xref: /freebsd/contrib/wpa/src/common/common_module_tests.c (revision a90b9d0159070121c221b966469c3e36d912bf82)
1 /*
2  * common module tests
3  * Copyright (c) 2014-2019, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "utils/module_tests.h"
13 #include "crypto/crypto.h"
14 #include "crypto/dh_groups.h"
15 #include "ieee802_11_common.h"
16 #include "ieee802_11_defs.h"
17 #include "gas.h"
18 #include "wpa_common.h"
19 #include "sae.h"
20 
21 
22 struct ieee802_11_parse_test_data {
23 	u8 *data;
24 	size_t len;
25 	ParseRes result;
26 	int count;
27 };
28 
29 static const struct ieee802_11_parse_test_data parse_tests[] = {
30 	{ (u8 *) "", 0, ParseOK, 0 },
31 	{ (u8 *) " ", 1, ParseFailed, 0 },
32 	{ (u8 *) "\xff\x00", 2, ParseUnknown, 1 },
33 	{ (u8 *) "\xff\x01", 2, ParseFailed, 0 },
34 	{ (u8 *) "\xdd\x03\x01\x02\x03", 5, ParseUnknown, 1 },
35 	{ (u8 *) "\xdd\x04\x01\x02\x03\x04", 6, ParseUnknown, 1 },
36 	{ (u8 *) "\xdd\x04\x00\x50\xf2\x02", 6, ParseUnknown, 1 },
37 	{ (u8 *) "\xdd\x05\x00\x50\xf2\x02\x02", 7, ParseOK, 1 },
38 	{ (u8 *) "\xdd\x05\x00\x50\xf2\x02\xff", 7, ParseUnknown, 1 },
39 	{ (u8 *) "\xdd\x04\x00\x50\xf2\xff", 6, ParseUnknown, 1 },
40 	{ (u8 *) "\xdd\x04\x50\x6f\x9a\xff", 6, ParseUnknown, 1 },
41 	{ (u8 *) "\xdd\x04\x00\x90\x4c\x33", 6, ParseOK, 1 },
42 	{ (u8 *) "\xdd\x04\x00\x90\x4c\xff\xdd\x04\x00\x90\x4c\x33", 12,
43 	  ParseUnknown, 2 },
44 	{ (u8 *) "\x10\x01\x00\x21\x00", 5, ParseOK, 2 },
45 	{ (u8 *) "\x24\x00", 2, ParseOK, 1 },
46 	{ (u8 *) "\x38\x00", 2, ParseOK, 1 },
47 	{ (u8 *) "\x54\x00", 2, ParseOK, 1 },
48 	{ (u8 *) "\x5a\x00", 2, ParseOK, 1 },
49 	{ (u8 *) "\x65\x00", 2, ParseOK, 1 },
50 	{ (u8 *) "\x65\x12\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11",
51 	  20, ParseOK, 1 },
52 	{ (u8 *) "\x6e\x00", 2, ParseOK, 1 },
53 	{ (u8 *) "\xc7\x00", 2, ParseOK, 1 },
54 	{ (u8 *) "\xc7\x01\x00", 3, ParseOK, 1 },
55 	{ (u8 *) "\x03\x00\x2a\x00\x36\x00\x37\x00\x38\x00\x2d\x00\x3d\x00\xbf\x00\xc0\x00",
56 	  18, ParseOK, 9 },
57 	{ (u8 *) "\x8b\x00", 2, ParseOK, 1 },
58 	{ (u8 *) "\xdd\x04\x00\x90\x4c\x04", 6, ParseUnknown, 1 },
59 	{ (u8 *) "\xed\x00", 2, ParseOK, 1 },
60 	{ (u8 *) "\xef\x00", 2, ParseOK, 1 },
61 	{ (u8 *) "\xef\x01\x11", 3, ParseOK, 1 },
62 	{ (u8 *) "\xf0\x00", 2, ParseOK, 1 },
63 	{ (u8 *) "\xf1\x00", 2, ParseOK, 1 },
64 	{ (u8 *) "\xf1\x02\x11\x22", 4, ParseOK, 1 },
65 	{ (u8 *) "\xf2\x00", 2, ParseOK, 1 },
66 	{ (u8 *) "\xff\x00", 2, ParseUnknown, 1 },
67 	{ (u8 *) "\xff\x01\x00", 3, ParseUnknown, 1 },
68 	{ (u8 *) "\xff\x01\x01", 3, ParseOK, 1 },
69 	{ (u8 *) "\xff\x02\x01\x00", 4, ParseOK, 1 },
70 	{ (u8 *) "\xff\x01\x02", 3, ParseOK, 1 },
71 	{ (u8 *) "\xff\x04\x02\x11\x22\x33", 6, ParseOK, 1 },
72 	{ (u8 *) "\xff\x01\x04", 3, ParseOK, 1 },
73 	{ (u8 *) "\xff\x01\x05", 3, ParseOK, 1 },
74 	{ (u8 *) "\xff\x0d\x05\x11\x22\x33\x44\x55\x55\x11\x22\x33\x44\x55\x55",
75 	  15, ParseOK, 1 },
76 	{ (u8 *) "\xff\x01\x06", 3, ParseOK, 1 },
77 	{ (u8 *) "\xff\x02\x06\x00", 4, ParseOK, 1 },
78 	{ (u8 *) "\xff\x01\x07", 3, ParseOK, 1 },
79 	{ (u8 *) "\xff\x09\x07\x11\x22\x33\x44\x55\x66\x77\x88", 11,
80 	  ParseOK, 1 },
81 	{ (u8 *) "\xff\x01\x0c", 3, ParseOK, 1 },
82 	{ (u8 *) "\xff\x02\x0c\x00", 4, ParseOK, 1 },
83 	{ (u8 *) "\xff\x01\x0d", 3, ParseOK, 1 },
84 	{ NULL, 0, ParseOK, 0 }
85 };
86 
ieee802_11_parse_tests(void)87 static int ieee802_11_parse_tests(void)
88 {
89 	int i, ret = 0;
