3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-25 01:19:23 +01:00

unit: Update eapol test with eapol API changes

This commit is contained in:
Andrew Zaborowski 2016-11-02 23:46:20 +01:00 committed by Denis Kenzior
parent e32ffc4d98
commit f74e6f4261

View File

@ -34,6 +34,7 @@
#include "src/crypto.h" #include "src/crypto.h"
#include "src/ie.h" #include "src/ie.h"
#include "src/eap.h" #include "src/eap.h"
#include "src/handshake.h"
/* Our nonce to use + its size */ /* Our nonce to use + its size */
static const uint8_t *snonce; static const uint8_t *snonce;
@ -1920,12 +1921,13 @@ static void eapol_sm_test_ptk(const void *data)
static uint8_t ap_address[] = { 0x24, 0xa2, 0xe1, 0xec, 0x17, 0x04 }; static uint8_t ap_address[] = { 0x24, 0xa2, 0xe1, 0xec, 0x17, 0x04 };
static uint8_t sta_address[] = { 0xa0, 0xa8, 0xcd, 0x1c, 0x7e, 0xc9 }; static uint8_t sta_address[] = { 0xa0, 0xa8, 0xcd, 0x1c, 0x7e, 0xc9 };
bool r; bool r;
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
eapol_init(); eapol_init();
snonce = eapol_key_test_4.key_nonce; snonce = eapol_key_test_4.key_nonce;
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
aa = ap_address; aa = ap_address;
spa = sta_address; spa = sta_address;
@ -1936,21 +1938,22 @@ static void eapol_sm_test_ptk(const void *data)
expected_step4_frame = eapol_key_data_6; expected_step4_frame = eapol_key_data_6;
expected_step4_frame_size = sizeof(eapol_key_data_6); expected_step4_frame_size = sizeof(eapol_key_data_6);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_register(sm);
/* key_data_3 uses 2004 while key_data_3 uses 2001, so force 2001 */ /* key_data_3 uses 2004 while key_data_3 uses 2001, so force 2001 */
eapol_sm_set_protocol_version(sm, EAPOL_PROTOCOL_VERSION_2001); eapol_sm_set_protocol_version(sm, EAPOL_PROTOCOL_VERSION_2001);
eapol_sm_set_pmk(sm, psk); handshake_state_set_pmk(hs, psk);
eapol_sm_set_authenticator_address(sm, aa); handshake_state_set_authenticator_address(hs, aa);
eapol_sm_set_supplicant_address(sm, spa); handshake_state_set_supplicant_address(hs, spa);
r = eapol_sm_set_own_rsn(sm, r = handshake_state_set_own_rsn(hs,
eapol_key_data_4 + sizeof(struct eapol_key)); eapol_key_data_4 + sizeof(struct eapol_key));
assert(r); assert(r);
eapol_sm_set_ap_rsn(sm, ap_rsne); handshake_state_set_ap_rsn(hs, ap_rsne);
eapol_start(sm); eapol_start(sm);
__eapol_set_tx_packet_func(verify_step2); __eapol_set_tx_packet_func(verify_step2);
@ -1963,7 +1966,8 @@ static void eapol_sm_test_ptk(const void *data)
sizeof(eapol_key_data_5)); sizeof(eapol_key_data_5));
assert(verify_step4_called); assert(verify_step4_called);
eapol_cancel(1); eapol_sm_free(sm);
handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }
@ -1981,12 +1985,13 @@ static void eapol_sm_test_wpa2_ptk_gtk(const void *data)
static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 }; static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 };
static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 }; static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 };
bool r; bool r;
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
eapol_init(); eapol_init();
snonce = eapol_key_test_8.key_nonce; snonce = eapol_key_test_8.key_nonce;
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
aa = ap_address; aa = ap_address;
spa = sta_address; spa = sta_address;
@ -2000,17 +2005,19 @@ static void eapol_sm_test_wpa2_ptk_gtk(const void *data)
expected_gtk_step2_frame = eapol_key_data_12; expected_gtk_step2_frame = eapol_key_data_12;
expected_gtk_step2_frame_size = sizeof(eapol_key_data_12); expected_gtk_step2_frame_size = sizeof(eapol_key_data_12);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_sm_set_pmk(sm, psk); eapol_register(sm);
eapol_sm_set_authenticator_address(sm, aa);
eapol_sm_set_supplicant_address(sm, spa);
r = eapol_sm_set_own_rsn(sm, handshake_state_set_pmk(hs, psk);
handshake_state_set_authenticator_address(hs, aa);
handshake_state_set_supplicant_address(hs, spa);
r = handshake_state_set_own_rsn(hs,
