@@ -1,5 +1,5 @@
hw_mode=g
-channel=1
+channel=6
ssid=ssidCCMP
wpa=2
new file mode 100644
@@ -0,0 +1,150 @@
+#!/usr/bin/python3
+
+import unittest
+import sys
+
+sys.path.append('../util')
+from iwd import IWD
+from iwd import DeviceProvisioning
+from wpas import Wpas
+from hostapd import HostapdCLI
+from hwsim import Hwsim
+from config import ctx
+
+class Test(unittest.TestCase):
+ def start_wpas_pkex(self, code, curve=None, **kwargs):
+ self.wpas.dpp_bootstrap_gen(type='pkex', curve=curve)
+ self.wpas.dpp_pkex_add(code=code, **kwargs)
+ if kwargs.get('role', 'configurator') == 'configurator':
+ self.wpas.dpp_configurator_create()
+ self.wpas.dpp_listen(2437)
+
+ def test_pkex_iwd_as_enrollee(self):
+ self.start_wpas_pkex('secret123', identifier="test")
+
+ self.device.dpp_pkex_enroll(key='secret123', identifier="test")
+
+ self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
+
+ def test_pkex_iwd_as_enrollee_retransmit(self):
+ self.rule_reveal_req.enabled = True
+
+ self.start_wpas_pkex('secret123', identifier="test")
+
+ self.device.dpp_pkex_enroll(key='secret123', identifier="test")
+
+ self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
+
+ def test_pkex_unsupported_version(self):
+ self.start_wpas_pkex('secret123', identifier="test", version=2)
+
+ self.device.dpp_pkex_enroll(key='secret123', identifier="test")
+
+ with self.assertRaises(TimeoutError):
+ self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
+
+ def test_pkex_iwd_as_configurator(self):
+ self.hapd.reload()
+ self.hapd.wait_for_event('AP-ENABLED')
+
+ IWD.copy_to_storage('ssidCCMP.psk')
+ self.device.autoconnect = True
+
+ condition = 'obj.state == DeviceState.connected'
+ self.wd.wait_for_object_condition(self.device, condition)
+
+ self.start_wpas_pkex('secret123', identifier="test", initiator=True, role='enrollee')
+
+ self.device.dpp_pkex_configure()
+
+ self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
+ self.wpas.wait_for_event("DPP-CONF-RECEIVED")
+
+ def test_pkex_iwd_as_configurator_retransmit(self):
+ self.rule_xchg_resp.enabled = True
+ self.rule_reveal_resp.enabled = True
+ self.hapd.reload()
+ self.hapd.wait_for_event('AP-ENABLED')
+
+ IWD.copy_to_storage('ssidCCMP.psk')
+ self.device.autoconnect = True
+
+ condition = 'obj.state == DeviceState.connected'
+ self.wd.wait_for_object_condition(self.device, condition)
+
+ self.start_wpas_pkex('secret123', identifier="test", initiator=True, role='enrollee')
+
+ self.device.dpp_pkex_configure()
+
+ self.wpas.wait_for_event("DPP-AUTH-SUCCESS")
+ self.wpas.wait_for_event("DPP-CONF-RECEIVED")
+
+ def test_pkex_iwd_as_configurator_bad_group(self):
+ self.hapd.reload()
+ self.hapd.wait_for_event('AP-ENABLED')
+
+ IWD.copy_to_storage('ssidCCMP.psk')
+ self.device.autoconnect = True
+
+ condition = 'obj.state == DeviceState.connected'
+ self.wd.wait_for_object_condition(self.device, condition)
+
+ self.start_wpas_pkex('secret123', identifier="test", initiator=True, role='enrollee', curve='P-384')
+
+ self.device.dpp_pkex_configure()
+
+ self.wpas.wait_for_event(f"DPP-RX src={self.device.address} freq=2437 type=8")
+ self.wpas.wait_for_event("DPP-FAIL")
+
+ def setUp(self):
+ self.wpas = Wpas('wpas.conf')
+ self.wd = IWD(True)
+ self.device = self.wd.list_devices(1)[0]
+ self.hapd = HostapdCLI('hostapd.conf')
+ self.hapd.disable()
+ self.hwsim = Hwsim()
+
+ self.rule_xchg_resp = self.hwsim.rules.create()
+ self.rule_xchg_resp.prefix = 'd0'
+ self.rule_xchg_resp.match_offset = 24
+ self.rule_xchg_resp.match = '04 09 50 6f 9a 1a 01 08'
+ self.rule_xchg_resp.match_times = 1
+ self.rule_xchg_resp.drop = True
+
+ self.rule_reveal_resp = self.hwsim.rules.create()
+ self.rule_reveal_resp.prefix = 'd0'
+ self.rule_reveal_resp.match_offset = 24
+ self.rule_reveal_resp.match = '04 09 50 6f 9a 1a 01 0a'
+ self.rule_reveal_resp.match_times = 1
+ self.rule_reveal_resp.drop = True
+
+ self.rule_reveal_req = self.hwsim.rules.create()
+ self.rule_reveal_req.prefix = 'd0'
+ self.rule_reveal_req.match_offset = 24
+ self.rule_reveal_req.match = '04 09 50 6f 9a 1a 01 09'
+ self.rule_reveal_req.match_times = 1
+ self.rule_reveal_req.drop = True
+
+ def tearDown(self):
+ self.device.disconnect()
+ self.device.dpp_stop()
+ self.wpas.dpp_configurator_remove()
+ self.wpas.clean_up()
+
+ self.wd = None
+ self.device = None
+ self.wpas = None
+ self.hapd = None
+ self.rule_xchg_resp = None
+ IWD.clear_storage()
+
+ @classmethod
+ def setUpClass(cls):
+ pass
+
+ @classmethod
+ def tearDownClass(cls):
+ pass
+
+if __name__ == '__main__':
+ unittest.main(exit=True)
\ No newline at end of file
@@ -1,2 +1,4 @@
[Security]
Passphrase=secret123
+DeviceProvisioningSharedCode=secret123
+DeviceProvisioningIdentifier=test