90 	struct wpabuf *buf;
91 
92 	wpa_printf(MSG_INFO, "ieee802_11_parse tests");
93 
94 	for (i = 0; parse_tests[i].data; i++) {
95 		const struct ieee802_11_parse_test_data *test;
96 		struct ieee802_11_elems elems;
97 		ParseRes res;
98 
99 		test = &parse_tests[i];
100 		res = ieee802_11_parse_elems(test->data, test->len, &elems, 1);
101 		if (res != test->result ||
102 		    ieee802_11_ie_count(test->data, test->len) != test->count) {
103 			wpa_printf(MSG_ERROR, "ieee802_11_parse test %d failed",
104 				   i);
105 			ret = -1;
106 		}
107 	}
108 
109 	if (ieee802_11_vendor_ie_concat((const u8 *) "\x00\x01", 2, 0) != NULL)
110 	{
111 		wpa_printf(MSG_ERROR,
112 			   "ieee802_11_vendor_ie_concat test failed");
113 		ret = -1;
114 	}
115 
116 	buf = ieee802_11_vendor_ie_concat((const u8 *) "\xdd\x05\x11\x22\x33\x44\x01\xdd\x05\x11\x22\x33\x44\x02\x00\x01",
117 					  16, 0x11223344);
118 	do {
119 		const u8 *pos;
120 
121 		if (!buf) {
122 			wpa_printf(MSG_ERROR,
123 				   "ieee802_11_vendor_ie_concat test 2 failed");
124 			ret = -1;
125 			break;
126 		}
127 
128 		if (wpabuf_len(buf) != 2) {
129 			wpa_printf(MSG_ERROR,
130 				   "ieee802_11_vendor_ie_concat test 3 failed");
131 			ret = -1;
132 			break;
133 		}
134 
135 		pos = wpabuf_head(buf);
136 		if (pos[0] != 0x01 || pos[1] != 0x02) {
137 			wpa_printf(MSG_ERROR,
138 				   "ieee802_11_vendor_ie_concat test 3 failed");
139 			ret = -1;
140 			break;
141 		}
142 	} while (0);
143 	wpabuf_free(buf);
144 
145 	return ret;
146 }
147 
148 
149 struct rsn_ie_parse_test_data {
150 	u8 *data;
151 	size_t len;
152 	int result;
153 };
154 
155 static const struct rsn_ie_parse_test_data rsn_parse_tests[] = {
156 	{ (u8 *) "", 0, -1 },
157 	{ (u8 *) "\x30\x00", 2, -1 },
158 	{ (u8 *) "\x30\x02\x01\x00", 4, 0 },
159 	{ (u8 *) "\x30\x02\x00\x00", 4, -2 },
160 	{ (u8 *) "\x30\x02\x02\x00", 4, -2 },
161 	{ (u8 *) "\x30\x02\x00\x01", 4, -2 },
162 	{ (u8 *) "\x30\x02\x00\x00\x00", 5, -2 },
163 	{ (u8 *) "\x30\x03\x01\x00\x00", 5, -3 },
164 	{ (u8 *) "\x30\x06\x01\x00\x00\x00\x00\x00", 8, -1 },
165 	{ (u8 *) "\x30\x06\x01\x00\x00\x0f\xac\x04", 8, 0 },
166 	{ (u8 *) "\x30\x07\x01\x00\x00\x0f\xac\x04\x00", 9, -5 },
167 	{ (u8 *) "\x30\x08\x01\x00\x00\x0f\xac\x04\x00\x00", 10, -4 },
168 	{ (u8 *) "\x30\x08\x01\x00\x00\x0f\xac\x04\x00\x01", 10, -4 },
169 	{ (u8 *) "\x30\x0c\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04",
170 	  14, 0 },
171 	{ (u8 *) "\x30\x0c\x01\x00\x00\x0f\xac\x04\x00\x01\x00\x0f\xac\x04",
172 	  14, -4 },
173 	{ (u8 *) "\x30\x0c\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x06",
174 	  14, -1 },
175 	{ (u8 *) "\x30\x10\x01\x00\x00\x0f\xac\x04\x02\x00\x00\x0f\xac\x04\x00\x0f\xac\x08",
176 	  18, 0 },
177 	{ (u8 *) "\x30\x0d\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x00",
178 	  15, -7 },
179 	{ (u8 *) "\x30\x0e\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x00\x00",
180 	  16, -6 },
181 	{ (u8 *) "\x30\x0e\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x00\x01",
182 	  16, -6 },
183 	{ (u8 *) "\x30\x12\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01",
184 	  20, 0 },
185 	{ (u8 *) "\x30\x16\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x02\x00\x00\x0f\xac\x01\x00\x0f\xac\x02",
186 	  24, 0 },
187 	{ (u8 *) "\x30\x13\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00",
188 	  21, 0 },
