--- /dev/null
+# Test cases for RSNE/RSNXE overriding
+# Copyright (c) 2023-2024, Qualcomm Innovation Center, Inc.
+#
+# This software may be distributed under the terms of the BSD license.
+# See README for more details.
+
+import hostapd
+from utils import *
+from hwsim import HWSimRadio
+from wpasupplicant import WpaSupplicant
+from test_eht import eht_mld_enable_ap, eht_verify_status, eht_verify_wifi_version, traffic_test
+
+def test_rsn_override(dev, apdev):
+ """RSNE=WPA2-Personal/PMF-optional override=WPA3-Personal/PMF-required (with MLO parameters)"""
+ check_sae_capab(dev[0])
+
+ ssid = "test-rsn-override"
+ params = hostapd.wpa2_params(ssid=ssid,
+ passphrase="12345678",
+ ieee80211w='1')
+ params['rsn_override_key_mgmt'] = 'SAE SAE-EXT-KEY'
+ params['rsn_override_pairwise'] = 'CCMP GCMP-256'
+ params['rsn_override_mfp'] = '2'
+ params['beacon_prot'] = '1'
+ params['sae_groups'] = '19 20'
+ params['sae_require_mfp'] = '1'
+ params['sae_pwe'] = '2'
+ hapd = hostapd.add_ap(apdev[0], params)
+ bssid = hapd.own_addr()
+
+ try:
+ dev[0].set("rsn_overriding", "1")
+ dev[0].scan_for_bss(bssid, freq=2412)
+ bss = dev[0].get_bss(bssid)
+ flags = bss['flags']
+ if "PSK" in flags:
+ raise Exception("Unexpected BSS flags: " + flags)
+ if "-SAE+SAE-EXT-KEY-" not in flags:
+ raise Exception("Unexpected BSS flags: " + flags)
+ if "-GCMP-256+CCMP" not in flags:
+ raise Exception("Unexpected BSS flags: " + flags)
+
+ dev[0].set("sae_pwe", "2")
+ dev[0].set("sae_groups", "")
+ dev[0].connect(ssid, sae_password="12345678", key_mgmt="SAE",
+ ieee80211w="2", scan_freq="2412")
+ finally:
+ dev[0].set("sae_pwe", "0")
+ dev[0].set("rsn_overriding", "0")
+
+def test_rsn_override2(dev, apdev):
+ """RSNE=WPA2-Personal/PMF-disabled override=WPA3-Personal/PMF-required (with MLO parameters)"""
+ check_sae_capab(dev[0])
+
+ ssid = "test-rsn-override"
+ params = hostapd.wpa2_params(ssid=ssid,
+ passphrase="12345678",
+ ieee80211w='0')
+ params['rsn_override_key_mgmt'] = 'SAE SAE-EXT-KEY'
+ params['rsn_override_pairwise'] = 'CCMP GCMP-256'
+ params['rsn_override_mfp'] = '2'
+ params['beacon_prot'] = '1'
+ params['sae_groups'] = '19 20'
+ params['sae_require_mfp'] = '1'
+ params['sae_pwe'] = '2'
+ hapd = hostapd.add_ap(apdev[0], params)
+ bssid = hapd.own_addr()
+
+ try:
+ dev[0].set("rsn_overriding", "1")
+ dev[0].scan_for_bss(bssid, freq=2412)
+ bss = dev[0].get_bss(bssid)
+ flags = bss['flags']
+ if "PSK" in flags:
+ raise Exception("Unexpected BSS flags: " + flags)
+ if "-SAE+SAE-EXT-KEY-" not in flags:
+ raise Exception("Unexpected BSS flags: " + flags)
+ if "-GCMP-256+CCMP" not in flags:
+ raise Exception("Unexpected BSS flags: " + flags)
+
+ dev[0].set("sae_pwe", "2")
+ dev[0].set("sae_groups", "")
+ dev[0].connect(ssid, sae_password="12345678", key_mgmt="SAE",
+ ieee80211w="2", scan_freq="2412")
+ finally:
+ dev[0].set("sae_pwe", "0")
+ dev[0].set("rsn_overriding", "0")
+
+def test_rsn_override_no_pairwise(dev, apdev):
+ """RSN overriding and no pairwise cipher match in RSNEO"""
+ check_sae_capab(dev[0])
+
+ ssid = "test-rsn-override"
+ params = hostapd.wpa2_params(ssid=ssid,
+ passphrase="12345678",
+ ieee80211w='1')
+ params['rsn_override_key_mgmt'] = 'SAE SAE-EXT-KEY'
+ params['rsn_override_pairwise'] = 'GCMP-256'
+ params['rsn_override_mfp'] = '2'
+ params['beacon_prot'] = '1'
+ params['sae_groups'] = '19 20'
+ params['sae_require_mfp'] = '1'
+ hapd = hostapd.add_ap(apdev[0], params)
+ bssid = hapd.own_addr()
+
+ try:
+ dev[0].set("rsn_overriding", "1")
+ dev[0].scan_for_bss(bssid, freq=2412)
+
+ dev[0].set("sae_groups", "")
+ dev[0].connect(ssid, psk="12345678", key_mgmt="WPA-PSK SAE",
