cmd):
3763 raise Exception("Failed to initiate DPP Authentication")
3764 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
3765 if ev is None:
3766 raise Exception("DPP configuration not completed (Configurator for STA0)")
3767 ev = dev[0].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3768 if ev is None:
3769 raise Exception("DPP configuration not completed (Enrollee STA0)")
3770
3771 logger.info("Provision STA2 with DPP Connector that has mismatching C-sign-key")
3772 dev[2].set("dpp_config_processing", "2")
3773 addr = dev[2].own_addr().replace(':', '')
3774 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3775 res = dev[2].request(cmd)
3776 if "FAIL" in res:
3777 raise Exception("Failed to generate bootstrapping info")
3778 id2 = int(res)
3779 uri2 = dev[2].request("DPP_BOOTSTRAP_GET_URI %d" % id2)
3780
3781 res = dev[1].request("DPP_QR_CODE " + uri2)
3782 if "FAIL" in res:
3783 raise Exception("Failed to parse QR Code URI")
3784 id1 = int(res)
3785
3786 cmd = "DPP_LISTEN 2412"
3787 if "OK" not in dev[2].request(cmd):
3788 raise Exception("Failed to start listen operation")
3789
3790 res = dev[1].request("DPP_CONFIGURATOR_ADD");
3791 if "FAIL" in res:
3792 raise Exception("Failed to add configurator")
3793 conf_id_2 = int(res)
3794 dev[1].set("dpp_groups_override", '')
3795 cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id_2)
3796 if "OK" not in dev[1].request(cmd):
3797 raise Exception("Failed to initiate DPP Authentication")
3798 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
3799 if ev is None:
3800 raise Exception("DPP configuration not completed (Configurator for STA2)")
3801 ev = dev[2].wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3802 if ev is None:
3803 raise Exception("DPP configuration not completed (Enrollee STA2)")
3804
3805 logger.info("Provision STA5 with DPP Connector that has mismatching netAccessKey EC group")
3806 wpas.set("dpp_config_processing", "2")
3807 addr = wpas.own_addr().replace(':', '')
3808 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
3809 cmd += " curve=P-521"
3810 res = wpas.request(cmd)
3811 if "FAIL" in res:
3812 raise Exception("Failed to generate bootstrapping info")
3813 id5 = int(res)
3814 uri5 = wpas.request("DPP_BOOTSTRAP_GET_URI %d" % id5)
3815
3816 res = dev[1].request("DPP_QR_CODE " + uri5)
3817 if "FAIL" in res:
3818 raise Exception("Failed to parse QR Code URI")
3819 id1 = int(res)
3820
3821 cmd = "DPP_LISTEN 2412"
3822 if "OK" not in wpas.request(cmd):
3823 raise Exception("Failed to start listen operation")
3824
3825 dev[1].set("dpp_groups_override", '')
3826 cmd = "DPP_AUTH_INIT peer=%d conf=sta-dpp configurator=%d" % (id1, conf_id)
3827 if "OK" not in dev[1].request(cmd):
3828 raise Exception("Failed to initiate DPP Authentication")
3829 ev = dev[1].wait_event(["DPP-CONF-SENT"], timeout=5)
3830 if ev is None:
3831 raise Exception("DPP configuration not completed (Configurator for STA0)")
3832 ev = wpas.wait_event(["DPP-CONF-RECEIVED"], timeout=5)
3833 if ev is None:
3834 raise Exception("DPP configuration not completed (Enrollee STA5)")
3835
3836 logger.info("Verify network introduction results")
3837 ev = dev[0].wait_event(["DPP-INTRO"], timeout=10)
3838 if ev is None:
3839 raise Exception("DPP network introduction result not seen on STA0")
3840 if "status=8" not in ev:
3841 raise Exception("Unexpected network introduction result on STA0: " + ev)
3842
3843 ev = dev[2].wait_event(["DPP-INTRO"], timeout=5)
3844 if ev is None:
3845 raise Exception("DPP network introduction result not seen on STA2")
3846 if "status=8" not in ev:
3847 raise Exception("Unexpected network introduction result on STA2: " + ev)
3848
3849 ev = wpas.wait_event(["DPP-INTRO"], timeout=10)
3850 if ev is None:
3851 raise Exception("DPP network introduction result not seen on STA5")
3852 if "status=7" not in ev:
3853 raise Exception("Unexpected network introduction result on STA5: " + ev)
3854
3855 def run_dpp_proto_init(dev, test_dev, test, mutual=False, unicast=True,
3856 listen=True, chan="81/1", init_enrollee=False,
3857 incompatible_roles=False):
3858 check_dpp_capab(dev[0])
3859 check_dpp_capab(dev[1])
3860 dev[test_dev].set("dpp_test", str(test))
3861
3862 cmd = "DPP_CONFIGURATOR_ADD"
3863 if init_enrollee:
3864 res = dev[0].request(cmd)
3865 else:
3866 res = dev[1].request(cmd)
3867 if "FAIL" in res:
3868 raise Exception("Failed to add configurator")
3869 conf_id = int(res)
3870
3871 addr = dev[0].own_addr().replace(':', '')
3872 cmd = "DPP_BOOTSTRAP_GEN type=qrcode"
3873 if chan:
3874 cmd += " chan=" + chan
3875 if unicast:
3876 cmd += " mac=" + addr
3877 res = dev[0].request(cmd)
3878 if "FAIL" in res:
3879 raise Exception("Failed to generate bootstrapping info")
3880 id0 = int(res)
3881 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
3882
3883 res = dev[1].request("DPP_QR_CODE " + uri0)
3884 if "FAIL" in res:
3885 raise Exception("Failed to parse QR Code URI")
3886 id1 = int(res)
3887
3888 if mutual:
3889 addr = dev[1].own_addr().replace(':', '')
3890 res = dev[1].request("DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr)
3891 if "FAIL" in res:
3892 raise Exception("Failed to generate bootstrapping info")
3893 id1b = int(res)
3894 uri1b = dev[1].request("DPP_BOOTSTRAP_GET_URI %d" % id1b)
3895
3896 res = dev[0].request("DPP_QR_CODE " + uri1b)
3897 if "FAIL" in res:
3898 raise Exception("Failed to parse QR Code URI")
3899 id0b = int(res)
3900
3901 cmd = "DPP_LISTEN 2412 qr=mutual"
3902 else:
3903 cmd = "DPP_LISTEN 2412"
3904
3905 if init_enrollee:
3906 if incompatible_roles:
3907 cmd += " role=enrollee"
3908 else:
3909 cmd += " role=configurator"
3910 dev[0].set("dpp_configurator_params",
3911 " conf=sta-dpp configurator=%d" % conf_id);
3912 elif incompatible_roles:
3913 cmd += " role=enrollee"
3914
3915 if listen:
3916 if "OK" not in dev[0].request(cmd):
3917 raise Exception("Failed to start listen operation")
3918
3919 if init_enrollee:
3920 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % (id1)
3921 else:
3922 cmd = "DPP_AUTH_INIT peer=%d configurator=%d conf=sta-dpp" % (id1, conf_id)
3923 if incompatible_roles:
3924 cmd += " role=enrollee"
3925 if mutual:
3926 cmd += " own=%d" % id1b
3927 if "OK" not in dev[1].request(cmd):
3928 raise Exception("Failed to initiate DPP Authentication")
3929
3930 def test_dpp_proto_after_wrapped_data_auth_req(dev, apdev):
3931 """DPP protocol testing - attribute after Wrapped Data in Auth Req"""
3932 run_dpp_proto_init(dev, 1, 1)
3933 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
3934 if ev is None:
3935 raise Exception("DPP Authentication Request not seen")
3936 if "type=0" not in ev or "ignore=invalid-attributes" not in ev:
3937 raise Exception("Unexpected RX info: " + ev)
3938 ev = dev[1].wait_event(["DPP-RX"], timeout=0.1)
3939 if ev is not None:
3940 raise Exception("Unexpected DPP message seen")
3941
3942 def test_dpp_auth_req_stop_after_ack(dev, apdev):
3943 """DPP initiator stopping after ACK, but no response"""
3944 run_dpp_proto_init(dev, 1, 1, listen=True)
3945 ev = dev[1].wait_event(["DPP-AUTH-INIT-FAILED"], timeout=5)
3946 if ev is None:
3947 raise Exception("Authentication failure not reported")
3948
3949 def test_dpp_auth_req_retries(dev, apdev):
3950 """DPP initiator retries with no ACK"""
3951 check_dpp_capab(dev[1])
3952 dev[1].set("dpp_init_max_tries", "3")
3953 dev[1].set("dpp_init_retry_time", "1000")
3954 dev[1].set("dpp_resp_wait_time", "100")
3955 run_dpp_proto_init(dev, 1, 1, unicast=False, listen=False)
3956
3957 for i in range(3):
3958 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
3959 if ev is None:
3960 raise Exception("Auth Req not sent (%d)" % i)
3961
3962 ev = dev[1].wait_event(["DPP-AUTH-INIT-FAILED"], timeout=5)
3963 if ev is None:
3964 raise Exception("Authentication failure not reported")
3965
3966 def test_dpp_auth_req_retries_multi_chan(dev, apdev):
3967 """DPP initiator retries with no ACK and multiple channels"""
3968 check_dpp_capab(dev[1])
3969 dev[1].set("dpp_init_max_tries", "3")
3970 dev[1].set("dpp_init_retry_time", "1000")
3971 dev[1].set("dpp_resp_wait_time", "100")
3972 run_dpp_proto_init(dev, 1, 1, unicast=False, listen=False,
3973 chan="81/1,81/6,81/11")
3974
3975 for i in range(3 * 3):
3976 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
3977 if ev is None:
3978 raise Exception("Auth Req not sent (%d)" % i)
3979
3980 ev = dev[1].wait_event(["DPP-AUTH-INIT-FAILED"], timeout=5)
3981 if ev is None:
3982 raise Exception("Authentication failure not reported")
3983
3984 def test_dpp_proto_after_wrapped_data_auth_resp(dev, apdev):
3985 """DPP protocol testing - attribute after Wrapped Data in Auth Resp"""
3986 run_dpp_proto_init(dev, 0, 2)
3987 ev = dev[1].wait_event(["DPP-RX"], timeout=5)
3988 if ev is None:
3989 raise Exception("DPP Authentication Response not seen")
3990 if "type=1" not in ev or "ignore=invalid-attributes" not in ev:
3991 raise Exception("Unexpected RX info: " + ev)
3992 ev = dev[0].wait_event(["DPP-RX"], timeout=1)
3993 if ev is None or "type=0" not in ev:
3994 raise Exception("DPP Authentication Request not seen")
3995 ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
3996 if ev is not None:
3997 raise Exception("Unexpected DPP message seen")
3998
3999 def test_dpp_proto_after_wrapped_data_auth_conf(dev, apdev):
4000 """DPP protocol testing - attribute after Wrapped Data in Auth Conf"""
4001 run_dpp_proto_init(dev, 1, 3)
4002 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
4003 if ev is None or "type=0" not in ev:
4004 raise Exception("DPP Authentication Request not seen")
4005 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
4006 if ev is None:
4007 raise Exception("DPP Authentication Confirm not seen")
4008 if "type=2" not in ev or "ignore=invalid-attributes" not in ev:
4009 raise Exception("Unexpected RX info: " + ev)
4010
4011 def test_dpp_proto_after_wrapped_data_conf_req(dev, apdev):
4012 """DPP protocol testing - attribute after Wrapped Data in Conf Req"""
4013 run_dpp_proto_init(dev, 0, 6)
4014 ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=10)
4015 if ev is None:
4016 raise Exception("DPP Configuration failure not seen")
4017
4018 def test_dpp_proto_after_wrapped_data_conf_resp(dev, apdev):
4019 """DPP protocol testing - attribute after Wrapped Data in Conf Resp"""
4020 run_dpp_proto_init(dev, 1, 7)