eapol_key_data_8 + sizeof(struct eapol_key)); eapol_key_data_8 + sizeof(struct eapol_key));
assert(r); assert(r);
eapol_sm_set_ap_rsn(sm, ap_rsne); handshake_state_set_ap_rsn(hs, ap_rsne);
eapol_start(sm); eapol_start(sm);
__eapol_set_tx_packet_func(verify_step2); __eapol_set_tx_packet_func(verify_step2);
@ -2028,7 +2035,8 @@ static void eapol_sm_test_wpa2_ptk_gtk(const void *data)
sizeof(eapol_key_data_11)); sizeof(eapol_key_data_11));
assert(verify_gtk_step2_called); assert(verify_gtk_step2_called);
eapol_cancel(1); eapol_sm_free(sm);
handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }
@ -2046,11 +2054,12 @@ static void eapol_sm_test_wpa_ptk_gtk(const void *data)
static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 }; static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 };
static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 }; static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 };
bool r; bool r;
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
eapol_init(); eapol_init();
snonce = eapol_key_test_14.key_nonce; snonce = eapol_key_test_14.key_nonce;
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
aa = ap_address; aa = ap_address;
spa = sta_address; spa = sta_address;
@ -2064,16 +2073,18 @@ static void eapol_sm_test_wpa_ptk_gtk(const void *data)
expected_gtk_step2_frame = eapol_key_data_18; expected_gtk_step2_frame = eapol_key_data_18;
expected_gtk_step2_frame_size = sizeof(eapol_key_data_18); expected_gtk_step2_frame_size = sizeof(eapol_key_data_18);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_sm_set_pmk(sm, psk); eapol_register(sm);
eapol_sm_set_authenticator_address(sm, ap_address);
eapol_sm_set_supplicant_address(sm, sta_address); handshake_state_set_pmk(hs, psk);
r = eapol_sm_set_own_wpa(sm, handshake_state_set_authenticator_address(hs, ap_address);
handshake_state_set_supplicant_address(hs, sta_address);
r = handshake_state_set_own_wpa(hs,
eapol_key_data_14 + sizeof(struct eapol_key)); eapol_key_data_14 + sizeof(struct eapol_key));
assert(r); assert(r);
eapol_sm_set_ap_wpa(sm, ap_wpa_ie); handshake_state_set_ap_wpa(hs, ap_wpa_ie);
eapol_start(sm); eapol_start(sm);
__eapol_set_tx_packet_func(verify_step2); __eapol_set_tx_packet_func(verify_step2);
@ -2091,7 +2102,8 @@ static void eapol_sm_test_wpa_ptk_gtk(const void *data)
sizeof(eapol_key_data_17)); sizeof(eapol_key_data_17));
assert(verify_gtk_step2_called); assert(verify_gtk_step2_called);
eapol_cancel(1); eapol_sm_free(sm);
handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }
@ -2109,11 +2121,12 @@ static void eapol_sm_test_wpa_ptk_gtk_2(const void *data)
static uint8_t ap_address[] = { 0x24, 0xa2, 0xe1, 0xec, 0x17, 0x04 }; static uint8_t ap_address[] = { 0x24, 0xa2, 0xe1, 0xec, 0x17, 0x04 };
static uint8_t sta_address[] = { 0xa0, 0xa8, 0xcd, 0x1c, 0x7e, 0xc9 }; static uint8_t sta_address[] = { 0xa0, 0xa8, 0xcd, 0x1c, 0x7e, 0xc9 };
bool r; bool r;
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
eapol_init(); eapol_init();
snonce = eapol_key_test_20.key_nonce; snonce = eapol_key_test_20.key_nonce;
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
aa = ap_address; aa = ap_address;
spa = sta_address; spa = sta_address;
@ -2127,17 +2140,19 @@ static void eapol_sm_test_wpa_ptk_gtk_2(const void *data)
expected_gtk_step2_frame = eapol_key_data_24; expected_gtk_step2_frame = eapol_key_data_24;
expected_gtk_step2_frame_size = sizeof(eapol_key_data_24); expected_gtk_step2_frame_size = sizeof(eapol_key_data_24);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_sm_set_pmk(sm, psk); eapol_register(sm);
eapol_sm_set_authenticator_address(sm, ap_address);
eapol_sm_set_supplicant_address(sm, sta_address);
r = eapol_sm_set_own_wpa(sm, handshake_state_set_pmk(hs, psk);
handshake_state_set_authenticator_address(hs, ap_address);
handshake_state_set_supplicant_address(hs, sta_address);
r = handshake_state_set_own_wpa(hs,
eapol_key_data_20 + sizeof(struct eapol_key)); eapol_key_data_20 + sizeof(struct eapol_key));
assert(r); assert(r);
eapol_sm_set_ap_wpa(sm, ap_wpa_ie); handshake_state_set_ap_wpa(hs, ap_wpa_ie);