189 	{ (u8 *) "\x30\x14\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00\x00",
190 	  22, 0 },
191 	{ (u8 *) "\x30\x16\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00\x00\x00\x00",
192 	  24, 0 },
193 	{ (u8 *) "\x30\x16\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00\x00\x00\x01",
194 	  24, -9 },
195 	{ (u8 *) "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00\x00\x00\x00\x00\x00\x00\x00",
196 	  28, -10 },
197 	{ (u8 *) "\x30\x1a\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00\x00\x00\x00\x00\x0f\xac\x06",
198 	  28, 0 },
199 	{ (u8 *) "\x30\x1c\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x04\x01\x00\x00\x0f\xac\x01\x00\x00\x00\x00\x00\x0f\xac\x06\x01\x02",
200 	  30, 0 },
201 	{ NULL, 0, 0 }
202 };
203 
rsn_ie_parse_tests(void)204 static int rsn_ie_parse_tests(void)
205 {
206 	int i, ret = 0;
207 
208 	wpa_printf(MSG_INFO, "rsn_ie_parse tests");
209 
210 	for (i = 0; rsn_parse_tests[i].data; i++) {
211 		const struct rsn_ie_parse_test_data *test;
212 		struct wpa_ie_data data;
213 
214 		test = &rsn_parse_tests[i];
215 		if (wpa_parse_wpa_ie_rsn(test->data, test->len, &data) !=
216 		    test->result) {
217 			wpa_printf(MSG_ERROR, "rsn_ie_parse test %d failed", i);
218 			ret = -1;
219 		}
220 	}
221 
222 	return ret;
223 }
224 
225 
gas_tests(void)226 static int gas_tests(void)
227 {
228 	struct wpabuf *buf;
229 
230 	wpa_printf(MSG_INFO, "gas tests");
231 	gas_anqp_set_len(NULL);
232 
233 	buf = wpabuf_alloc(1);
234 	if (buf == NULL)
235 		return -1;
236 	gas_anqp_set_len(buf);
237 	wpabuf_free(buf);
238 
239 	buf = wpabuf_alloc(20);
240 	if (buf == NULL)
241 		return -1;
242 	wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
243 	wpabuf_put_u8(buf, WLAN_PA_GAS_INITIAL_REQ);
244 	wpabuf_put_u8(buf, 0);
245 	wpabuf_put_be32(buf, 0);
246 	wpabuf_put_u8(buf, 0);
247 	gas_anqp_set_len(buf);
248 	wpabuf_free(buf);
249 
250 	return 0;
251 }
252 
253 
sae_tests(void)254 static int sae_tests(void)
255 {
256 #ifdef CONFIG_SAE
257 	struct sae_data sae;
258 	int ret = -1;
259 	/* IEEE Std 802.11-2020, Annex J.10 */
260 	const u8 addr1[ETH_ALEN] = { 0x4d, 0x3f, 0x2f, 0xff, 0xe3, 0x87 };
261 	const u8 addr2[ETH_ALEN] = { 0xa5, 0xd8, 0xaa, 0x95, 0x8e, 0x3c };
262 	const char *ssid = "byteme";
263 	const char *pw = "mekmitasdigoat";
264 	const char *pwid = "psk4internet";
265 	const u8 local_rand[] = {
266 		0x99, 0x24, 0x65, 0xfd, 0x3d, 0xaa, 0x3c, 0x60,
267 		0xaa, 0x65, 0x65, 0xb7, 0xf6, 0x2a, 0x2a, 0x7f,
268 		0x2e, 0x12, 0xdd, 0x12, 0xf1, 0x98, 0xfa, 0xf4,
269 		0xfb, 0xed, 0x89, 0xd7, 0xff, 0x1a, 0xce, 0x94
270 	};
271 	const u8 local_mask[] = {
272 		0x95, 0x07, 0xa9, 0x0f, 0x77, 0x7a, 0x04, 0x4d,
273 		0x6a, 0x08, 0x30, 0xb9, 0x1e, 0xa3, 0xd5, 0xdd,
274 		0x70, 0xbe, 0xce, 0x44, 0xe1, 0xac, 0xff, 0xb8,
275 		0x69, 0x83, 0xb5, 0xe1, 0xbf, 0x9f, 0xb3, 0x22
276 	};
277 	const u8 local_commit[] = {
278 		0x13, 0x00, 0x2e, 0x2c, 0x0f, 0x0d, 0xb5, 0x24,
279 		0x40, 0xad, 0x14, 0x6d, 0x96, 0x71, 0x14, 0xce,
280 		0x00, 0x5c, 0xe1, 0xea, 0xb0, 0xaa, 0x2c, 0x2e,
281 		0x5c, 0x28, 0x71, 0xb7, 0x74, 0xf6, 0xc2, 0x57,
282 		0x5c, 0x65, 0xd5, 0xad, 0x9e, 0x00, 0x82, 0x97,
283 		0x07, 0xaa, 0x36, 0xba, 0x8b, 0x85, 0x97, 0x38,
284 		0xfc, 0x96, 0x1d, 0x08, 0x24, 0x35, 0x05, 0xf4,
285 		0x7c, 0x03, 0x53, 0x76, 0xd7, 0xac, 0x4b, 0xc8,
286 		0xd7, 0xb9, 0x50, 0x83, 0xbf, 0x43, 0x82, 0x7d,
287 		0x0f, 0xc3, 0x1e, 0xd7, 0x78, 0xdd, 0x36, 0x71,