4021 ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=10)
4022 if ev is None:
4023 raise Exception("DPP Configuration failure not seen")
4024
4025 def test_dpp_proto_zero_i_capab(dev, apdev):
4026 """DPP protocol testing - zero I-capability in Auth Req"""
4027 run_dpp_proto_init(dev, 1, 8)
4028 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4029 if ev is None:
4030 raise Exception("DPP failure not seen")
4031 if "Invalid role in I-capabilities 0x00" not in ev:
4032 raise Exception("Unexpected failure: " + ev)
4033 ev = dev[1].wait_event(["DPP-RX"], timeout=0.1)
4034 if ev is not None:
4035 raise Exception("Unexpected DPP message seen")
4036
4037 def test_dpp_proto_zero_r_capab(dev, apdev):
4038 """DPP protocol testing - zero R-capability in Auth Resp"""
4039 run_dpp_proto_init(dev, 0, 9)
4040 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4041 if ev is None:
4042 raise Exception("DPP failure not seen")
4043 if "Unexpected role in R-capabilities 0x00" not in ev:
4044 raise Exception("Unexpected failure: " + ev)
4045 ev = dev[0].wait_event(["DPP-RX"], timeout=1)
4046 if ev is None or "type=0" not in ev:
4047 raise Exception("DPP Authentication Request not seen")
4048 ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
4049 if ev is not None:
4050 raise Exception("Unexpected DPP message seen")
4051
4052 def run_dpp_proto_auth_req_missing(dev, test, reason, mutual=False):
4053 run_dpp_proto_init(dev, 1, test, mutual=mutual)
4054 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4055 if ev is None:
4056 raise Exception("DPP failure not seen")
4057 if reason not in ev:
4058 raise Exception("Unexpected failure: " + ev)
4059 ev = dev[1].wait_event(["DPP-RX"], timeout=0.1)
4060 if ev is not None:
4061 raise Exception("Unexpected DPP message seen")
4062
4063 def test_dpp_proto_auth_req_no_r_bootstrap_key(dev, apdev):
4064 """DPP protocol testing - no R-bootstrap key in Auth Req"""
4065 run_dpp_proto_auth_req_missing(dev, 10, "Missing or invalid required Responder Bootstrapping Key Hash attribute")
4066
4067 def test_dpp_proto_auth_req_invalid_r_bootstrap_key(dev, apdev):
4068 """DPP protocol testing - invalid R-bootstrap key in Auth Req"""
4069 run_dpp_proto_auth_req_missing(dev, 68, "No matching own bootstrapping key found - ignore message")
4070
4071 def test_dpp_proto_auth_req_no_i_bootstrap_key(dev, apdev):
4072 """DPP protocol testing - no I-bootstrap key in Auth Req"""
4073 run_dpp_proto_auth_req_missing(dev, 11, "Missing or invalid required Initiator Bootstrapping Key Hash attribute")
4074
4075 def test_dpp_proto_auth_req_invalid_i_bootstrap_key(dev, apdev):
4076 """DPP protocol testing - invalid I-bootstrap key in Auth Req"""
4077 run_dpp_proto_init(dev, 1, 69, mutual=True)
4078 ev = dev[0].wait_event(["DPP-SCAN-PEER-QR-CODE"], timeout=5)
4079 if ev is None:
4080 raise Exception("DPP scan request not seen")
4081 ev = dev[1].wait_event(["DPP-RESPONSE-PENDING"], timeout=5)
4082 if ev is None:
4083 raise Exception("DPP response pending indivation not seen")
4084
4085 def test_dpp_proto_auth_req_no_i_proto_key(dev, apdev):
4086 """DPP protocol testing - no I-proto key in Auth Req"""
4087 run_dpp_proto_auth_req_missing(dev, 12, "Missing required Initiator Protocol Key attribute")
4088
4089 def test_dpp_proto_auth_req_invalid_i_proto_key(dev, apdev):
4090 """DPP protocol testing - invalid I-proto key in Auth Req"""
4091 run_dpp_proto_auth_req_missing(dev, 66, "Invalid Initiator Protocol Key")
4092
4093 def test_dpp_proto_auth_req_no_i_nonce(dev, apdev):
4094 """DPP protocol testing - no I-nonce in Auth Req"""
4095 run_dpp_proto_auth_req_missing(dev, 13, "Missing or invalid I-nonce")
4096
4097 def test_dpp_proto_auth_req_invalid_i_nonce(dev, apdev):
4098 """DPP protocol testing - invalid I-nonce in Auth Req"""
4099 run_dpp_proto_auth_req_missing(dev, 81, "Missing or invalid I-nonce")
4100
4101 def test_dpp_proto_auth_req_no_i_capab(dev, apdev):
4102 """DPP protocol testing - no I-capab in Auth Req"""
4103 run_dpp_proto_auth_req_missing(dev, 14, "Missing or invalid I-capab")
4104
4105 def test_dpp_proto_auth_req_no_wrapped_data(dev, apdev):
4106 """DPP protocol testing - no Wrapped Data in Auth Req"""
4107 run_dpp_proto_auth_req_missing(dev, 15, "Missing or invalid required Wrapped Data attribute")
4108
4109 def run_dpp_proto_auth_resp_missing(dev, test, reason,
4110 incompatible_roles=False):
4111 run_dpp_proto_init(dev, 0, test, mutual=True,
4112 incompatible_roles=incompatible_roles)
4113 if reason is None:
4114 time.sleep(0.1)
4115 return
4116 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4117 if ev is None:
4118 raise Exception("DPP failure not seen")
4119 if reason not in ev:
4120 raise Exception("Unexpected failure: " + ev)
4121 ev = dev[0].wait_event(["DPP-RX"], timeout=1)
4122 if ev is None or "type=0" not in ev:
4123 raise Exception("DPP Authentication Request not seen")
4124 ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
4125 if ev is not None:
4126 raise Exception("Unexpected DPP message seen")
4127
4128 def test_dpp_proto_auth_resp_no_status(dev, apdev):
4129 """DPP protocol testing - no Status in Auth Resp"""
4130 run_dpp_proto_auth_resp_missing(dev, 16, "Missing or invalid required DPP Status attribute")
4131
4132 def test_dpp_proto_auth_resp_status_no_status(dev, apdev):
4133 """DPP protocol testing - no Status in Auth Resp(status)"""
4134 run_dpp_proto_auth_resp_missing(dev, 16,
4135 "Missing or invalid required DPP Status attribute",
4136 incompatible_roles=True)
4137
4138 def test_dpp_proto_auth_resp_invalid_status(dev, apdev):
4139 """DPP protocol testing - invalid Status in Auth Resp"""
4140 run_dpp_proto_auth_resp_missing(dev, 74, "Responder reported failure")
4141
4142 def test_dpp_proto_auth_resp_no_r_bootstrap_key(dev, apdev):
4143 """DPP protocol testing - no R-bootstrap key in Auth Resp"""
4144 run_dpp_proto_auth_resp_missing(dev, 17, "Missing or invalid required Responder Bootstrapping Key Hash attribute")
4145
4146 def test_dpp_proto_auth_resp_status_no_r_bootstrap_key(dev, apdev):
4147 """DPP protocol testing - no R-bootstrap key in Auth Resp(status)"""
4148 run_dpp_proto_auth_resp_missing(dev, 17,
4149 "Missing or invalid required Responder Bootstrapping Key Hash attribute",
4150 incompatible_roles=True)
4151
4152 def test_dpp_proto_auth_resp_invalid_r_bootstrap_key(dev, apdev):
4153 """DPP protocol testing - invalid R-bootstrap key in Auth Resp"""
4154 run_dpp_proto_auth_resp_missing(dev, 70, "Unexpected Responder Bootstrapping Key Hash value")
4155
4156 def test_dpp_proto_auth_resp_status_invalid_r_bootstrap_key(dev, apdev):
4157 """DPP protocol testing - invalid R-bootstrap key in Auth Resp(status)"""
4158 run_dpp_proto_auth_resp_missing(dev, 70,
4159 "Unexpected Responder Bootstrapping Key Hash value",
4160 incompatible_roles=True)
4161
4162 def test_dpp_proto_auth_resp_no_i_bootstrap_key(dev, apdev):
4163 """DPP protocol testing - no I-bootstrap key in Auth Resp"""
4164 run_dpp_proto_auth_resp_missing(dev, 18, None)
4165
4166 def test_dpp_proto_auth_resp_status_no_i_bootstrap_key(dev, apdev):
4167 """DPP protocol testing - no I-bootstrap key in Auth Resp(status)"""
4168 run_dpp_proto_auth_resp_missing(dev, 18, None, incompatible_roles=True)
4169
4170 def test_dpp_proto_auth_resp_invalid_i_bootstrap_key(dev, apdev):
4171 """DPP protocol testing - invalid I-bootstrap key in Auth Resp"""
4172 run_dpp_proto_auth_resp_missing(dev, 71, "Initiator Bootstrapping Key Hash attribute did not match")
4173
4174 def test_dpp_proto_auth_resp_status_invalid_i_bootstrap_key(dev, apdev):
4175 """DPP protocol testing - invalid I-bootstrap key in Auth Resp(status)"""
4176 run_dpp_proto_auth_resp_missing(dev, 71,
4177 "Initiator Bootstrapping Key Hash attribute did not match",
4178 incompatible_roles=True)
4179
4180 def test_dpp_proto_auth_resp_no_r_proto_key(dev, apdev):
4181 """DPP protocol testing - no R-Proto Key in Auth Resp"""
4182 run_dpp_proto_auth_resp_missing(dev, 19, "Missing required Responder Protocol Key attribute")
4183
4184 def test_dpp_proto_auth_resp_invalid_r_proto_key(dev, apdev):
4185 """DPP protocol testing - invalid R-Proto Key in Auth Resp"""
4186 run_dpp_proto_auth_resp_missing(dev, 67, "Invalid Responder Protocol Key")
4187
4188 def test_dpp_proto_auth_resp_no_r_nonce(dev, apdev):
4189 """DPP protocol testing - no R-nonce in Auth Resp"""
4190 run_dpp_proto_auth_resp_missing(dev, 20, "Missing or invalid R-nonce")
4191
4192 def test_dpp_proto_auth_resp_no_i_nonce(dev, apdev):
4193 """DPP protocol testing - no I-nonce in Auth Resp"""
4194 run_dpp_proto_auth_resp_missing(dev, 21, "Missing or invalid I-nonce")
4195
4196 def test_dpp_proto_auth_resp_status_no_i_nonce(dev, apdev):
4197 """DPP protocol testing - no I-nonce in Auth Resp(status)"""
4198 run_dpp_proto_auth_resp_missing(dev, 21, "Missing or invalid I-nonce",
4199 incompatible_roles=True)
4200
4201 def test_dpp_proto_auth_resp_no_r_capab(dev, apdev):
4202 """DPP protocol testing - no R-capab in Auth Resp"""
4203 run_dpp_proto_auth_resp_missing(dev, 22, "Missing or invalid R-capabilities")
4204
4205 def test_dpp_proto_auth_resp_no_r_auth(dev, apdev):
4206 """DPP protocol testing - no R-auth in Auth Resp"""
4207 run_dpp_proto_auth_resp_missing(dev, 23, "Missing or invalid Secondary Wrapped Data")
4208
4209 def test_dpp_proto_auth_resp_no_wrapped_data(dev, apdev):
4210 """DPP protocol testing - no Wrapped Data in Auth Resp"""
4211 run_dpp_proto_auth_resp_missing(dev, 24, "Missing or invalid required Wrapped Data attribute")
4212
4213 def test_dpp_proto_auth_resp_i_nonce_mismatch(dev, apdev):
4214 """DPP protocol testing - I-nonce mismatch in Auth Resp"""
4215 run_dpp_proto_init(dev, 0, 30, mutual=True)
4216 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4217 if ev is None:
4218 raise Exception("DPP failure not seen")
4219 if "I-nonce mismatch" not in ev:
4220 raise Exception("Unexpected failure: " + ev)
4221 ev = dev[0].wait_event(["DPP-RX"], timeout=1)
4222 if ev is None or "type=0" not in ev:
4223 raise Exception("DPP Authentication Request not seen")
4224 ev = dev[0].wait_event(["DPP-RX"], timeout=0.1)
4225 if ev is not None:
4226 raise Exception("Unexpected DPP message seen")
4227
4228 def test_dpp_proto_auth_resp_incompatible_r_capab(dev, apdev):
4229 """DPP protocol testing - Incompatible R-capab in Auth Resp"""