eapol_start(sm); eapol_start(sm);
__eapol_set_tx_packet_func(verify_step2); __eapol_set_tx_packet_func(verify_step2);
@ -2155,7 +2170,8 @@ static void eapol_sm_test_wpa_ptk_gtk_2(const void *data)
sizeof(eapol_key_data_23)); sizeof(eapol_key_data_23));
assert(verify_gtk_step2_called); assert(verify_gtk_step2_called);
eapol_cancel(1); eapol_sm_free(sm);
handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }
@ -2333,6 +2349,7 @@ static void eapol_sm_test_tls(struct eapol_8021x_tls_test_state *s,
static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 }; static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 };
static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 }; static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 };
bool r; bool r;
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
struct l_settings *settings; struct l_settings *settings;
uint8_t tx_buf[2000]; uint8_t tx_buf[2000];
@ -2347,27 +2364,30 @@ static void eapol_sm_test_tls(struct eapol_8021x_tls_test_state *s,
spa = sta_address; spa = sta_address;
eapol_init(); eapol_init();
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
__eapol_set_deauthenticate_func(verify_deauthenticate); __eapol_set_deauthenticate_func(verify_deauthenticate);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_sm_set_authenticator_address(sm, ap_address); eapol_register(sm);
eapol_sm_set_supplicant_address(sm, sta_address);
handshake_state_set_authenticator_address(hs, ap_address);
handshake_state_set_supplicant_address(hs, sta_address);
__eapol_set_tx_user_data(s); __eapol_set_tx_user_data(s);
settings = l_settings_new(); r = handshake_state_set_own_wpa(hs,
l_settings_load_from_data(settings, config, strlen(config));
eapol_sm_set_8021x_config(sm, settings);
l_settings_free(settings);
r = eapol_sm_set_own_wpa(sm,
eapol_key_data_20 + sizeof(struct eapol_key)); eapol_key_data_20 + sizeof(struct eapol_key));
assert(r); assert(r);
eapol_sm_set_ap_wpa(sm, ap_wpa_ie); handshake_state_set_ap_wpa(hs, ap_wpa_ie);
settings = l_settings_new();
l_settings_load_from_data(settings, config, strlen(config));
handshake_state_set_8021x_config(hs, settings);
eapol_start(sm); eapol_start(sm);
l_settings_free(settings);
__eapol_set_tx_packet_func(verify_8021x_identity_resp); __eapol_set_tx_packet_func(verify_8021x_identity_resp);
s->pending_req = 1; s->pending_req = 1;
__eapol_rx_packet(1, ap_address, eap_identity_req, __eapol_rx_packet(1, ap_address, eap_identity_req,
@ -2521,13 +2541,14 @@ static void eapol_sm_test_tls(struct eapol_8021x_tls_test_state *s,
expected_step4_frame_size = sizeof(eapol_key_data_16); expected_step4_frame_size = sizeof(eapol_key_data_16);
__eapol_set_tx_packet_func(verify_step4); __eapol_set_tx_packet_func(verify_step4);
__eapol_set_install_tk_func(verify_install_tk); __handshake_set_install_tk_func(verify_install_tk);
eapol_sm_set_user_data(sm, ptk->tk); eapol_sm_set_user_data(sm, ptk->tk);
__eapol_rx_packet(1, ap_address, step3_buf, sizeof(eapol_key_data_15)); __eapol_rx_packet(1, ap_address, step3_buf, sizeof(eapol_key_data_15));
assert(verify_step4_called); assert(verify_step4_called);
assert(verify_install_tk_called); assert(verify_install_tk_called);
eapol_cancel(1); eapol_sm_free(sm);
handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }
@ -2691,6 +2712,7 @@ static void eapol_sm_test_eap_nak(const void *data)
static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 }; static uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 };
static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 }; static uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x01, 0x00 };
bool r; bool r;
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
struct l_settings *settings; struct l_settings *settings;
struct eapol_8021x_tls_test_state s; struct eapol_8021x_tls_test_state s;
@ -2699,28 +2721,31 @@ static void eapol_sm_test_eap_nak(const void *data)
spa = sta_address; spa = sta_address;
eapol_init(); eapol_init();
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