288 		0xfd, 0x21, 0xa4, 0x6d, 0x10, 0x91, 0xd6, 0x4b,
289 		0x6f, 0x9a, 0x1e, 0x12, 0x72, 0x62, 0x13, 0x25,
290 		0xdb, 0xe1
291 	};
292 	const u8 peer_commit[] = {
293 		0x13, 0x00, 0x59, 0x1b, 0x96, 0xf3, 0x39, 0x7f,
294 		0xb9, 0x45, 0x10, 0x08, 0x48, 0xe7, 0xb5, 0x50,
295 		0x54, 0x3b, 0x67, 0x20, 0xd8, 0x83, 0x37, 0xee,
296 		0x93, 0xfc, 0x49, 0xfd, 0x6d, 0xf7, 0xe0, 0x8b,
297 		0x52, 0x23, 0xe7, 0x1b, 0x9b, 0xb0, 0x48, 0xd3,
298 		0x87, 0x3f, 0x20, 0x55, 0x69, 0x53, 0xa9, 0x6c,
299 		0x91, 0x53, 0x6f, 0xd8, 0xee, 0x6c, 0xa9, 0xb4,
300 		0xa6, 0x8a, 0x14, 0x8b, 0x05, 0x6a, 0x90, 0x9b,
301 		0xe0, 0x3e, 0x83, 0xae, 0x20, 0x8f, 0x60, 0xf8,
302 		0xef, 0x55, 0x37, 0x85, 0x80, 0x74, 0xdb, 0x06,
303 		0x68, 0x70, 0x32, 0x39, 0x98, 0x62, 0x99, 0x9b,
304 		0x51, 0x1e, 0x0a, 0x15, 0x52, 0xa5, 0xfe, 0xa3,
305 		0x17, 0xc2
306 	};
307 	const u8 kck[] = {
308 		0x1e, 0x73, 0x3f, 0x6d, 0x9b, 0xd5, 0x32, 0x56,
309 		0x28, 0x73, 0x04, 0x33, 0x88, 0x31, 0xb0, 0x9a,
310 		0x39, 0x40, 0x6d, 0x12, 0x10, 0x17, 0x07, 0x3a,
311 		0x5c, 0x30, 0xdb, 0x36, 0xf3, 0x6c, 0xb8, 0x1a
312 	};
313 	const u8 pmk[] = {
314 		0x4e, 0x4d, 0xfa, 0xb1, 0xa2, 0xdd, 0x8a, 0xc1,
315 		0xa9, 0x17, 0x90, 0xf9, 0x53, 0xfa, 0xaa, 0x45,
316 		0x2a, 0xe5, 0xc6, 0x87, 0x3a, 0xb7, 0x5b, 0x63,
317 		0x60, 0x5b, 0xa6, 0x63, 0xf8, 0xa7, 0xfe, 0x59
318 	};
319 	const u8 pmkid[] = {
320 		0x87, 0x47, 0xa6, 0x00, 0xee, 0xa3, 0xf9, 0xf2,
321 		0x24, 0x75, 0xdf, 0x58, 0xca, 0x1e, 0x54, 0x98
322 	};
323 	struct wpabuf *buf = NULL;
324 	struct crypto_bignum *mask = NULL;
325 	const u8 pwe_19_x[32] = {
326 		0xc9, 0x30, 0x49, 0xb9, 0xe6, 0x40, 0x00, 0xf8,
327 		0x48, 0x20, 0x16, 0x49, 0xe9, 0x99, 0xf2, 0xb5,
328 		0xc2, 0x2d, 0xea, 0x69, 0xb5, 0x63, 0x2c, 0x9d,
329 		0xf4, 0xd6, 0x33, 0xb8, 0xaa, 0x1f, 0x6c, 0x1e
330 	};
331 	const u8 pwe_19_y[32] = {
332 		0x73, 0x63, 0x4e, 0x94, 0xb5, 0x3d, 0x82, 0xe7,
333 		0x38, 0x3a, 0x8d, 0x25, 0x81, 0x99, 0xd9, 0xdc,
334 		0x1a, 0x5e, 0xe8, 0x26, 0x9d, 0x06, 0x03, 0x82,
335 		0xcc, 0xbf, 0x33, 0xe6, 0x14, 0xff, 0x59, 0xa0
336 	};
337 	const u8 pwe_15[384] = {
338 		0x69, 0x68, 0x73, 0x65, 0x8f, 0x65, 0x31, 0x42,
339 		0x9f, 0x97, 0x39, 0x6f, 0xb8, 0x5f, 0x89, 0xe1,
340 		0xfc, 0xd2, 0xf6, 0x92, 0x19, 0xa9, 0x0e, 0x82,
341 		0x2f, 0xf7, 0xf4, 0xbc, 0x0b, 0xd8, 0xa7, 0x9f,
342 		0xf0, 0x80, 0x35, 0x31, 0x6f, 0xca, 0xe1, 0xa5,
343 		0x39, 0x77, 0xdc, 0x11, 0x2b, 0x0b, 0xfe, 0x2e,
344 		0x6f, 0x65, 0x6d, 0xc7, 0xd4, 0xa4, 0x5b, 0x08,
345 		0x1f, 0xd9, 0xbb, 0xe2, 0x22, 0x85, 0x31, 0x81,
346 		0x79, 0x70, 0xbe, 0xa1, 0x66, 0x58, 0x4a, 0x09,
347 		0x3c, 0x57, 0x34, 0x3c, 0x9d, 0x57, 0x8f, 0x42,
348 		0x58, 0xd0, 0x39, 0x81, 0xdb, 0x8f, 0x79, 0xa2,
349 		0x1b, 0x01, 0xcd, 0x27, 0xc9, 0xae, 0xcf, 0xcb,
350 		0x9c, 0xdb, 0x1f, 0x84, 0xb8, 0x88, 0x4e, 0x8f,
351 		0x50, 0x66, 0xb4, 0x29, 0x83, 0x1e, 0xb9, 0x89,
352 		0x0c, 0xa5, 0x47, 0x21, 0xba, 0x10, 0xd5, 0xaa,
353 		0x1a, 0x80, 0xce, 0xf1, 0x4c, 0xad, 0x16, 0xda,
354 		0x57, 0xb2, 0x41, 0x8a, 0xbe, 0x4b, 0x8c, 0xb0,
355 		0xb2, 0xeb, 0xf7, 0xa8, 0x0e, 0x3e, 0xcf, 0x22,
356 		0x8f, 0xd8, 0xb6, 0xdb, 0x79, 0x9c, 0x9b, 0x80,
357 		0xaf, 0xd7, 0x14, 0xad, 0x51, 0x82, 0xf4, 0x64,
358 		0xb6, 0x3f, 0x4c, 0x6c, 0xe5, 0x3f, 0xaa, 0x6f,
359 		0xbf, 0x3d, 0xc2, 0x3f, 0x77, 0xfd, 0xcb, 0xe1,
360 		0x9c, 0xe3, 0x1e, 0x8a, 0x0e, 0x97, 0xe2, 0x2b,
361 		0xe2, 0xdd, 0x37, 0x39, 0x88, 0xc2, 0x8e, 0xbe,
362 		0xfa, 0xac, 0x3d, 0x5b, 0x62, 0x2e, 0x1e, 0x74,