4230 run_dpp_proto_init(dev, 0, 31, mutual=True)
4231 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4232 if ev is None:
4233 raise Exception("DPP failure not seen")
4234 if "Unexpected role in R-capabilities 0x02" not in ev:
4235 raise Exception("Unexpected failure: " + ev)
4236 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4237 if ev is None:
4238 raise Exception("DPP failure not seen")
4239 if "Peer reported incompatible R-capab role" not in ev:
4240 raise Exception("Unexpected failure: " + ev)
4241
4242 def test_dpp_proto_auth_resp_r_auth_mismatch(dev, apdev):
4243 """DPP protocol testing - R-auth mismatch in Auth Resp"""
4244 run_dpp_proto_init(dev, 0, 32, mutual=True)
4245 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4246 if ev is None:
4247 raise Exception("DPP failure not seen")
4248 if "Mismatching Responder Authenticating Tag" not in ev:
4249 raise Exception("Unexpected failure: " + ev)
4250 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4251 if ev is None:
4252 raise Exception("DPP failure not seen")
4253 if "Peer reported authentication failure" not in ev:
4254 raise Exception("Unexpected failure: " + ev)
4255
4256 def test_dpp_proto_auth_resp_r_auth_mismatch_failure(dev, apdev):
4257 """DPP protocol testing - Auth Conf RX processing failure"""
4258 with alloc_fail(dev[0], 1, "dpp_auth_conf_rx_failure"):
4259 run_dpp_proto_init(dev, 0, 32, mutual=True)
4260 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4261 if ev is None:
4262 raise Exception("DPP failure not seen")
4263 if "Authentication failed" not in ev:
4264 raise Exception("Unexpected failure: " + ev)
4265
4266 def test_dpp_proto_auth_resp_r_auth_mismatch_failure2(dev, apdev):
4267 """DPP protocol testing - Auth Conf RX processing failure 2"""
4268 with fail_test(dev[0], 1, "dpp_auth_conf_rx_failure"):
4269 run_dpp_proto_init(dev, 0, 32, mutual=True)
4270 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4271 if ev is None:
4272 raise Exception("DPP failure not seen")
4273 if "AES-SIV decryption failed" not in ev:
4274 raise Exception("Unexpected failure: " + ev)
4275
4276 def run_dpp_proto_auth_conf_missing(dev, test, reason):
4277 run_dpp_proto_init(dev, 1, test, mutual=True)
4278 if reason is None:
4279 time.sleep(0.1)
4280 return
4281 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4282 if ev is None:
4283 raise Exception("DPP failure not seen")
4284 if reason not in ev:
4285 raise Exception("Unexpected failure: " + ev)
4286
4287 def test_dpp_proto_auth_conf_no_status(dev, apdev):
4288 """DPP protocol testing - no Status in Auth Conf"""
4289 run_dpp_proto_auth_conf_missing(dev, 25, "Missing or invalid required DPP Status attribute")
4290
4291 def test_dpp_proto_auth_conf_invalid_status(dev, apdev):
4292 """DPP protocol testing - invalid Status in Auth Conf"""
4293 run_dpp_proto_auth_conf_missing(dev, 75, "Authentication failed")
4294
4295 def test_dpp_proto_auth_conf_no_r_bootstrap_key(dev, apdev):
4296 """DPP protocol testing - no R-bootstrap key in Auth Conf"""
4297 run_dpp_proto_auth_conf_missing(dev, 26, "Missing or invalid required Responder Bootstrapping Key Hash attribute")
4298
4299 def test_dpp_proto_auth_conf_invalid_r_bootstrap_key(dev, apdev):
4300 """DPP protocol testing - invalid R-bootstrap key in Auth Conf"""
4301 run_dpp_proto_auth_conf_missing(dev, 72, "Responder Bootstrapping Key Hash mismatch")
4302
4303 def test_dpp_proto_auth_conf_no_i_bootstrap_key(dev, apdev):
4304 """DPP protocol testing - no I-bootstrap key in Auth Conf"""
4305 run_dpp_proto_auth_conf_missing(dev, 27, "Missing Initiator Bootstrapping Key Hash attribute")
4306
4307 def test_dpp_proto_auth_conf_invalid_i_bootstrap_key(dev, apdev):
4308 """DPP protocol testing - invalid I-bootstrap key in Auth Conf"""
4309 run_dpp_proto_auth_conf_missing(dev, 73, "Initiator Bootstrapping Key Hash mismatch")
4310
4311 def test_dpp_proto_auth_conf_no_i_auth(dev, apdev):
4312 """DPP protocol testing - no I-Auth in Auth Conf"""
4313 run_dpp_proto_auth_conf_missing(dev, 28, "Missing or invalid Initiator Authenticating Tag")
4314
4315 def test_dpp_proto_auth_conf_no_wrapped_data(dev, apdev):
4316 """DPP protocol testing - no Wrapped Data in Auth Conf"""
4317 run_dpp_proto_auth_conf_missing(dev, 29, "Missing or invalid required Wrapped Data attribute")
4318
4319 def test_dpp_proto_auth_conf_i_auth_mismatch(dev, apdev):
4320 """DPP protocol testing - I-auth mismatch in Auth Conf"""
4321 run_dpp_proto_init(dev, 1, 33, mutual=True)
4322 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4323 if ev is None:
4324 raise Exception("DPP failure not seen")
4325 if "Mismatching Initiator Authenticating Tag" not in ev:
4326 raise Excception("Unexpected failure: " + ev)
4327
4328 def test_dpp_proto_auth_conf_replaced_by_resp(dev, apdev):
4329 """DPP protocol testing - Auth Conf replaced by Resp"""
4330 run_dpp_proto_init(dev, 1, 65, mutual=True)
4331 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4332 if ev is None:
4333 raise Exception("DPP failure not seen")
4334 if "Unexpected Authentication Response" not in ev:
4335 raise Excception("Unexpected failure: " + ev)
4336
4337 def run_dpp_proto_conf_req_missing(dev, test, reason):
4338 run_dpp_proto_init(dev, 0, test)
4339 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4340 if ev is None:
4341 raise Exception("DPP failure not seen")
4342 if reason not in ev:
4343 raise Exception("Unexpected failure: " + ev)
4344
4345 def test_dpp_proto_conf_req_no_e_nonce(dev, apdev):
4346 """DPP protocol testing - no E-nonce in Conf Req"""
4347 run_dpp_proto_conf_req_missing(dev, 51,
4348 "Missing or invalid Enrollee Nonce attribute")
4349
4350 def test_dpp_proto_conf_req_invalid_e_nonce(dev, apdev):
4351 """DPP protocol testing - invalid E-nonce in Conf Req"""
4352 run_dpp_proto_conf_req_missing(dev, 83,
4353 "Missing or invalid Enrollee Nonce attribute")
4354
4355 def test_dpp_proto_conf_req_no_config_attr_obj(dev, apdev):
4356 """DPP protocol testing - no Config Attr Obj in Conf Req"""
4357 run_dpp_proto_conf_req_missing(dev, 52,
4358 "Missing or invalid Config Attributes attribute")
4359
4360 def test_dpp_proto_conf_req_invalid_config_attr_obj(dev, apdev):
4361 """DPP protocol testing - invalid Config Attr Obj in Conf Req"""
4362 run_dpp_proto_conf_req_missing(dev, 76,
4363 "Unsupported wi-fi_tech")
4364
4365 def test_dpp_proto_conf_req_no_wrapped_data(dev, apdev):
4366 """DPP protocol testing - no Wrapped Data in Conf Req"""
4367 run_dpp_proto_conf_req_missing(dev, 53,
4368 "Missing or invalid required Wrapped Data attribute")
4369
4370 def run_dpp_proto_conf_resp_missing(dev, test, reason):
4371 run_dpp_proto_init(dev, 1, test)
4372 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4373 if ev is None:
4374 raise Exception("DPP failure not seen")
4375 if reason not in ev:
4376 raise Exception("Unexpected failure: " + ev)
4377
4378 def test_dpp_proto_conf_resp_no_e_nonce(dev, apdev):
4379 """DPP protocol testing - no E-nonce in Conf Resp"""
4380 run_dpp_proto_conf_resp_missing(dev, 54,
4381 "Missing or invalid Enrollee Nonce attribute")
4382
4383 def test_dpp_proto_conf_resp_no_config_obj(dev, apdev):
4384 """DPP protocol testing - no Config Object in Conf Resp"""
4385 run_dpp_proto_conf_resp_missing(dev, 55,
4386 "Missing required Configuration Object attribute")
4387
4388 def test_dpp_proto_conf_resp_no_status(dev, apdev):
4389 """DPP protocol testing - no Status in Conf Resp"""
4390 run_dpp_proto_conf_resp_missing(dev, 56,
4391 "Missing or invalid required DPP Status attribute")
4392
4393 def test_dpp_proto_conf_resp_no_wrapped_data(dev, apdev):
4394 """DPP protocol testing - no Wrapped Data in Conf Resp"""
4395 run_dpp_proto_conf_resp_missing(dev, 57,
4396 "Missing or invalid required Wrapped Data attribute")
4397
4398 def test_dpp_proto_conf_resp_invalid_status(dev, apdev):
4399 """DPP protocol testing - invalid Status in Conf Resp"""
4400 run_dpp_proto_conf_resp_missing(dev, 58,
4401 "Configurator rejected configuration")
4402
4403 def test_dpp_proto_conf_resp_e_nonce_mismatch(dev, apdev):
4404 """DPP protocol testing - E-nonce mismatch in Conf Resp"""
4405 run_dpp_proto_conf_resp_missing(dev, 59,
4406 "Enrollee Nonce mismatch")
4407
4408 def test_dpp_proto_stop_at_auth_req(dev, apdev):
4409 """DPP protocol testing - stop when receiving Auth Req"""
4410 run_dpp_proto_init(dev, 0, 87)
4411 ev = dev[1].wait_event(["DPP-AUTH-INIT-FAILED"], timeout=5)
4412 if ev is None:
4413 raise Exception("Authentication init failure not reported")
4414
4415 def test_dpp_proto_stop_at_auth_resp(dev, apdev):
4416 """DPP protocol testing - stop when receiving Auth Resp"""
4417 run_dpp_proto_init(dev, 1, 88)
4418
4419 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
4420 if ev is None:
4421 raise Exception("Auth Req TX not seen")
4422
4423 ev = dev[0].wait_event(["DPP-TX "], timeout=5)
4424 if ev is None:
4425 raise Exception("Auth Resp TX not seen")
4426
4427 ev = dev[1].wait_event(["DPP-TX "], timeout=0.1)
4428 if ev is not None:
4429 raise Exception("Unexpected Auth Conf TX")
4430
4431 def test_dpp_proto_stop_at_auth_conf(dev, apdev):
4432 """DPP protocol testing - stop when receiving Auth Conf"""
4433 run_dpp_proto_init(dev, 0, 89, init_enrollee=True)
4434 ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=10)
4435 if ev is None:
4436 raise Exception("Enrollee did not start GAS")
4437 ev = dev[1].wait_event(["GAS-QUERY-DONE"], timeout=10)
4438 if ev is None:
4439 raise Exception("Enrollee did not time out GAS")
4440 if "result=TIMEOUT" not in ev:
4441 raise Exception("Unexpected GAS result: " + ev)
4442
4443 def test_dpp_proto_stop_at_auth_conf_tx(dev, apdev):
4444 """DPP protocol testing - stop when transmitting Auth Conf (Registrar)"""
4445 run_dpp_proto_init(dev, 1, 89, init_enrollee=True)
4446 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=10)
4447 if ev is None:
4448 raise Exception("Authentication did not succeed (Initiator)")
4449 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
4450 if ev is None:
4451 raise Exception("Authentication did not succeed (Responder)")
4452 ev = dev[1].wait_event(["GAS-QUERY-START"], timeout=0.1)
4453 if ev is not None:
4454 raise Exception("Unexpected GAS query")
4455
4456 # There is currently no timeout on GAS server side, so no event to wait for
4457 # in this case.