+ pairwise="CCMP", ieee80211w="1", scan_freq="2412")
+ finally:
+ dev[0].set("sae_pwe", "0")
+ dev[0].set("rsn_overriding", "0")
+
+def test_rsn_override_mld(dev, apdev):
+ """AP MLD and RSNE=WPA2-Personal/PMF-disabled override=WPA3-Personal/PMF-required"""
+ run_rsn_override_mld(dev, apdev, False)
+
+def test_rsn_override_mld_mixed(dev, apdev):
+ """AP MLD and RSNE=WPA2-Personal/PMF-disabled override=WPA3-Personal/PMF-required on one link"""
+ run_rsn_override_mld(dev, apdev, True)
+
+def run_rsn_override_mld(dev, apdev, mixed):
+ with HWSimRadio(use_mlo=True) as (hapd_radio, hapd_iface), \
+ HWSimRadio(use_mlo=True) as (wpas_radio, wpas_iface):
+
+ wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
+ wpas.interface_add(wpas_iface)
+
+ passphrase = 'qwertyuiop'
+ ssid = "AP MLD RSN override"
+ params = hostapd.wpa2_params(ssid=ssid, passphrase=passphrase)
+ params['ieee80211n'] = '1'
+ params['ieee80211ax'] = '1'
+ params['ieee80211be'] = '1'
+ params['channel'] = '1'
+ params['hw_mode'] = 'g'
+ params['beacon_prot'] = '1'
+ params['sae_groups'] = '19 20'
+ params['sae_require_mfp'] = '1'
+ params['sae_pwe'] = '2'
+ if not mixed:
+ params['rsn_override_key_mgmt'] = 'SAE'
+ params['rsn_override_key_mgmt_2'] = 'SAE-EXT-KEY'
+ params['rsn_override_pairwise'] = 'CCMP'
+ params['rsn_override_pairwise_2'] = 'GCMP-256'
+ params['rsn_override_mfp'] = '1'
+ params['rsn_override_mfp_2'] = '2'
+
+ params1 = dict(params)
+
+ if mixed:
+ params['wpa_key_mgmt'] = 'SAE SAE-EXT-KEY'
+ params['rsn_pairwise'] = 'CCMP GCMP-256'
+ params['ieee80211w'] = '2'
+ params['rsn_override_key_mgmt_2'] = 'SAE SAE-EXT-KEY'
+ params['rsn_override_pairwise_2'] = 'CCMP GCMP-256'
+ params['rsn_override_mfp_2'] = '2'
+
+ params1['rsn_override_key_mgmt_2'] = 'SAE SAE-EXT-KEY'
+ params1['rsn_override_pairwise_2'] = 'CCMP GCMP-256'
+ params1['rsn_override_mfp_2'] = '2'
+
+ hapd0 = eht_mld_enable_ap(hapd_iface, params)
+
+ params1['channel'] = '6'
+ hapd1 = eht_mld_enable_ap(hapd_iface, params1)
+
+ wpas.set("sae_pwe", "1")
+ wpas.set("rsn_overriding", "1")
+ wpas.connect(ssid, sae_password=passphrase, scan_freq="2412 2437",
+ key_mgmt="SAE-EXT-KEY", ieee80211w="2", beacon_prot="1",
+ pairwise="GCMP-256 CCMP")
+
+ eht_verify_status(wpas, hapd0, 2412, 20, is_ht=True, mld=True,
+ valid_links=3, active_links=3)
+ eht_verify_wifi_version(wpas)
+ traffic_test(wpas, hapd0)
+ traffic_test(wpas, hapd1)
+
+ dev[0].set("rsn_overriding", "0")
+ dev[0].connect(ssid, psk=passphrase, key_mgmt="WPA-PSK",
+ scan_freq="2412 2437")
+
+ status = wpas.get_status()
+ if status['key_mgmt'] != 'SAE-EXT-KEY' or \
+ status['pmf'] != '2' or \
+ status['pairwise_cipher'] != 'GCMP-256':
+ raise Exception("Unexpected result for new STA")
+
+ status = dev[0].get_status()
+ if status['key_mgmt'] != 'WPA2-PSK' or \
+ status['pairwise_cipher'] != 'CCMP':
+ raise Exception("Unexpected result for legacy STA")
+
+def test_rsn_override_connect_cmd(dev, apdev):
+ """RSNE=WPA2-Personal/PMF-optional override=WPA3-Personal/PMF-required using cfg80211 connect command"""
+ wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
+ wpas.interface_add("wlan5", drv_params="force_connect_cmd=1 rsn_override_in_driver=1")
+ check_sae_capab(wpas)
+
+ ssid = "test-rsn-override"
+ params = hostapd.wpa2_params(ssid=ssid,
+ passphrase="12345678",
+ ieee80211w='1')
+ params['rsn_override_key_mgmt'] = 'WPA-PSK-SHA256'
+ params['rsn_override_pairwise'] = 'CCMP GCMP-256'
+ params['rsn_override_mfp'] = '2'
+ params['beacon_prot'] = '1'
+ hapd = hostapd.add_ap(apdev[0], params)
+
+ wpas.set("rsn_overriding", "1")
+ wpas.connect(ssid, psk="12345678", key_mgmt="WPA-PSK-SHA256",
+ ieee80211w="2", scan_freq="2412")