363 		0xa0, 0x9a, 0xf8, 0xed, 0xfa, 0xe1, 0xce, 0x9c,
364 		0xab, 0xbb, 0xdc, 0x36, 0xb1, 0x28, 0x46, 0x3c,
365 		0x7e, 0xa8, 0xbd, 0xb9, 0x36, 0x4c, 0x26, 0x75,
366 		0xe0, 0x17, 0x73, 0x1f, 0xe0, 0xfe, 0xf6, 0x49,
367 		0xfa, 0xa0, 0x45, 0xf4, 0x44, 0x05, 0x20, 0x27,
368 		0x25, 0xc2, 0x99, 0xde, 0x27, 0x8b, 0x70, 0xdc,
369 		0x54, 0x60, 0x90, 0x02, 0x1e, 0x29, 0x97, 0x9a,
370 		0xc4, 0xe7, 0xb6, 0xf5, 0x8b, 0xae, 0x7c, 0x34,
371 		0xaa, 0xef, 0x9b, 0xc6, 0x30, 0xf2, 0x80, 0x8d,
372 		0x80, 0x78, 0xc2, 0x55, 0x63, 0xa0, 0xa1, 0x38,
373 		0x70, 0xfb, 0xf4, 0x74, 0x8d, 0xcd, 0x87, 0x90,
374 		0xb4, 0x54, 0xc3, 0x75, 0xdf, 0x10, 0xc5, 0xb6,
375 		0xb2, 0x08, 0x59, 0x61, 0xe6, 0x68, 0xa5, 0x82,
376 		0xf8, 0x8f, 0x47, 0x30, 0x43, 0xb4, 0xdc, 0x31,
377 		0xfc, 0xbc, 0x69, 0xe7, 0xb4, 0x94, 0xb0, 0x6a,
378 		0x60, 0x59, 0x80, 0x2e, 0xd3, 0xa4, 0xe8, 0x97,
379 		0xa2, 0xa3, 0xc9, 0x08, 0x4b, 0x27, 0x6c, 0xc1,
380 		0x37, 0xe8, 0xfc, 0x5c, 0xe2, 0x54, 0x30, 0x3e,
381 		0xf8, 0xfe, 0xa2, 0xfc, 0xbb, 0xbd, 0x88, 0x6c,
382 		0x92, 0xa3, 0x2a, 0x40, 0x7a, 0x2c, 0x22, 0x38,
383 		0x8c, 0x86, 0x86, 0xfe, 0xb9, 0xd4, 0x6b, 0xd6,
384 		0x47, 0x88, 0xa7, 0xf6, 0x8e, 0x0f, 0x14, 0xad,
385 		0x1e, 0xac, 0xcf, 0x33, 0x01, 0x99, 0xc1, 0x62
386 	};
387 	int pt_groups[] = { 19, 20, 21, 25, 26, 28, 29, 30, 15, 0 };
388 	struct sae_pt *pt_info, *pt;
389 	const u8 addr1b[ETH_ALEN] = { 0x00, 0x09, 0x5b, 0x66, 0xec, 0x1e };
390 	const u8 addr2b[ETH_ALEN] = { 0x00, 0x0b, 0x6b, 0xd9, 0x02, 0x46 };
391 
392 	os_memset(&sae, 0, sizeof(sae));
393 	buf = wpabuf_alloc(1000);
394 	if (!buf ||
395 	    sae_set_group(&sae, 19) < 0 ||
396 	    sae_prepare_commit(addr1, addr2, (const u8 *) pw, os_strlen(pw),
397 			       &sae) < 0)
398 		goto fail;
399 
400 	/* Override local values based on SAE test vector */
401 	crypto_bignum_deinit(sae.tmp->sae_rand, 1);
402 	sae.tmp->sae_rand = crypto_bignum_init_set(local_rand,
403 						   sizeof(local_rand));
404 	mask = crypto_bignum_init_set(local_mask, sizeof(local_mask));
405 	if (!sae.tmp->sae_rand || !mask)
406 		goto fail;
407 
408 	if (crypto_bignum_add(sae.tmp->sae_rand, mask,
409 			      sae.tmp->own_commit_scalar) < 0 ||
410 	    crypto_bignum_mod(sae.tmp->own_commit_scalar, sae.tmp->order,
411 			      sae.tmp->own_commit_scalar) < 0 ||
412 	    crypto_ec_point_mul(sae.tmp->ec, sae.tmp->pwe_ecc, mask,
413 				sae.tmp->own_commit_element_ecc) < 0 ||
414 	    crypto_ec_point_invert(sae.tmp->ec,
415 				   sae.tmp->own_commit_element_ecc) < 0)
416 		goto fail;
417 
418 	/* Check that output matches the test vector */
419 	if (sae_write_commit(&sae, buf, NULL, NULL) < 0)
420 		goto fail;
421 	wpa_hexdump_buf(MSG_DEBUG, "SAE: Commit message", buf);
422 
423 	if (wpabuf_len(buf) != sizeof(local_commit) ||
424 	    os_memcmp(wpabuf_head(buf), local_commit,
425 		      sizeof(local_commit)) != 0) {
426 		wpa_printf(MSG_ERROR, "SAE: Mismatch in local commit");
427 		goto fail;
428 	}
429 
430 	if (sae_parse_commit(&sae, peer_commit, sizeof(peer_commit), NULL, NULL,
431 			     NULL, 0, NULL) != 0 ||
432 	    sae_process_commit(&sae) < 0)
433 		goto fail;
434 
435 	if (os_memcmp(kck, sae.tmp->kck, SAE_KCK_LEN) != 0) {
436 		wpa_printf(MSG_ERROR, "SAE: Mismatch in KCK");
437 		goto fail;
438 	}
439 
440 	if (os_memcmp(pmk, sae.pmk, SAE_PMK_LEN) != 0) {
441 		wpa_printf(MSG_ERROR, "SAE: Mismatch in PMK");