4458
4459 def test_dpp_proto_stop_at_auth_conf_tx2(dev, apdev):
4460 """DPP protocol testing - stop when transmitting Auth Conf (Enrollee)"""
4461 run_dpp_proto_init(dev, 1, 89)
4462 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=10)
4463 if ev is None:
4464 raise Exception("Authentication did not succeed (Initiator)")
4465 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
4466 if ev is None:
4467 raise Exception("Authentication did not succeed (Responder)")
4468
4469 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=5)
4470 if ev is None or "result=TIMEOUT" not in ev:
4471 raise Exception("GAS query did not time out")
4472
4473 def test_dpp_proto_stop_at_conf_req(dev, apdev):
4474 """DPP protocol testing - stop when receiving Auth Req"""
4475 run_dpp_proto_init(dev, 1, 90)
4476 ev = dev[0].wait_event(["GAS-QUERY-START"], timeout=10)
4477 if ev is None:
4478 raise Exception("Enrollee did not start GAS")
4479 ev = dev[0].wait_event(["GAS-QUERY-DONE"], timeout=10)
4480 if ev is None:
4481 raise Exception("Enrollee did not time out GAS")
4482 if "result=TIMEOUT" not in ev:
4483 raise Exception("Unexpected GAS result: " + ev)
4484
4485 def run_dpp_proto_init_pkex(dev, test_dev, test):
4486 check_dpp_capab(dev[0])
4487 check_dpp_capab(dev[1])
4488 dev[test_dev].set("dpp_test", str(test))
4489
4490 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
4491 res = dev[0].request(cmd)
4492 if "FAIL" in res:
4493 raise Exception("Failed to generate bootstrapping info")
4494 id0 = int(res)
4495
4496 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
4497 res = dev[1].request(cmd)
4498 if "FAIL" in res:
4499 raise Exception("Failed to generate bootstrapping info")
4500 id1 = int(res)
4501
4502 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
4503 res = dev[0].request(cmd)
4504 if "FAIL" in res:
4505 raise Exception("Failed to set PKEX data (responder)")
4506 cmd = "DPP_LISTEN 2437"
4507 if "OK" not in dev[0].request(cmd):
4508 raise Exception("Failed to start listen operation")
4509
4510 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 code=secret" % id1
4511 res = dev[1].request(cmd)
4512 if "FAIL" in res:
4513 raise Exception("Failed to set PKEX data (initiator)")
4514
4515 def test_dpp_proto_after_wrapped_data_pkex_cr_req(dev, apdev):
4516 """DPP protocol testing - attribute after Wrapped Data in PKEX CR Req"""
4517 run_dpp_proto_init_pkex(dev, 1, 4)
4518 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
4519 if ev is None or "type=7" not in ev:
4520 raise Exception("PKEX Exchange Request not seen")
4521 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
4522 if ev is None or "type=9" not in ev:
4523 raise Exception("PKEX Commit-Reveal Request not seen")
4524 if "ignore=invalid-attributes" not in ev:
4525 raise Exception("Unexpected RX info: " + ev)
4526
4527 def test_dpp_proto_after_wrapped_data_pkex_cr_resp(dev, apdev):
4528 """DPP protocol testing - attribute after Wrapped Data in PKEX CR Resp"""
4529 run_dpp_proto_init_pkex(dev, 0, 5)
4530 ev = dev[1].wait_event(["DPP-RX"], timeout=5)
4531 if ev is None or "type=8" not in ev:
4532 raise Exception("PKEX Exchange Response not seen")
4533 ev = dev[1].wait_event(["DPP-RX"], timeout=5)
4534 if ev is None or "type=10" not in ev:
4535 raise Exception("PKEX Commit-Reveal Response not seen")
4536 if "ignore=invalid-attributes" not in ev:
4537 raise Exception("Unexpected RX info: " + ev)
4538
4539 def run_dpp_proto_pkex_req_missing(dev, test, reason):
4540 run_dpp_proto_init_pkex(dev, 1, test)
4541 ev = dev[0].wait_event(["DPP-FAIL"], timeout=5)
4542 if ev is None:
4543 raise Exception("DPP failure not seen")
4544 if reason not in ev:
4545 raise Exception("Unexpected failure: " + ev)
4546
4547 def run_dpp_proto_pkex_resp_missing(dev, test, reason):
4548 run_dpp_proto_init_pkex(dev, 0, test)
4549 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
4550 if ev is None:
4551 raise Exception("DPP failure not seen")
4552 if reason not in ev:
4553 raise Exception("Unexpected failure: " + ev)
4554
4555 def test_dpp_proto_pkex_exchange_req_no_finite_cyclic_group(dev, apdev):
4556 """DPP protocol testing - no Finite Cyclic Group in PKEX Exchange Request"""
4557 run_dpp_proto_pkex_req_missing(dev, 34,
4558 "Missing or invalid Finite Cyclic Group attribute")
4559
4560 def test_dpp_proto_pkex_exchange_req_no_encrypted_key(dev, apdev):
4561 """DPP protocol testing - no Encrypted Key in PKEX Exchange Request"""
4562 run_dpp_proto_pkex_req_missing(dev, 35,
4563 "Missing Encrypted Key attribute")
4564
4565 def test_dpp_proto_pkex_exchange_resp_no_status(dev, apdev):
4566 """DPP protocol testing - no Status in PKEX Exchange Response"""
4567 run_dpp_proto_pkex_resp_missing(dev, 36, "No DPP Status attribute")
4568
4569 def test_dpp_proto_pkex_exchange_resp_no_encrypted_key(dev, apdev):
4570 """DPP protocol testing - no Encrypted Key in PKEX Exchange Response"""
4571 run_dpp_proto_pkex_resp_missing(dev, 37, "Missing Encrypted Key attribute")
4572
4573 def test_dpp_proto_pkex_cr_req_no_bootstrap_key(dev, apdev):
4574 """DPP protocol testing - no Bootstrap Key in PKEX Commit-Reveal Request"""
4575 run_dpp_proto_pkex_req_missing(dev, 38,
4576 "No valid peer bootstrapping key found")
4577
4578 def test_dpp_proto_pkex_cr_req_no_i_auth_tag(dev, apdev):
4579 """DPP protocol testing - no I-Auth Tag in PKEX Commit-Reveal Request"""
4580 run_dpp_proto_pkex_req_missing(dev, 39, "No valid u (I-Auth tag) found")
4581
4582 def test_dpp_proto_pkex_cr_req_no_wrapped_data(dev, apdev):
4583 """DPP protocol testing - no Wrapped Data in PKEX Commit-Reveal Request"""
4584 run_dpp_proto_pkex_req_missing(dev, 40, "Missing or invalid required Wrapped Data attribute")
4585
4586 def test_dpp_proto_pkex_cr_resp_no_bootstrap_key(dev, apdev):
4587 """DPP protocol testing - no Bootstrap Key in PKEX Commit-Reveal Response"""
4588 run_dpp_proto_pkex_resp_missing(dev, 41,
4589 "No valid peer bootstrapping key found")
4590
4591 def test_dpp_proto_pkex_cr_resp_no_r_auth_tag(dev, apdev):
4592 """DPP protocol testing - no R-Auth Tag in PKEX Commit-Reveal Response"""
4593 run_dpp_proto_pkex_resp_missing(dev, 42, "No valid v (R-Auth tag) found")
4594
4595 def test_dpp_proto_pkex_cr_resp_no_wrapped_data(dev, apdev):
4596 """DPP protocol testing - no Wrapped Data in PKEX Commit-Reveal Response"""
4597 run_dpp_proto_pkex_resp_missing(dev, 43, "Missing or invalid required Wrapped Data attribute")
4598
4599 def test_dpp_proto_pkex_exchange_req_invalid_encrypted_key(dev, apdev):
4600 """DPP protocol testing - invalid Encrypted Key in PKEX Exchange Request"""
4601 run_dpp_proto_pkex_req_missing(dev, 44,
4602 "Invalid Encrypted Key value")
4603
4604 def test_dpp_proto_pkex_exchange_resp_invalid_encrypted_key(dev, apdev):
4605 """DPP protocol testing - invalid Encrypted Key in PKEX Exchange Response"""
4606 run_dpp_proto_pkex_resp_missing(dev, 45,
4607 "Invalid Encrypted Key value")
4608
4609 def test_dpp_proto_pkex_exchange_resp_invalid_status(dev, apdev):
4610 """DPP protocol testing - invalid Status in PKEX Exchange Response"""
4611 run_dpp_proto_pkex_resp_missing(dev, 46,
4612 "PKEX failed (peer indicated failure)")
4613
4614 def test_dpp_proto_pkex_cr_req_invalid_bootstrap_key(dev, apdev):
4615 """DPP protocol testing - invalid Bootstrap Key in PKEX Commit-Reveal Request"""
4616 run_dpp_proto_pkex_req_missing(dev, 47,
4617 "Peer bootstrapping key is invalid")
4618
4619 def test_dpp_proto_pkex_cr_resp_invalid_bootstrap_key(dev, apdev):
4620 """DPP protocol testing - invalid Bootstrap Key in PKEX Commit-Reveal Response"""
4621 run_dpp_proto_pkex_resp_missing(dev, 48,
4622 "Peer bootstrapping key is invalid")
4623
4624 def test_dpp_proto_pkex_cr_req_i_auth_tag_mismatch(dev, apdev):
4625 """DPP protocol testing - I-auth tag mismatch in PKEX Commit-Reveal Request"""
4626 run_dpp_proto_pkex_req_missing(dev, 49, "No valid u (I-Auth tag) found")
4627
4628 def test_dpp_proto_pkex_cr_resp_r_auth_tag_mismatch(dev, apdev):
4629 """DPP protocol testing - R-auth tag mismatch in PKEX Commit-Reveal Response"""
4630 run_dpp_proto_pkex_resp_missing(dev, 50, "No valid v (R-Auth tag) found")
4631
4632 def test_dpp_proto_stop_at_pkex_exchange_resp(dev, apdev):
4633 """DPP protocol testing - stop when receiving PKEX Exchange Response"""
4634 run_dpp_proto_init_pkex(dev, 1, 84)
4635
4636 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
4637 if ev is None:
4638 raise Exception("PKEX Exchange Req TX not seen")
4639
4640 ev = dev[0].wait_event(["DPP-TX "], timeout=5)
4641 if ev is None:
4642 raise Exception("PKEX Exchange Resp not seen")
4643
4644 ev = dev[1].wait_event(["DPP-TX "], timeout=0.1)
4645 if ev is not None:
4646 raise Exception("Unexpected PKEX CR Req TX")
4647
4648 def test_dpp_proto_stop_at_pkex_cr_req(dev, apdev):
4649 """DPP protocol testing - stop when receiving PKEX CR Request"""
4650 run_dpp_proto_init_pkex(dev, 0, 85)
4651
4652 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
4653 if ev is None:
4654 raise Exception("PKEX Exchange Req TX not seen")
4655
4656 ev = dev[0].wait_event(["DPP-TX "], timeout=5)
4657 if ev is None:
4658 raise Exception("PKEX Exchange Resp not seen")
4659
4660 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
4661 if ev is None:
4662 raise Exception("PKEX CR Req TX not seen")
4663
4664 ev = dev[0].wait_event(["DPP-TX "], timeout=0.1)
4665 if ev is not None:
4666 raise Exception("Unexpected PKEX CR Resp TX")
4667
4668 def test_dpp_proto_stop_at_pkex_cr_resp(dev, apdev):
4669 """DPP protocol testing - stop when receiving PKEX CR Response"""
4670 run_dpp_proto_init_pkex(dev, 1, 86)
4671
4672 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
4673 if ev is None:
4674 raise Exception("PKEX Exchange Req TX not seen")
4675
4676 ev = dev[0].wait_event(["DPP-TX "], timeout=5)
4677 if ev is None:
4678 raise Exception("PKEX Exchange Resp not seen")
4679
4680 ev = dev[1].wait_event(["DPP-TX "], timeout=5)
4681 if ev is None:
4682 raise Exception("PKEX CR Req TX not seen")
4683
4684 ev = dev[0].wait_event(["DPP-TX "], timeout=5)
4685 if ev is None:
4686 raise Exception("PKEX CR Resp TX not seen")
4687
4688 ev = dev[1].wait_event(["DPP-TX "], timeout=0.1)
4689 if ev is not None:
4690 raise Exception("Unexpected Auth Req TX")
4691
4692 def test_dpp_proto_network_introduction(dev, apdev):
4693 """DPP protocol testing - network introduction"""
4694 check_dpp_capab(dev[0])
4695 check_dpp_capab(dev[1])
4696
4697 params = { "ssid": "dpp",
4698 "wpa": "2",
4699 "wpa_key_mgmt": "DPP",
4700 "ieee80211w": "2",
4701 "rsn_pairwise": "CCMP",
4702 "dpp_connector": params1_ap_connector,
4703 "dpp_csign": params1_csign,
