mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 08:48:31 -05:00
d463c5566f
This increases wpa_supplicant_ie_txt(), print_bss_info(), and wpa_supplicant_ctrl_iface_scan_result() testing coverage to include the previously missing key management options. Signed-off-by: Jouni Malinen <j@w1.fi>
46 lines
1.7 KiB
Python
46 lines
1.7 KiB
Python
# Suite B tests
|
|
# Copyright (c) 2014, Jouni Malinen <j@w1.fi>
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
import time
|
|
import logging
|
|
logger = logging.getLogger()
|
|
|
|
import hostapd
|
|
|
|
def test_suite_b(dev, apdev):
|
|
"""WPA2-PSK/GCMP connection"""
|
|
if "GCMP" not in dev[0].get_capability("pairwise"):
|
|
return "skip"
|
|
params = hostapd.wpa2_eap_params(ssid="test-suite-b")
|
|
params["wpa_key_mgmt"] = "WPA-EAP-SUITE-B"
|
|
params['rsn_pairwise'] = "GCMP"
|
|
hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
# TODO: Force Suite B configuration for TLS
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B",
|
|
eap="TLS", identity="tls user", ca_cert="auth_serv/ca.pem",
|
|
client_cert="auth_serv/user.pem",
|
|
private_key="auth_serv/user.key",
|
|
pairwise="GCMP", group="GCMP", scan_freq="2412")
|
|
|
|
bss = dev[0].get_bss(apdev[0]['bssid'])
|
|
if 'flags' not in bss:
|
|
raise Exception("Could not get BSS flags from BSS table")
|
|
if "[WPA2-EAP-SUITE-B-GCMP]" not in bss['flags']:
|
|
raise Exception("Unexpected BSS flags: " + bss['flags'])
|
|
|
|
dev[0].request("DISCONNECT")
|
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=20)
|
|
if ev is None:
|
|
raise Exception("Disconnection event timed out")
|
|
dev[0].dump_monitor()
|
|
dev[0].request("RECONNECT")
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
|
|
"CTRL-EVENT-CONNECTED"], timeout=20)
|
|
if ev is None:
|
|
raise Exception("Roaming with the AP timed out")
|
|
if "CTRL-EVENT-EAP-STARTED" in ev:
|
|
raise Exception("Unexpected EAP exchange")
|