442 		goto fail;
443 	}
444 
445 	if (os_memcmp(pmkid, sae.pmkid, SAE_PMKID_LEN) != 0) {
446 		wpa_printf(MSG_ERROR, "SAE: Mismatch in PMKID");
447 		goto fail;
448 	}
449 
450 	pt_info = sae_derive_pt(pt_groups,
451 				(const u8 *) ssid, os_strlen(ssid),
452 				(const u8 *) pw, os_strlen(pw), pwid);
453 	if (!pt_info)
454 		goto fail;
455 
456 	for (pt = pt_info; pt; pt = pt->next) {
457 		if (pt->group == 19) {
458 			struct crypto_ec_point *pwe;
459 			u8 bin[SAE_MAX_ECC_PRIME_LEN * 2];
460 			size_t prime_len = sizeof(pwe_19_x);
461 
462 			pwe = sae_derive_pwe_from_pt_ecc(pt, addr1b, addr2b);
463 			if (!pwe) {
464 				sae_deinit_pt(pt);
465 				goto fail;
466 			}
467 			if (crypto_ec_point_to_bin(pt->ec, pwe, bin,
468 						   bin + prime_len) < 0 ||
469 			    os_memcmp(pwe_19_x, bin, prime_len) != 0 ||
470 			    os_memcmp(pwe_19_y, bin + prime_len,
471 				      prime_len) != 0) {
472 				wpa_printf(MSG_ERROR,
473 					   "SAE: PT/PWE test vector mismatch");
474 				crypto_ec_point_deinit(pwe, 1);
475 				sae_deinit_pt(pt);
476 				goto fail;
477 			}
478 			crypto_ec_point_deinit(pwe, 1);
479 		}
480 
481 		if (pt->group == 15) {
482 			struct crypto_bignum *pwe;
483 			u8 bin[SAE_MAX_PRIME_LEN];
484 			size_t prime_len = sizeof(pwe_15);
485 
486 			pwe = sae_derive_pwe_from_pt_ffc(pt, addr1b, addr2b);
487 			if (!pwe) {
488 				sae_deinit_pt(pt);
489 				goto fail;
490 			}
491 			if (crypto_bignum_to_bin(pwe, bin, sizeof(bin),
492 						 prime_len) < 0 ||
493 			    os_memcmp(pwe_15, bin, prime_len) != 0) {
494 				wpa_printf(MSG_ERROR,
495 					   "SAE: PT/PWE test vector mismatch");
496 				crypto_bignum_deinit(pwe, 1);
497 				sae_deinit_pt(pt);
498 				goto fail;
499 			}
500 			crypto_bignum_deinit(pwe, 1);
501 		}
502 	}
503 
504 	sae_deinit_pt(pt_info);
505 
506 	ret = 0;
507 fail:
508 	sae_clear_data(&sae);
509 	wpabuf_free(buf);
510 	crypto_bignum_deinit(mask, 1);
511 	return ret;
512 #else /* CONFIG_SAE */
513 	return 0;
514 #endif /* CONFIG_SAE */
515 }
516 
517 
sae_pk_tests(void)518 static int sae_pk_tests(void)
519 {
520 #ifdef CONFIG_SAE_PK
521 	const char *invalid[] = { "a2bc-de3f-ghim-", "a2bcde3fghim", "", NULL };
522 	struct {
523 		const char *pw;
524 		const u8 *val;
525 	} valid[] = {
526 		{ "a2bc-de3f-ghim", (u8 *) "\x06\x82\x21\x93\x65\x31\xd0\xc0" },
527 		{ "aaaa-aaaa-aaaj", (u8 *) "\x00\x00\x00\x00\x00\x00\x00\x90" },
528 		{ "7777-7777-777f", (u8 *) "\xff\xff\xff\xff\xff\xff\xfe\x50" },
529 		{ NULL, NULL }
530 	};
531 	int i;
532 	bool failed;
533 
534 	for (i = 0; invalid[i]; i++) {
535 		if (sae_pk_valid_password(invalid[i])) {
536 			wpa_printf(MSG_ERROR,
537 				   "SAE-PK: Invalid password '%s' not recognized",
538 				   invalid[i]);
539 			return -1;
540 		}
541 	}
542 
543 	failed = false;
544 	for (i = 0; valid[i].pw; i++) {
545 		u8 *res;
546 		size_t res_len;
547 		char *b32;
548 		const char *pw = valid[i].pw;
549 		const u8 *val = valid[i].val;
550 		size_t pw_len = os_strlen(pw);
551 		size_t bits = (pw_len - pw_len / 5) * 5;
552 		size_t bytes = (bits + 7) / 8;
553 
554 		if (!sae_pk_valid_password(pw)) {
555 			wpa_printf(MSG_ERROR,
556 				   "SAE-PK: Valid password '%s' not recognized",
557 				   pw);
558 			failed = true;
559 			continue;
560 		}
561 
562 		res = sae_pk_base32_decode(pw, pw_len, &res_len);
563 		if (!res) {
564 			wpa_printf(MSG_ERROR,
565 				   "SAE-PK: Failed to decode password '%s'",