4704 "dpp_netaccesskey": params1_ap_netaccesskey }
4705 try:
4706 hapd = hostapd.add_ap(apdev[0], params)
4707 except:
4708 raise HwsimSkip("DPP not supported")
4709
4710 for test in [ 60, 61, 80, 82 ]:
4711 dev[0].set("dpp_test", str(test))
4712 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2",
4713 dpp_csign=params1_csign,
4714 dpp_connector=params1_sta_connector,
4715 dpp_netaccesskey=params1_sta_netaccesskey,
4716 wait_connect=False)
4717
4718 ev = dev[0].wait_event(["DPP-TX"], timeout=10)
4719 if ev is None or "type=5" not in ev:
4720 raise Exception("Peer Discovery Request TX not reported")
4721 ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=2)
4722 if ev is None or "result=SUCCESS" not in ev:
4723 raise Exception("Peer Discovery Request TX status not reported")
4724
4725 ev = hapd.wait_event(["DPP-RX"], timeout=10)
4726 if ev is None or "type=5" not in ev:
4727 raise Exception("Peer Discovery Request RX not reported")
4728
4729 if test == 80:
4730 ev = dev[0].wait_event(["DPP-INTRO"], timeout=10)
4731 if ev is None:
4732 raise Exception("DPP-INTRO not reported for test 80")
4733 if "status=7" not in ev:
4734 raise Exception("Unexpected result in test 80: " + ev)
4735
4736 dev[0].request("REMOVE_NETWORK all")
4737 dev[0].dump_monitor()
4738 hapd.dump_monitor()
4739 dev[0].set("dpp_test", "0")
4740
4741 for test in [ 62, 63, 64, 77, 78, 79 ]:
4742 hapd.set("dpp_test", str(test))
4743 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2",
4744 dpp_csign=params1_csign,
4745 dpp_connector=params1_sta_connector,
4746 dpp_netaccesskey=params1_sta_netaccesskey,
4747 wait_connect=False)
4748
4749 ev = dev[0].wait_event(["DPP-INTRO"], timeout=10)
4750 if ev is None:
4751 raise Exception("Peer introduction result not reported (test %d)" % test)
4752 if test == 77:
4753 if "fail=transaction_id_mismatch" not in ev:
4754 raise Exception("Connector validation failure not reported")
4755 elif test == 78:
4756 if "status=254" not in ev:
4757 raise Exception("Invalid status value not reported")
4758 elif test == 79:
4759 if "fail=peer_connector_validation_failed" not in ev:
4760 raise Exception("Connector validation failure not reported")
4761 elif "status=" in ev:
4762 raise Exception("Unexpected peer introduction result (test %d): " % test + ev)
4763
4764 dev[0].request("REMOVE_NETWORK all")
4765 dev[0].dump_monitor()
4766 hapd.dump_monitor()
4767 hapd.set("dpp_test", "0")
4768
4769 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412", ieee80211w="2",
4770 dpp_csign=params1_csign, dpp_connector=params1_sta_connector,
4771 dpp_netaccesskey=params1_sta_netaccesskey)
4772
4773 def test_dpp_qr_code_no_chan_list_unicast(dev, apdev):
4774 """DPP QR Code and no channel list (unicast)"""
4775 run_dpp_qr_code_chan_list(dev, apdev, True, 2417, None)
4776
4777 def test_dpp_qr_code_chan_list_unicast(dev, apdev):
4778 """DPP QR Code and 2.4 GHz channels (unicast)"""
4779 run_dpp_qr_code_chan_list(dev, apdev, True, 2417,
4780 "81/1,81/2,81/3,81/4,81/5,81/6,81/7,81/8,81/9,81/10,81/11,81/12,81/13")
4781
4782 def test_dpp_qr_code_chan_list_no_peer_unicast(dev, apdev):
4783 """DPP QR Code and channel list and no peer (unicast)"""
4784 run_dpp_qr_code_chan_list(dev, apdev, True, 2417, "81/1,81/6,81/11",
4785 no_wait=True)
4786 ev = dev[1].wait_event(["DPP-AUTH-INIT-FAILED"], timeout=5)
4787 if ev is None:
4788 raise Exception("Initiation failure not reported")
4789
4790 def test_dpp_qr_code_no_chan_list_broadcast(dev, apdev):
4791 """DPP QR Code and no channel list (broadcast)"""
4792 run_dpp_qr_code_chan_list(dev, apdev, False, 2412, None)
4793
4794 def test_dpp_qr_code_chan_list_broadcast(dev, apdev):
4795 """DPP QR Code and some 2.4 GHz channels (broadcast)"""
4796 run_dpp_qr_code_chan_list(dev, apdev, False, 2412, "81/1,81/6,81/11",
4797 timeout=10)
4798
4799 def run_dpp_qr_code_chan_list(dev, apdev, unicast, listen_freq, chanlist,
4800 no_wait=False, timeout=5):
4801 check_dpp_capab(dev[0])
4802 check_dpp_capab(dev[1])
4803 dev[1].set("dpp_init_max_tries", "3")
4804 dev[1].set("dpp_init_retry_time", "100")
4805 dev[1].set("dpp_resp_wait_time", "1000")
4806
4807 logger.info("dev0 displays QR Code")
4808 cmd = "DPP_BOOTSTRAP_GEN type=qrcode"
4809 if chanlist:
4810 cmd += " chan=" + chanlist
4811 if unicast:
4812 addr = dev[0].own_addr().replace(':', '')
4813 cmd += " mac=" + addr
4814 res = dev[0].request(cmd)
4815 if "FAIL" in res:
4816 raise Exception("Failed to generate bootstrapping info")
4817 id0 = int(res)
4818 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
4819
4820 logger.info("dev1 scans QR Code")
4821 res = dev[1].request("DPP_QR_CODE " + uri0)
4822 if "FAIL" in res:
4823 raise Exception("Failed to parse QR Code URI")
4824 id1 = int(res)
4825
4826 logger.info("dev1 initiates DPP Authentication")
4827 cmd = "DPP_LISTEN %d" % listen_freq
4828 if "OK" not in dev[0].request(cmd):
4829 raise Exception("Failed to start listen operation")
4830 cmd = "DPP_AUTH_INIT peer=%d" % id1
4831 if "OK" not in dev[1].request(cmd):
4832 raise Exception("Failed to initiate DPP Authentication")
4833 if no_wait:
4834 return
4835 ev = dev[0].wait_event(["DPP-AUTH-SUCCESS"], timeout=timeout)
4836 if ev is None:
4837 raise Exception("DPP authentication did not succeed (Responder)")
4838 ev = dev[1].wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
4839 if ev is None:
4840 raise Exception("DPP authentication did not succeed (Initiator)")
4841 ev = dev[0].wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"], timeout=5)
4842 if ev is None:
4843 raise Exception("DPP configuration not completed (Enrollee)")
4844 dev[0].request("DPP_STOP_LISTEN")
4845 dev[0].dump_monitor()
4846 dev[1].dump_monitor()
4847
4848 def test_dpp_qr_code_chan_list_no_match(dev, apdev):
4849 """DPP QR Code and no matching supported channel"""
4850 check_dpp_capab(dev[0])
4851 check_dpp_capab(dev[1])
4852
4853 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=123/123"
4854 res = dev[0].request(cmd)
4855 if "FAIL" in res:
4856 raise Exception("Failed to generate bootstrapping info")
4857 id0 = int(res)
4858 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
4859
4860 res = dev[1].request("DPP_QR_CODE " + uri0)
4861 if "FAIL" in res:
4862 raise Exception("Failed to parse QR Code URI")
4863 id1 = int(res)
4864
4865 cmd = "DPP_AUTH_INIT peer=%d" % id1
4866 if "FAIL" not in dev[1].request(cmd):
4867 raise Exception("DPP Authentication started unexpectedly")
4868
4869 def test_dpp_pkex_alloc_fail(dev, apdev):
4870 """DPP/PKEX and memory allocation failures"""
4871 check_dpp_capab(dev[0])
4872 check_dpp_capab(dev[1])
4873
4874 tests = [ (1, "=dpp_keygen_configurator"),
4875 (1, "base64_gen_encode;dpp_keygen_configurator") ]
4876 for count, func in tests:
4877 with alloc_fail(dev[1], count, func):
4878 cmd = "DPP_CONFIGURATOR_ADD"
4879 res = dev[1].request(cmd);
4880 if "FAIL" not in res:
4881 raise Exception("Unexpected DPP_CONFIGURATOR_ADD success")
4882
4883 cmd = "DPP_CONFIGURATOR_ADD"
4884 res = dev[1].request(cmd);
4885 if "FAIL" in res:
4886 raise Exception("Failed to add configurator")
4887 conf_id = int(res)
4888
4889 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
4890 res = dev[0].request(cmd)
4891 if "FAIL" in res:
4892 raise Exception("Failed to generate bootstrapping info")
4893 id0 = int(res)
4894
4895 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
4896 res = dev[1].request(cmd)
4897 if "FAIL" in res:
4898 raise Exception("Failed to generate bootstrapping info")
4899 id1 = int(res)
4900
4901 # Local error cases on the Initiator
4902 tests = [ (1, "dpp_get_pubkey_point"),
4903 (1, "dpp_alloc_msg;dpp_pkex_build_exchange_req"),
4904 (1, "dpp_alloc_msg;dpp_pkex_build_commit_reveal_req"),
4905 (1, "dpp_alloc_msg;dpp_auth_build_req"),
4906 (1, "dpp_alloc_msg;dpp_auth_build_conf"),
4907 (1, "dpp_bootstrap_key_hash"),
4908 (1, "dpp_auth_init"),
4909 (1, "=dpp_auth_resp_rx"),
4910 (2, "=dpp_auth_resp_rx"),
4911 (1, "dpp_build_conf_start"),
4912 (1, "dpp_build_conf_obj_dpp"),
4913 (2, "dpp_build_conf_obj_dpp"),
4914 (3, "dpp_build_conf_obj_dpp"),
4915 (4, "dpp_build_conf_obj_dpp"),
4916 (5, "dpp_build_conf_obj_dpp"),
4917 (6, "dpp_build_conf_obj_dpp"),
4918 (7, "dpp_build_conf_obj_dpp"),
4919 (8, "dpp_build_conf_obj_dpp"),
4920 (1, "dpp_conf_req_rx"),
4921 (2, "dpp_conf_req_rx"),
4922 (3, "dpp_conf_req_rx"),
4923 (4, "dpp_conf_req_rx"),
4924 (5, "dpp_conf_req_rx"),
4925 (6, "dpp_conf_req_rx"),
4926 (7, "dpp_conf_req_rx"),
4927 (1, "dpp_pkex_init"),
4928 (2, "dpp_pkex_init"),
4929 (3, "dpp_pkex_init"),
4930 (1, "dpp_pkex_derive_z"),
4931 (1, "=dpp_pkex_rx_commit_reveal_resp"),
4932 (1, "dpp_get_pubkey_point;dpp_build_jwk"),
4933 (2, "dpp_get_pubkey_point;dpp_build_jwk"),
4934 (1, "dpp_get_pubkey_point;dpp_auth_init") ]
4935 for count, func in tests:
4936 dev[0].request("DPP_STOP_LISTEN")
4937 dev[1].request("DPP_STOP_LISTEN")
4938 dev[0].dump_monitor()
4939 dev[1].dump_monitor()
4940
4941 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
4942 res = dev[0].request(cmd)
4943 if "FAIL" in res:
4944 raise Exception("Failed to set PKEX data (responder)")
4945 cmd = "DPP_LISTEN 2437"
4946 if "OK" not in dev[0].request(cmd):
4947 raise Exception("Failed to start listen operation")
4948
4949 with alloc_fail(dev[1], count, func):
4950 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 conf=sta-dpp configurator=%d code=secret" % (id1, conf_id)
4951 dev[1].request(cmd)
4952 wait_fail_trigger(dev[1], "GET_ALLOC_FAIL", max_iter=100)
4953 ev = dev[0].wait_event(["GAS-QUERY-START"], timeout=0.01)
4954 if ev:
4955 dev[0].request("DPP_STOP_LISTEN")
4956 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=3)
4957
4958 # Local error cases on the Responder
4959 tests = [ (1, "dpp_get_pubkey_point"),
4960 (1, "dpp_alloc_msg;dpp_pkex_build_exchange_resp"),
4961 (1, "dpp_alloc_msg;dpp_pkex_build_commit_reveal_resp"),
4962 (1, "dpp_alloc_msg;dpp_auth_build_resp"),
4963 (1, "dpp_get_pubkey_point;dpp_auth_build_resp_ok"),
4964 (1, "=dpp_auth_req_rx"),
4965 (2, "=dpp_auth_req_rx"),
4966 (1, "=dpp_auth_conf_rx"),
4967 (1, "json_parse;dpp_parse_jws_prot_hdr"),
4968 (1, "json_get_member_base64url;dpp_parse_jws_prot_hdr"),
4969 (1, "json_get_member_base64url;dpp_parse_jwk"),
4970 (2, "json_get_member_base64url;dpp_parse_jwk"),
4971 (1, "json_parse;dpp_parse_connector"),
4972 (1, "dpp_parse_jwk;dpp_parse_connector"),
4973 (1, "dpp_parse_jwk;dpp_parse_cred_dpp"),
4974 (1, "dpp_get_pubkey_point;dpp_check_pubkey_match"),
4975 (1, "base64_gen_decode;dpp_process_signed_connector"),
4976 (1, "dpp_parse_jws_prot_hdr;dpp_process_signed_connector"),
4977 (2, "base64_gen_decode;dpp_process_signed_connector"),