__eapol_set_deauthenticate_func(verify_deauthenticate); __eapol_set_deauthenticate_func(verify_deauthenticate);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_sm_set_authenticator_address(sm, ap_address); eapol_register(sm);
eapol_sm_set_supplicant_address(sm, sta_address);
handshake_state_set_authenticator_address(hs, ap_address);
handshake_state_set_supplicant_address(hs, sta_address);
__eapol_set_tx_user_data(&s); __eapol_set_tx_user_data(&s);
r = handshake_state_set_own_wpa(hs,
eapol_key_data_20 + sizeof(struct eapol_key));
assert(r);
handshake_state_set_ap_wpa(hs, ap_wpa_ie);
settings = l_settings_new(); settings = l_settings_new();
l_settings_load_from_data(settings, eapol_8021x_config, l_settings_load_from_data(settings, eapol_8021x_config,
strlen(eapol_8021x_config)); strlen(eapol_8021x_config));
eapol_sm_set_8021x_config(sm, settings); handshake_state_set_8021x_config(hs, settings);
l_settings_free(settings);
r = eapol_sm_set_own_wpa(sm,
eapol_key_data_20 + sizeof(struct eapol_key));
assert(r);
eapol_sm_set_ap_wpa(sm, ap_wpa_ie);
eapol_start(sm); eapol_start(sm);
l_settings_free(settings);
__eapol_set_tx_packet_func(verify_8021x_identity_resp); __eapol_set_tx_packet_func(verify_8021x_identity_resp);
s.pending_req = 1; s.pending_req = 1;
__eapol_rx_packet(1, ap_address, eap_identity_req, __eapol_rx_packet(1, ap_address, eap_identity_req,
@ -2739,7 +2764,7 @@ static void eapol_sm_test_eap_nak(const void *data)
sizeof(eap_failure)); sizeof(eap_failure));
assert(eap_nak_verify_deauthenticate_called); assert(eap_nak_verify_deauthenticate_called);
eapol_cancel(1); handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }
@ -2778,12 +2803,13 @@ static void eapol_ft_handshake_test(const void *data)
const uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 }; const uint8_t ap_address[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00 };
const uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x02, 0x00 }; const uint8_t sta_address[] = { 0x02, 0x00, 0x00, 0x00, 0x02, 0x00 };
const char *ssid = "TestFT"; const char *ssid = "TestFT";
struct handshake_state *hs;
struct eapol_sm *sm; struct eapol_sm *sm;
eapol_init(); eapol_init();
snonce = eapol_key_test_26.key_nonce; snonce = eapol_key_test_26.key_nonce;
__eapol_set_get_nonce_func(test_nonce); __handshake_set_get_nonce_func(test_nonce);
aa = ap_address; aa = ap_address;
spa = sta_address; spa = sta_address;
@ -2794,18 +2820,20 @@ static void eapol_ft_handshake_test(const void *data)
expected_step4_frame = eapol_key_data_28; expected_step4_frame = eapol_key_data_28;
expected_step4_frame_size = sizeof(eapol_key_data_28); expected_step4_frame_size = sizeof(eapol_key_data_28);
sm = eapol_sm_new(); hs = handshake_state_new(1);
eapol_register(1, sm); sm = eapol_sm_new(hs);
eapol_sm_set_pmk(sm, psk); eapol_register(sm);
eapol_sm_set_authenticator_address(sm, aa);
eapol_sm_set_supplicant_address(sm, spa);
eapol_sm_set_ssid(sm, (void *) ssid, strlen(ssid));
eapol_sm_set_own_rsn(sm, own_rsne); handshake_state_set_pmk(hs, psk);
eapol_sm_set_ap_rsn(sm, ap_rsne); handshake_state_set_authenticator_address(hs, aa);
eapol_sm_set_mde(sm, mde); handshake_state_set_supplicant_address(hs, spa);
eapol_sm_set_fte(sm, fte); handshake_state_set_ssid(hs, (void *) ssid, strlen(ssid));
eapol_sm_set_kh_ids(sm, r0khid, strlen((void *) r0khid), r1khid);
handshake_state_set_own_rsn(hs, own_rsne);
handshake_state_set_ap_rsn(hs, ap_rsne);
handshake_state_set_mde(hs, mde);
handshake_state_set_fte(hs, fte);
handshake_state_set_kh_ids(hs, r0khid, strlen((void *) r0khid), r1khid);
eapol_start(sm); eapol_start(sm);
__eapol_set_tx_packet_func(verify_step2); __eapol_set_tx_packet_func(verify_step2);
@ -2816,7 +2844,8 @@ static void eapol_ft_handshake_test(const void *data)
__eapol_rx_packet(1, aa, eapol_key_data_27, sizeof(eapol_key_data_27)); __eapol_rx_packet(1, aa, eapol_key_data_27, sizeof(eapol_key_data_27));
assert(verify_step4_called); assert(verify_step4_called);
eapol_cancel(1); eapol_sm_free(sm);
handshake_state_free(hs);
eapol_exit(); eapol_exit();
} }