566 				   valid[i].pw);
567 			failed = true;
568 			continue;
569 		}
570 		if (res_len != bytes || os_memcmp(val, res, res_len) != 0) {
571 			wpa_printf(MSG_ERROR,
572 				   "SAE-PK: Mismatch for decoded password '%s'",
573 				   valid[i].pw);
574 			wpa_hexdump(MSG_INFO, "SAE-PK: Decoded value",
575 				    res, res_len);
576 			wpa_hexdump(MSG_INFO, "SAE-PK: Expected value",
577 				    val, bytes);
578 			failed = true;
579 		}
580 		os_free(res);
581 
582 		b32 = sae_pk_base32_encode(val, bits - 5);
583 		if (!b32) {
584 			wpa_printf(MSG_ERROR,
585 				   "SAE-PK: Failed to encode password '%s'",
586 				   pw);
587 			failed = true;
588 			continue;
589 		}
590 		if (os_strcmp(b32, pw) != 0) {
591 			wpa_printf(MSG_ERROR,
592 				   "SAE-PK: Mismatch for password '%s'", pw);
593 			wpa_printf(MSG_INFO, "SAE-PK: Encoded value: '%s'",
594 				   b32);
595 			failed = true;
596 		}
597 		os_free(b32);
598 	}
599 
600 	return failed ? -1 : 0;
601 #else /* CONFIG_SAE_PK */
602 	return 0;
603 #endif /* CONFIG_SAE_PK */
604 }
605 
606 
607 #ifdef CONFIG_PASN
608 
pasn_test_pasn_auth(void)609 static int pasn_test_pasn_auth(void)
610 {
611 	/* Test vector taken from IEEE P802.11az/D2.6, J.12 */
612 	const u8 pmk[] = {
613 		0xde, 0xf4, 0x3e, 0x55, 0x67, 0xe0, 0x1c, 0xa6,
614 		0x64, 0x92, 0x65, 0xf1, 0x9a, 0x29, 0x0e, 0xef,
615 		0xf8, 0xbd, 0x88, 0x8f, 0x6c, 0x1d, 0x9c, 0xc9,
616 		0xd1, 0x0f, 0x04, 0xbd, 0x37, 0x8f, 0x3c, 0xad
617 	};
618 
619 	const u8 spa_addr[] = {
620 		0x00, 0x90, 0x4c, 0x01, 0xc1, 0x07
621 	};
622 	const u8 bssid[] = {
623 		0xc0, 0xff, 0xd4, 0xa8, 0xdb, 0xc1
624 	};
625 	const u8 dhss[] = {
626 		0xf8, 0x7b, 0x20, 0x8e, 0x7e, 0xd2, 0xb7, 0x37,
627 		0xaf, 0xdb, 0xc2, 0xe1, 0x3e, 0xae, 0x78, 0xda,
628 		0x30, 0x01, 0x23, 0xd4, 0xd8, 0x4b, 0xa8, 0xb0,
629 		0xea, 0xfe, 0x90, 0xc4, 0x8c, 0xdf, 0x1f, 0x93
630 	};
631 	const u8 kck[] = {
632 		0x7b, 0xb8, 0x21, 0xac, 0x0a, 0xa5, 0x90, 0x9d,
633 		0xd6, 0x54, 0xa5, 0x60, 0x65, 0xad, 0x7c, 0x77,
634 		0xeb, 0x88, 0x9c, 0xbe, 0x29, 0x05, 0xbb, 0xf0,
635 		0x5a, 0xbb, 0x1e, 0xea, 0xc8, 0x8b, 0xa3, 0x06
636 	};
637 	const u8 tk[] = {
638 		0x67, 0x3e, 0xab, 0x46, 0xb8, 0x32, 0xd5, 0xa8,
639 		0x0c, 0xbc, 0x02, 0x43, 0x01, 0x6e, 0x20, 0x7e
640 	};
641 	const u8 kdk[] = {
642 		0x2d, 0x0f, 0x0e, 0x82, 0xc7, 0x0d, 0xd2, 0x6b,
643 		0x79, 0x06, 0x1a, 0x46, 0x81, 0xe8, 0xdb, 0xb2,
644 		0xea, 0x83, 0xbe, 0xa3, 0x99, 0x84, 0x4b, 0xd5,
645 		0x89, 0x4e, 0xb3, 0x20, 0xf6, 0x9d, 0x7d, 0xd6
646 	};
647 	struct wpa_ptk ptk;
648 	int ret;
649 
650 	ret = pasn_pmk_to_ptk(pmk, sizeof(pmk),
651 			      spa_addr, bssid,
652 			      dhss, sizeof(dhss),
653 			      &ptk, WPA_KEY_MGMT_PASN, WPA_CIPHER_CCMP,
654 			      WPA_KDK_MAX_LEN);
655 
656 	if (ret)
657 		return ret;
658 
659 	if (ptk.kck_len != sizeof(kck) ||
660 	    os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) {
661 		wpa_printf(MSG_ERROR, "PASN: Mismatched KCK");
662 		return -1;
663 	}
664 
665 	if (ptk.tk_len != sizeof(tk) ||
666 	    os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) {
667 		wpa_printf(MSG_ERROR, "PASN: Mismatched TK");
668 		return -1;
669 	}
670 
671 	if (ptk.kdk_len != sizeof(kdk) ||
672 	    os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) {
673 		wpa_printf(MSG_ERROR, "PASN: Mismatched KDK");
674 		return -1;
675 	}
676 
677 	return 0;
678 }
679 
680 