4978 (3, "base64_gen_decode;dpp_process_signed_connector"),
4979 (4, "base64_gen_decode;dpp_process_signed_connector"),
4980 (1, "json_parse;dpp_parse_conf_obj"),
4981 (1, "dpp_conf_resp_rx"),
4982 (1, "=dpp_pkex_derive_z"),
4983 (1, "=dpp_pkex_rx_exchange_req"),
4984 (2, "=dpp_pkex_rx_exchange_req"),
4985 (3, "=dpp_pkex_rx_exchange_req"),
4986 (1, "=dpp_pkex_rx_commit_reveal_req"),
4987 (1, "dpp_get_pubkey_point;dpp_pkex_rx_commit_reveal_req"),
4988 (1, "dpp_bootstrap_key_hash") ]
4989 for count, func in tests:
4990 dev[0].request("DPP_STOP_LISTEN")
4991 dev[1].request("DPP_STOP_LISTEN")
4992 dev[0].dump_monitor()
4993 dev[1].dump_monitor()
4994
4995 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
4996 res = dev[0].request(cmd)
4997 if "FAIL" in res:
4998 raise Exception("Failed to set PKEX data (responder)")
4999 cmd = "DPP_LISTEN 2437"
5000 if "OK" not in dev[0].request(cmd):
5001 raise Exception("Failed to start listen operation")
5002
5003 with alloc_fail(dev[0], count, func):
5004 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 conf=sta-dpp configurator=%d code=secret" % (id1, conf_id)
5005 dev[1].request(cmd)
5006 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL", max_iter=100)
5007 ev = dev[0].wait_event(["GAS-QUERY-START"], timeout=0.01)
5008 if ev:
5009 dev[0].request("DPP_STOP_LISTEN")
5010 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=3)
5011
5012 def test_dpp_pkex_test_fail(dev, apdev):
5013 """DPP/PKEX and local failures"""
5014 check_dpp_capab(dev[0])
5015 check_dpp_capab(dev[1])
5016
5017 tests = [ (1, "dpp_keygen_configurator") ]
5018 for count, func in tests:
5019 with fail_test(dev[1], count, func):
5020 cmd = "DPP_CONFIGURATOR_ADD"
5021 res = dev[1].request(cmd);
5022 if "FAIL" not in res:
5023 raise Exception("Unexpected DPP_CONFIGURATOR_ADD success")
5024
5025 tests = [ (1, "dpp_keygen") ]
5026 for count, func in tests:
5027 with fail_test(dev[1], count, func):
5028 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
5029 res = dev[1].request(cmd);
5030 if "FAIL" not in res:
5031 raise Exception("Unexpected DPP_BOOTSTRAP_GEN success")
5032
5033 cmd = "DPP_CONFIGURATOR_ADD"
5034 res = dev[1].request(cmd);
5035 if "FAIL" in res:
5036 raise Exception("Failed to add configurator")
5037 conf_id = int(res)
5038
5039 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
5040 res = dev[0].request(cmd)
5041 if "FAIL" in res:
5042 raise Exception("Failed to generate bootstrapping info")
5043 id0 = int(res)
5044
5045 cmd = "DPP_BOOTSTRAP_GEN type=pkex"
5046 res = dev[1].request(cmd)
5047 if "FAIL" in res:
5048 raise Exception("Failed to generate bootstrapping info")
5049 id1 = int(res)
5050
5051 # Local error cases on the Initiator
5052 tests = [ (1, "aes_siv_encrypt;dpp_auth_build_req"),
5053 (1, "os_get_random;dpp_auth_init"),
5054 (1, "dpp_derive_k1;dpp_auth_init"),
5055 (1, "dpp_hkdf_expand;dpp_derive_k1;dpp_auth_init"),
5056 (1, "dpp_gen_i_auth;dpp_auth_build_conf"),
5057 (1, "aes_siv_encrypt;dpp_auth_build_conf"),
5058 (1, "dpp_derive_k2;dpp_auth_resp_rx"),
5059 (1, "dpp_hkdf_expand;dpp_derive_k2;dpp_auth_resp_rx"),
5060 (1, "dpp_derive_ke;dpp_auth_resp_rx"),
5061 (1, "dpp_hkdf_expand;dpp_derive_ke;dpp_auth_resp_rx"),
5062 (1, "dpp_gen_r_auth;dpp_auth_resp_rx"),
5063 (1, "aes_siv_encrypt;dpp_build_conf_resp"),
5064 (1, "dpp_pkex_derive_Qi;dpp_pkex_build_exchange_req"),
5065 (1, "aes_siv_encrypt;dpp_pkex_build_commit_reveal_req"),
5066 (1, "hmac_sha256_vector;dpp_pkex_rx_exchange_resp"),
5067 (1, "aes_siv_decrypt;dpp_pkex_rx_commit_reveal_resp"),
5068 (1, "hmac_sha256_vector;dpp_pkex_rx_commit_reveal_resp"),
5069 (1, "dpp_bootstrap_key_hash") ]
5070 for count, func in tests:
5071 dev[0].request("DPP_STOP_LISTEN")
5072 dev[1].request("DPP_STOP_LISTEN")
5073 dev[0].dump_monitor()
5074 dev[1].dump_monitor()
5075
5076 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
5077 res = dev[0].request(cmd)
5078 if "FAIL" in res:
5079 raise Exception("Failed to set PKEX data (responder)")
5080 cmd = "DPP_LISTEN 2437"
5081 if "OK" not in dev[0].request(cmd):
5082 raise Exception("Failed to start listen operation")
5083
5084 with fail_test(dev[1], count, func):
5085 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 conf=sta-dpp configurator=%d code=secret" % (id1, conf_id)
5086 dev[1].request(cmd)
5087 wait_fail_trigger(dev[1], "GET_FAIL", max_iter=100)
5088 ev = dev[0].wait_event(["GAS-QUERY-START"], timeout=0.01)
5089 if ev:
5090 dev[0].request("DPP_STOP_LISTEN")
5091 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=3)
5092
5093 # Local error cases on the Responder
5094 tests = [ (1, "aes_siv_encrypt;dpp_auth_build_resp"),
5095 (1, "aes_siv_encrypt;dpp_auth_build_resp;dpp_auth_build_resp_ok"),
5096 (1, "os_get_random;dpp_build_conf_req"),
5097 (1, "aes_siv_encrypt;dpp_build_conf_req"),
5098 (1, "os_get_random;dpp_auth_build_resp_ok"),
5099 (1, "dpp_derive_k2;dpp_auth_build_resp_ok"),
5100 (1, "dpp_derive_ke;dpp_auth_build_resp_ok"),
5101 (1, "dpp_gen_r_auth;dpp_auth_build_resp_ok"),
5102 (1, "aes_siv_encrypt;dpp_auth_build_resp_ok"),
5103 (1, "dpp_derive_k1;dpp_auth_req_rx"),
5104 (1, "aes_siv_decrypt;dpp_auth_req_rx"),
5105 (1, "aes_siv_decrypt;dpp_auth_conf_rx"),
5106 (1, "dpp_gen_i_auth;dpp_auth_conf_rx"),
5107 (1, "dpp_check_pubkey_match"),
5108 (1, "aes_siv_decrypt;dpp_conf_resp_rx"),
5109 (1, "hmac_sha256_kdf;dpp_pkex_derive_z"),
5110 (1, "dpp_pkex_derive_Qi;dpp_pkex_rx_exchange_req"),
5111 (1, "dpp_pkex_derive_Qr;dpp_pkex_rx_exchange_req"),
5112 (1, "aes_siv_encrypt;dpp_pkex_build_commit_reveal_resp"),
5113 (1, "aes_siv_decrypt;dpp_pkex_rx_commit_reveal_req"),
5114 (1, "hmac_sha256_vector;dpp_pkex_rx_commit_reveal_req"),
5115 (2, "hmac_sha256_vector;dpp_pkex_rx_commit_reveal_req") ]
5116 for count, func in tests:
5117 dev[0].request("DPP_STOP_LISTEN")
5118 dev[1].request("DPP_STOP_LISTEN")
5119 dev[0].dump_monitor()
5120 dev[1].dump_monitor()
5121
5122 cmd = "DPP_PKEX_ADD own=%d identifier=test code=secret" % (id0)
5123 res = dev[0].request(cmd)
5124 if "FAIL" in res:
5125 raise Exception("Failed to set PKEX data (responder)")
5126 cmd = "DPP_LISTEN 2437"
5127 if "OK" not in dev[0].request(cmd):
5128 raise Exception("Failed to start listen operation")
5129
5130 with fail_test(dev[0], count, func):
5131 cmd = "DPP_PKEX_ADD own=%d identifier=test init=1 conf=sta-dpp configurator=%d code=secret" % (id1, conf_id)
5132 dev[1].request(cmd)
5133 wait_fail_trigger(dev[0], "GET_FAIL", max_iter=100)
5134 ev = dev[0].wait_event(["GAS-QUERY-START"], timeout=0.01)
5135 if ev:
5136 dev[0].request("DPP_STOP_LISTEN")
5137 dev[0].wait_event(["GAS-QUERY-DONE"], timeout=3)
5138
5139 def test_dpp_keygen_configurator_error(dev, apdev):
5140 """DPP Configurator keygen error case"""
5141 check_dpp_capab(dev[0])
5142 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD curve=unknown"):
5143 raise Exception("Unexpected success of invalid DPP_CONFIGURATOR_ADD")
5144
5145 def rx_process_frame(dev):
5146 msg = dev.mgmt_rx()
5147 if "OK" not in dev.request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], msg['frame'].encode('hex'))):
5148 raise Exception("MGMT_RX_PROCESS failed")
5149
5150 def wait_auth_success(responder, initiator):
5151 ev = responder.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
5152 if ev is None:
5153 raise Exception("DPP authentication did not succeed (Responder)")
5154 ev = initiator.wait_event(["DPP-AUTH-SUCCESS"], timeout=5)
5155 if ev is None:
5156 raise Exception("DPP authentication did not succeed (Initiator)")
5157
5158 def wait_conf_completion(configurator, enrollee):
5159 ev = configurator.wait_event(["DPP-CONF-SENT"], timeout=5)
5160 if ev is None:
5161 raise Exception("DPP configuration not completed (Configurator)")
5162 ev = enrollee.wait_event(["DPP-CONF-RECEIVED", "DPP-CONF-FAILED"],
5163 timeout=5)
5164 if ev is None:
5165 raise Exception("DPP configuration not completed (Enrollee)")
5166
5167 def start_dpp(dev):
5168 addr = dev[0].own_addr().replace(':', '')
5169 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
5170 res = dev[0].request(cmd)
5171 if "FAIL" in res:
5172 raise Exception("Failed to generate bootstrapping info")
5173 id0 = int(res)
5174 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
5175
5176 res = dev[1].request("DPP_QR_CODE " + uri0)
5177 if "FAIL" in res:
5178 raise Exception("Failed to parse QR Code URI")
5179 id1 = int(res)
5180
5181 conf = '{"wi-fi_tech":"infra", "discovery":{"ssid":"test"},"cred":{"akm":"psk","pass":"secret passphrase"}}' + 3000*' '
5182 dev[0].set("dpp_config_obj_override", conf)
5183
5184 dev[0].set("ext_mgmt_frame_handling", "1")
5185 cmd = "DPP_LISTEN 2412"
5186 if "OK" not in dev[0].request(cmd):
5187 raise Exception("Failed to start listen operation")
5188 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
5189 if "OK" not in dev[1].request(cmd):
5190 raise Exception("Failed to initiate DPP Authentication")
5191
5192 def test_dpp_gas_timeout_handling(dev, apdev):
5193 """DPP and GAS timeout handling"""
5194 check_dpp_capab(dev[0])
5195 check_dpp_capab(dev[1])
5196 start_dpp(dev)
5197
5198 # DPP Authentication Request
5199 rx_process_frame(dev[0])
5200
5201 # DPP Authentication Confirmation
5202 rx_process_frame(dev[0])
5203
5204 wait_auth_success(dev[0], dev[1])
5205
5206 # DPP Configuration Request (GAS Initial Request frame)
5207 rx_process_frame(dev[0])
5208
5209 # DPP Configuration Request (GAS Comeback Request frame)
5210 rx_process_frame(dev[0])
5211
5212 # Wait for GAS timeout
5213 ev = dev[1].wait_event(["DPP-CONF-FAILED"], timeout=5)
5214 if ev is None:
5215 raise Exception("DPP configuration not completed (Enrollee)")
5216
5217 def test_dpp_gas_comeback_after_failure(dev, apdev):
5218 """DPP and GAS comeback after failure"""
5219 check_dpp_capab(dev[0])
5220 check_dpp_capab(dev[1])
5221 start_dpp(dev)
5222
5223 # DPP Authentication Request
5224 rx_process_frame(dev[0])
5225
5226 # DPP Authentication Confirmation
5227 rx_process_frame(dev[0])
5228
5229 wait_auth_success(dev[0], dev[1])
5230
5231 # DPP Configuration Request (GAS Initial Request frame)
5232 rx_process_frame(dev[0])
5233
5234 # DPP Configuration Request (GAS Comeback Request frame)
5235 msg = dev[0].mgmt_rx()
5236 frame = msg['frame'].encode('hex')
5237 with alloc_fail(dev[0], 1, "gas_build_comeback_resp;gas_server_handle_rx_comeback_req"):
5238 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)):
5239 raise Exception("MGMT_RX_PROCESS failed")
5240 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5241 # Try the same frame again - this is expected to fail since the response has
5242 # already been freed.
5243 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)):
5244 raise Exception("MGMT_RX_PROCESS failed")
5245
5246 # DPP Configuration Request (GAS Comeback Request frame retry)
5247 msg = dev[0].mgmt_rx()
5248
5249 def test_dpp_gas(dev, apdev):
5250 """DPP and GAS protocol testing"""
5251 check_dpp_capab(dev[0])
5252 check_dpp_capab(dev[1])
5253 start_dpp(dev)
5254
5255 # DPP Authentication Request
5256 rx_process_frame(dev[0])
5257
5258 # DPP Authentication Confirmation
5259 rx_process_frame(dev[0])
5260
5261 wait_auth_success(dev[0], dev[1])
5262
5263 # DPP Configuration Request (GAS Initial Request frame)
5264 msg = dev[0].mgmt_rx()
5265
5266 # Protected Dual of GAS Initial Request frame (dropped by GAS server)
5267 frame = msg['frame'].encode('hex')
5268 frame = frame[0:48] + "09" + frame[50:]
5269 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)):
5270 raise Exception("MGMT_RX_PROCESS failed")
5271
5272 with alloc_fail(dev[0], 1, "gas_server_send_resp"):
5273 frame = msg['frame'].encode('hex')
5274 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)):
5275 raise Exception("MGMT_RX_PROCESS failed")
5276 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5277
5278 with alloc_fail(dev[0], 1, "gas_build_initial_resp;gas_server_send_resp"):
5279 frame = msg['frame'].encode('hex')
5280 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)):
5281 raise Exception("MGMT_RX_PROCESS failed")
5282 wait_fail_trigger(dev[0], "GET_ALLOC_FAIL")
5283
5284 # Add extra data after Query Request field to trigger
5285 # "GAS: Ignored extra data after Query Request field"
5286 frame = msg['frame'].encode('hex') + "00"
5287 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame)):
5288 raise Exception("MGMT_RX_PROCESS failed")
5289
5290 # DPP Configuration Request (GAS Comeback Request frame)
5291 rx_process_frame(dev[0])
5292
5293 # DPP Configuration Request (GAS Comeback Request frame)
5294 rx_process_frame(dev[0])
5295
5296 # DPP Configuration Request (GAS Comeback Request frame)
5297 rx_process_frame(dev[0])
5298
5299 wait_conf_completion(dev[0], dev[1])
5300
5301 def test_dpp_truncated_attr(dev, apdev):
5302 """DPP and truncated attribute"""
5303 check_dpp_capab(dev[0])
5304 check_dpp_capab(dev[1])
5305 start_dpp(dev)
5306
5307 # DPP Authentication Request
5308 msg = dev[0].mgmt_rx()
5309 frame = msg['frame']
5310
5311 # DPP: Truncated message - not enough room for the attribute - dropped
5312 frame1 = frame[0:36].encode('hex')
5313 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame1)):
5314 raise Exception("MGMT_RX_PROCESS failed")
5315 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
5316 if ev is None or "ignore=invalid-attributes" not in ev:
5317 raise Exception("Invalid attribute error not reported")
5318
5319 # DPP: Unexpected octets (3) after the last attribute
5320 frame2 = frame.encode('hex') + "000000"
5321 if "OK" not in dev[0].request("MGMT_RX_PROCESS freq={} datarate={} ssi_signal={} frame={}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], frame2)):
5322 raise Exception("MGMT_RX_PROCESS failed")
5323 ev = dev[0].wait_event(["DPP-RX"], timeout=5)
5324 if ev is None or "ignore=invalid-attributes" not in ev:
5325 raise Exception("Invalid attribute error not reported")
5326
5327 def test_dpp_bootstrap_key_autogen_issues(dev, apdev):
5328 """DPP bootstrap key autogen issues"""
5329 check_dpp_capab(dev[0])
5330 check_dpp_capab(dev[1])
5331
5332 logger.info("dev0 displays QR Code")
5333 addr = dev[0].own_addr().replace(':', '')
5334 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
5335 res = dev[0].request(cmd)
5336 if "FAIL" in res:
5337 raise Exception("Failed to generate bootstrapping info")
5338 id0 = int(res)
5339 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
5340
5341 logger.info("dev1 scans QR Code")
5342 res = dev[1].request("DPP_QR_CODE " + uri0)
5343 if "FAIL" in res:
5344 raise Exception("Failed to parse QR Code URI")
5345 id1 = int(res)
5346
5347 logger.info("dev1 initiates DPP Authentication")
5348 cmd = "DPP_LISTEN 2412"
5349 if "OK" not in dev[0].request(cmd):
5350 raise Exception("Failed to start listen operation")
5351 with alloc_fail(dev[1], 1, "dpp_autogen_bootstrap_key"):
5352 cmd = "DPP_AUTH_INIT peer=%d" % id1
5353 if "FAIL" not in dev[1].request(cmd):
5354 raise Exception("Failure not reported")
5355 with alloc_fail(dev[1], 2, "=dpp_autogen_bootstrap_key"):
5356 cmd = "DPP_AUTH_INIT peer=%d" % id1
5357 if "FAIL" not in dev[1].request(cmd):
5358 raise Exception("Failure not reported")
5359 with fail_test(dev[1], 1, "dpp_keygen;dpp_autogen_bootstrap_key"):
5360 cmd = "DPP_AUTH_INIT peer=%d" % id1
5361 if "FAIL" not in dev[1].request(cmd):
5362 raise Exception("Failure not reported")
5363 dev[0].request("DPP_STOP_LISTEN")
5364
5365 def test_dpp_auth_resp_status_failure(dev, apdev):
5366 """DPP and Auth Resp(status) build failure"""
5367 with alloc_fail(dev[0], 1, "dpp_auth_build_resp"):
5368 run_dpp_proto_auth_resp_missing(dev, 99999, None,
5369 incompatible_roles=True)
5370
5371 def test_dpp_auth_resp_aes_siv_issue(dev, apdev):
5372 """DPP Auth Resp AES-SIV issue"""
5373 check_dpp_capab(dev[0])
5374 check_dpp_capab(dev[1])
5375
5376 logger.info("dev0 displays QR Code")
5377 addr = dev[0].own_addr().replace(':', '')
5378 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
5379 res = dev[0].request(cmd)
5380 if "FAIL" in res:
5381 raise Exception("Failed to generate bootstrapping info")
5382 id0 = int(res)
5383 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
5384
5385 logger.info("dev1 scans QR Code")
5386 res = dev[1].request("DPP_QR_CODE " + uri0)
5387 if "FAIL" in res:
5388 raise Exception("Failed to parse QR Code URI")
5389 id1 = int(res)
5390
5391 logger.info("dev1 initiates DPP Authentication")
5392 cmd = "DPP_LISTEN 2412"
5393 if "OK" not in dev[0].request(cmd):
5394 raise Exception("Failed to start listen operation")
5395 cmd = "DPP_AUTH_INIT peer=%d" % id1
5396 with fail_test(dev[1], 1, "aes_siv_decrypt;dpp_auth_resp_rx"):
5397 if "OK" not in dev[1].request(cmd):
5398 raise Exception("Failed to initiate DPP Authentication")
5399 ev = dev[1].wait_event(["DPP-FAIL"], timeout=5)
5400 if ev is None or "AES-SIV decryption failed" not in ev:
5401 raise Exception("AES-SIV decryption failure not reported")
5402 dev[0].request("DPP_STOP_LISTEN")
5403
5404 def test_dpp_invalid_legacy_params(dev, apdev):
5405 """DPP invalid legacy parameters"""
5406 check_dpp_capab(dev[0])
5407 check_dpp_capab(dev[1])
5408
5409 addr = dev[0].own_addr().replace(':', '')
5410 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
5411 res = dev[0].request(cmd)
5412 if "FAIL" in res:
5413 raise Exception("Failed to generate bootstrapping info")
5414 id0 = int(res)
5415 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
5416
5417 res = dev[1].request("DPP_QR_CODE " + uri0)
5418 if "FAIL" in res:
5419 raise Exception("Failed to parse QR Code URI")
5420 id1 = int(res)
5421
5422 # No pass/psk
5423 cmd = "DPP_AUTH_INIT peer=%d conf=sta-psk ssid=%s" % (id1, "dpp-legacy".encode("hex"))
5424 if "FAIL" not in dev[1].request(cmd):
5425 raise Exception("Invalid command not rejected")
5426
5427 def test_dpp_invalid_legacy_params2(dev, apdev):
5428 """DPP invalid legacy parameters 2"""
5429 check_dpp_capab(dev[0])
5430 check_dpp_capab(dev[1])
5431
5432 addr = dev[0].own_addr().replace(':', '')
5433 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
5434 res = dev[0].request(cmd)
5435 if "FAIL" in res:
5436 raise Exception("Failed to generate bootstrapping info")
5437 id0 = int(res)
5438 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
5439
5440 res = dev[1].request("DPP_QR_CODE " + uri0)
5441 if "FAIL" in res:
5442 raise Exception("Failed to parse QR Code URI")
5443 id1 = int(res)
5444
5445 dev[0].set("dpp_configurator_params",
5446 " conf=sta-psk ssid=%s" % ("dpp-legacy".encode("hex")))
5447 cmd = "DPP_LISTEN 2412 role=configurator"
5448 if "OK" not in dev[0].request(cmd):
5449 raise Exception("Failed to start listen operation")
5450
5451 # No pass/psk
5452 cmd = "DPP_AUTH_INIT peer=%d role=enrollee" % id1
5453 if "OK" not in dev[1].request(cmd):
5454 raise Exception("Failed to initiate DPP Authentication")
5455 ev = dev[0].wait_event(["DPP: Failed to set configurator parameters"],
5456 timeout=5)
5457 if ev is None:
5458 raise Exception("DPP configuration failure not reported")
5459
5460 def test_dpp_legacy_params_failure(dev, apdev):
5461 """DPP legacy parameters local failure"""
5462 check_dpp_capab(dev[0])
5463 check_dpp_capab(dev[1])
5464
5465 addr = dev[0].own_addr().replace(':', '')
5466 cmd = "DPP_BOOTSTRAP_GEN type=qrcode chan=81/1 mac=" + addr
5467 res = dev[0].request(cmd)
5468 if "FAIL" in res:
5469 raise Exception("Failed to generate bootstrapping info")
5470 id0 = int(res)
5471 uri0 = dev[0].request("DPP_BOOTSTRAP_GET_URI %d" % id0)
5472
5473 res = dev[1].request("DPP_QR_CODE " + uri0)
5474 if "FAIL" in res:
5475 raise Exception("Failed to parse QR Code URI")
5476 id1 = int(res)
5477
5478 if "OK" not in dev[0].request("DPP_LISTEN 2412"):
5479 raise Exception("Failed to start listen operation")
5480
5481 cmd = "DPP_AUTH_INIT peer=%d conf=sta-psk pass=%s ssid=%s" % (id1, "passphrase".encode("hex"), "dpp-legacy".encode("hex"))
5482 with alloc_fail(dev[1], 1, "dpp_build_conf_obj_legacy"):
5483 if "OK" not in dev[1].request(cmd):
5484 raise Exception("Failed to initiate DPP")
5485 ev = dev[0].wait_event(["DPP-CONF-FAILED"], timeout=5)