pasn_test_no_pasn_auth(void)681 static int pasn_test_no_pasn_auth(void)
682 {
683 	/* Test vector taken from IEEE P802.11az/D2.6, J.13 */
684 	const u8 pmk[] = {
685 		0xde, 0xf4, 0x3e, 0x55, 0x67, 0xe0, 0x1c, 0xa6,
686 		0x64, 0x92, 0x65, 0xf1, 0x9a, 0x29, 0x0e, 0xef,
687 		0xf8, 0xbd, 0x88, 0x8f, 0x6c, 0x1d, 0x9c, 0xc9,
688 		0xd1, 0x0f, 0x04, 0xbd, 0x37, 0x8f, 0x3c, 0xad
689 	};
690 	const u8 aa[] = {
691 		0xc0, 0xff, 0xd4, 0xa8, 0xdb, 0xc1
692 	};
693 	const u8 spa[] = {
694 		0x00, 0x90, 0x4c, 0x01, 0xc1, 0x07
695 	};
696 	const u8 anonce[] = {
697 		0xbe, 0x7a, 0x1c, 0xa2, 0x84, 0x34, 0x7b, 0x5b,
698 		0xd6, 0x7d, 0xbd, 0x2d, 0xfd, 0xb4, 0xd9, 0x9f,
699 		0x1a, 0xfa, 0xe0, 0xb8, 0x8b, 0xa1, 0x8e, 0x00,
700 		0x87, 0x18, 0x41, 0x7e, 0x4b, 0x27, 0xef, 0x5f
701 	};
702 	const u8 snonce[] = {
703 		0x40, 0x4b, 0x01, 0x2f, 0xfb, 0x43, 0xed, 0x0f,
704 		0xb4, 0x3e, 0xa1, 0xf2, 0x87, 0xc9, 0x1f, 0x25,
705 		0x06, 0xd2, 0x1b, 0x4a, 0x92, 0xd7, 0x4b, 0x5e,
706 		0xa5, 0x0c, 0x94, 0x33, 0x50, 0xce, 0x86, 0x71
707 	};
708 	const u8 kck[] = {
709 		0xcd, 0x7b, 0x9e, 0x75, 0x55, 0x36, 0x2d, 0xf0,
710 		0xb6, 0x35, 0x68, 0x48, 0x4a, 0x81, 0x12, 0xf5
711 	};
712 	const u8 kek[] = {
713 		0x99, 0xca, 0xd3, 0x58, 0x8d, 0xa0, 0xf1, 0xe6,
714 		0x3f, 0xd1, 0x90, 0x19, 0x10, 0x39, 0xbb, 0x4b
715 	};
716 	const u8 tk[] = {
717 		0x9e, 0x2e, 0x93, 0x77, 0xe7, 0x53, 0x2e, 0x73,
718 		0x7a, 0x1b, 0xc2, 0x50, 0xfe, 0x19, 0x4a, 0x03
719 	};
720 	const u8 kdk[] = {
721 		0x6c, 0x7f, 0xb9, 0x7c, 0xeb, 0x55, 0xb0, 0x1a,
722 		0xcf, 0xf0, 0x0f, 0x07, 0x09, 0x42, 0xbd, 0xf5,
723 		0x29, 0x1f, 0xeb, 0x4b, 0xee, 0x38, 0xe0, 0x36,
724 		0x5b, 0x25, 0xa2, 0x50, 0xbb, 0x2a, 0xc9, 0xff
725 	};
726 	struct wpa_ptk ptk;
727 	int ret;
728 
729 	ret = wpa_pmk_to_ptk(pmk, sizeof(pmk),
730 			     "Pairwise key expansion",
731 			     spa, aa, snonce, anonce,
732 			     &ptk, WPA_KEY_MGMT_SAE, WPA_CIPHER_CCMP,
733 			     NULL, 0, WPA_KDK_MAX_LEN);
734 
735 	if (ret)
736 		return ret;
737 
738 	if (ptk.kck_len != sizeof(kck) ||
739 	    os_memcmp(kck, ptk.kck, sizeof(kck)) != 0) {
740 		wpa_printf(MSG_ERROR, "KDK no PASN auth: Mismatched KCK");
741 		return -1;
742 	}
743 
744 	if (ptk.kek_len != sizeof(kek) ||
745 	    os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) {
746 		wpa_printf(MSG_ERROR, "KDK no PASN auth: Mismatched KEK");
747 		return -1;
748 	}
749 
750 	if (ptk.tk_len != sizeof(tk) ||
751 	    os_memcmp(tk, ptk.tk, sizeof(tk)) != 0) {
752 		wpa_printf(MSG_ERROR, "KDK no PASN auth: Mismatched TK");
753 		return -1;
754 	}
755 
756 	if (ptk.kdk_len != sizeof(kdk) ||
757 	    os_memcmp(kdk, ptk.kdk, sizeof(kdk)) != 0) {
758 		wpa_printf(MSG_ERROR, "KDK no PASN auth: Mismatched KDK");
759 		return -1;
760 	}
761 
762 	return 0;
763 }
764 
765 #endif /* CONFIG_PASN */
766 
767 
pasn_tests(void)768 static int pasn_tests(void)
769 {
770 #ifdef CONFIG_PASN
771 	if (pasn_test_pasn_auth() ||
772 	    pasn_test_no_pasn_auth())
773 		return -1;
774 #endif /* CONFIG_PASN */
775 	return 0;
776 }
777 
778 
common_module_tests(void)779 int common_module_tests(void)
780 {
781 	int ret = 0;
782 
783 	wpa_printf(MSG_INFO, "common module tests");
784 
785 	if (ieee802_11_parse_tests() < 0 ||
786 	    gas_tests() < 0 ||
787 	    sae_tests() < 0 ||
788 	    sae_pk_tests() < 0 ||
789 	    pasn_tests() < 0 ||
790 	    rsn_ie_parse_tests() < 0)
791 		ret = -1;
792 
793 	return ret;
794 }
795