5486 if ev is None:
5487 raise Exception("DPP configuration failure not reported")
5488
5489 def test_dpp_invalid_configurator_key(dev, apdev):
5490 """DPP invalid configurator key"""
5491 check_dpp_capab(dev[0])
5492
5493 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=aa"):
5494 raise Exception("Invalid key accepted")
5495
5496 with alloc_fail(dev[0], 1, "dpp_keygen_configurator"):
5497 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256):
5498 raise Exception("Error not reported")
5499
5500 with alloc_fail(dev[0], 1, "dpp_get_pubkey_point;dpp_keygen_configurator"):
5501 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256):
5502 raise Exception("Error not reported")
5503
5504 with alloc_fail(dev[0], 1, "base64_gen_encode;dpp_keygen_configurator"):
5505 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256):
5506 raise Exception("Error not reported")
5507
5508 with fail_test(dev[0], 1, "dpp_keygen_configurator"):
5509 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256):
5510 raise Exception("Error not reported")
5511
5512 def test_dpp_own_config_sign_fail(dev, apdev):
5513 """DPP own config signing failure"""
5514 check_dpp_capab(dev[0])
5515 res = dev[0].request("DPP_CONFIGURATOR_ADD");
5516 if "FAIL" in res:
5517 raise Exception("Failed to add configurator")
5518 conf_id = int(res)
5519 tests = [ "",
5520 " ",
5521 " conf=sta-dpp",
5522 " configurator=%d" % conf_id,
5523 " conf=sta-dpp configurator=%d curve=unsupported" % conf_id ]
5524 for t in tests:
5525 if "FAIL" not in dev[0].request("DPP_CONFIGURATOR_SIGN " + t):
5526 raise Exception("Invalid command accepted: " + t)
5527
5528 def test_dpp_peer_intro_failures(dev, apdev):
5529 """DPP peer introduction failures"""
5530 try:
5531 run_dpp_peer_intro_failures(dev, apdev)
5532 finally:
5533 dev[0].set("dpp_config_processing", "0")
5534
5535 def run_dpp_peer_intro_failures(dev, apdev):
5536 check_dpp_capab(dev[0])
5537 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
5538 check_dpp_capab(hapd)
5539
5540 res = hapd.request("DPP_CONFIGURATOR_ADD key=" + dpp_key_p256);
5541 if "FAIL" in res:
5542 raise Exception("Failed to add configurator")
5543 conf_id = int(res)
5544 csign = hapd.request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id)
5545 if "FAIL" in csign or len(csign) == 0:
5546 raise Exception("DPP_CONFIGURATOR_GET_KEY failed")
5547
5548 res = dev[0].request("DPP_CONFIGURATOR_ADD key=" + csign);
5549 if "FAIL" in res:
5550 raise Exception("Failed to add configurator")
5551 conf_id2 = int(res)
5552 csign2 = dev[0].request("DPP_CONFIGURATOR_GET_KEY %d" % conf_id2)
5553
5554 if csign != csign2:
5555 raise Exception("Unexpected difference in configurator key")
5556
5557 cmd = "DPP_CONFIGURATOR_SIGN conf=ap-dpp configurator=%d" % conf_id
5558 res = hapd.request(cmd)
5559 if "FAIL" in res:
5560 raise Exception("Failed to generate own configuration")
5561 update_hapd_config(hapd)
5562
5563 dev[0].set("dpp_config_processing", "1")
5564 cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d" % conf_id
5565 res = dev[0].request(cmd)
5566 if "FAIL" in res:
5567 raise Exception("Failed to generate own configuration")
5568 ev = dev[0].wait_event(["DPP-NETWORK-ID"], timeout=1)
5569 if ev is None:
5570 raise Exception("DPP network profile not generated")
5571 id = ev.split(' ')[1]
5572 dev[0].select_network(id, freq=2412)
5573 dev[0].wait_connected()
5574 dev[0].request("DISCONNECT")
5575 dev[0].wait_disconnected()
5576 dev[0].dump_monitor()
5577
5578 tests = [ "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiIwTlNSNTlxRTc0alFfZTFLVGVPV1lYY1pTWnFUaDdNXzU0aHJPcFRpaFJnIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOltdLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiJiVmFMRGlBT09OQmFjcVFVN1pYamFBVEtEMVhhbDVlUExqOUZFZUl3VkN3IiwieSI6Il95c25JR1hTYjBvNEsyMWg0anZmSkZxMHdVNnlPNWp1VUFPd3FuM0dHVHMifX0.WgzZBOJaisWBRxvtXPbVYPXU7OIZxs6sZD-cPOLmJVTIYZKdMkSOMvP5b6si_j61FIrjhm43tmGq1P6cpoxB_g",
5579 "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiIwTlNSNTlxRTc0alFfZTFLVGVPV1lYY1pTWnFUaDdNXzU0aHJPcFRpaFJnIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7fV0sIm5ldEFjY2Vzc0tleSI6eyJrdHkiOiJFQyIsImNydiI6IlAtMjU2IiwieCI6IkJhY3BWSDNpNDBrZklNS0RHa1FFRzhCODBCaEk4cEFmTWpLbzM5NlFZT2ciLCJ5IjoiMjBDYjhDNjRsSjFzQzV2NXlKMnBFZXRRempxMjI4YVV2cHMxNmQ0M3EwQSJ9fQ.dG2y8VvZQJ5hfob8E5F2FAeR7Nd700qstYkxDgA2QfARaNMZ0_SfKfoG-yKXsIZNM-TvGBfACgfhagG9Oaw_Xw",
5580 "eyJ0eXAiOiJkcHBDb24iLCJraWQiOiIwTlNSNTlxRTc0alFfZTFLVGVPV1lYY1pTWnFUaDdNXzU0aHJPcFRpaFJnIiwiYWxnIjoiRVMyNTYifQ.eyJncm91cHMiOlt7Imdyb3VwSWQiOiIqIn1dLCJuZXRBY2Nlc3NLZXkiOnsia3R5IjoiRUMiLCJjcnYiOiJQLTI1NiIsIngiOiJkc2VmcmJWWlhad0RMWHRpLWlObDBBYkFIOXpqeFFKd0R1SUd5NzNuZGU0IiwieSI6IjZFQnExN3cwYW1fZlh1OUQ4UGxWYk9XZ2I3b19DcTUxWHlmSG8wcHJyeDQifX0.caBvdDUtXrhnS61-juVZ_2FQdprepv0yZjC04G4ERvLUpeX7cgu0Hp-A1aFDogP1PEFGpkaEdcAWRQnSSRiIKQ" ]
5581 for t in tests:
5582 dev[0].set_network_quoted(id, "dpp_connector", t)
5583 dev[0].select_network(id, freq=2412)
5584 ev = dev[0].wait_event(["DPP-INTRO"], timeout=5)
5585 if ev is None or "status=8" not in ev:
5586 raise Exception("Introduction failure not reported")
5587 dev[0].request("DISCONNECT")
5588 dev[0].dump_monitor()
5589
5590 def test_dpp_peer_intro_local_failures(dev, apdev):
5591 """DPP peer introduction local failures"""
5592 check_dpp_capab(dev[0])
5593 check_dpp_capab(dev[1])
5594
5595 params = { "ssid": "dpp",
5596 "wpa": "2",
5597 "wpa_key_mgmt": "DPP",
5598 "ieee80211w": "2",
5599 "rsn_pairwise": "CCMP",
5600 "dpp_connector": params1_ap_connector,
5601 "dpp_csign": params1_csign,
5602 "dpp_netaccesskey": params1_ap_netaccesskey }
5603 try:
5604 hapd = hostapd.add_ap(apdev[0], params)
5605 except:
5606 raise HwsimSkip("DPP not supported")
5607
5608 tests = [ "dpp_derive_pmk",
5609 "dpp_hkdf_expand;dpp_derive_pmk",
5610 "dpp_derive_pmkid" ]
5611 for func in tests:
5612 with fail_test(dev[0], 1, func):
5613 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
5614 ieee80211w="2",
5615 dpp_csign=params1_csign,
5616 dpp_connector=params1_sta_connector,
5617 dpp_netaccesskey=params1_sta_netaccesskey,
5618 wait_connect=False)
5619 ev = dev[0].wait_event(["DPP-INTRO"], timeout=10)
5620 if ev is None or "fail=peer_connector_validation_failed" not in ev:
5621 raise Exception("Introduction failure not reported")
5622 dev[0].request("REMOVE_NETWORK all")
5623 dev[0].dump_monitor()
5624
5625 tests = [ (1, "base64_gen_decode;dpp_peer_intro"),
5626 (1, "json_parse;dpp_peer_intro"),
5627 (50, "json_parse;dpp_peer_intro"),
5628 (1, "=dpp_peer_intro"),
5629 (1, "dpp_parse_jwk") ]
5630 for count,func in tests:
5631 with alloc_fail(dev[0], count, func):
5632 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
5633 ieee80211w="2",
5634 dpp_csign=params1_csign,
5635 dpp_connector=params1_sta_connector,
5636 dpp_netaccesskey=params1_sta_netaccesskey,
5637 wait_connect=False)
5638 ev = dev[0].wait_event(["DPP-INTRO"], timeout=10)
5639 if ev is None or "fail=peer_connector_validation_failed" not in ev:
5640 raise Exception("Introduction failure not reported")
5641 dev[0].request("REMOVE_NETWORK all")
5642 dev[0].dump_monitor()
5643
5644 parts = params1_ap_connector.split('.')
5645 for ap_connector in [ '.'.join(parts[0:2]), '.'.join(parts[0:1]) ]:
5646 hapd.set("dpp_connector", ap_connector)
5647 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
5648 ieee80211w="2",
5649 dpp_csign=params1_csign,
5650 dpp_connector=params1_sta_connector,
5651 dpp_netaccesskey=params1_sta_netaccesskey,
5652 wait_connect=False)
5653 ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=10)
5654 if ev is None:
5655 raise Exception("No TX status reported")
5656 dev[0].request("REMOVE_NETWORK all")
5657 dev[0].dump_monitor()
5658
5659 hapd.set("dpp_netaccesskey", "00")
5660 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
5661 ieee80211w="2",
5662 dpp_csign=params1_csign,
5663 dpp_connector=params1_sta_connector,
5664 dpp_netaccesskey=params1_sta_netaccesskey,
5665 wait_connect=False)
5666 ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=10)
5667 if ev is None:
5668 raise Exception("No TX status reported")
5669 dev[0].request("REMOVE_NETWORK all")
5670 dev[0].dump_monitor()
5671
5672 hapd.set("dpp_csign", "00")
5673 dev[0].connect("dpp", key_mgmt="DPP", scan_freq="2412",
5674 ieee80211w="2",
5675 dpp_csign=params1_csign,
5676 dpp_connector=params1_sta_connector,
5677 dpp_netaccesskey=params1_sta_netaccesskey,
5678 wait_connect=False)
5679 ev = dev[0].wait_event(["DPP-TX-STATUS"], timeout=10)
5680 if ev is None:
5681 raise Exception("No TX status reported")
5682 dev[0].request("REMOVE_NETWORK all")
5683 dev[0].dump_monitor()
5684
5685 def run_dpp_configurator_id_unknown(dev):
5686 check_dpp_capab(dev)
5687 res = dev.request("DPP_CONFIGURATOR_ADD")
5688 if "FAIL" in res:
5689 raise Exception("Failed to add configurator")
5690 conf_id = int(res)
5691 if "FAIL" not in dev.request("DPP_CONFIGURATOR_GET_KEY %d" % (conf_id + 1)):
5692 raise Exception("DPP_CONFIGURATOR_GET_KEY with incorrect id accepted")
5693
5694 cmd = "DPP_CONFIGURATOR_SIGN conf=sta-dpp configurator=%d" % (conf_id + 1)
5695 if "FAIL" not in dev.request(cmd):
5696 raise Exception("DPP_CONFIGURATOR_SIGN with incorrect id accepted")
5697
5698 def test_dpp_configurator_id_unknown(dev, apdev):
5699 """DPP and unknown configurator id"""
5700 run_dpp_configurator_id_unknown(dev[0])
5701 hapd = hostapd.add_ap(apdev[0], { "ssid": "unconfigured" })
5702 run_dpp_configurator_id_unknown(hapd)