def __init__(self, apdev, dev, params, sta_params=None): self.init_params() self.dev = dev self.bssid = apdev['bssid'] freq = params.pop("freq") if sta_params is None: sta_params = dict() if "ocv" not in sta_params: sta_params["ocv"] = "1" if "ieee80211w" not in sta_params: sta_params["ieee80211w"] = "1" params.update( hostapd.wpa2_params(ssid=self.ssid, passphrase=self.passphrase)) params['wpa_pairwise_update_count'] = "10" try: self.hapd = hostapd.add_ap(apdev, params) except Exception as e: if "Failed to set hostapd parameter ocv" in str(e): raise HwsimSkip("OCV not supported") raise self.hapd.request("SET ext_eapol_frame_io 1") self.dev.request("SET ext_eapol_frame_io 1") pmk = binascii.unhexlify( "c2c6c255af836bed1b3f2f1ded98e052f5ad618bb554e2836757b55854a0eab7") self.gtkie = binascii.unhexlify( "dd16000fac010100dc11188831bf4aa4a8678d2b41498618") if sta_params["ocv"] != "0": self.rsne = binascii.unhexlify( "30140100000fac040100000fac040100000fac028c40") else: self.rsne = binascii.unhexlify( "30140100000fac040100000fac040100000fac028c00") self.dev.connect(self.ssid, raw_psk=self.psk, scan_freq=freq, wait_connect=False, **sta_params) if "country_code" in params: self.dev.wait_regdom(country_ie=True) self.addr = dev.p2p_interface_addr() # Forward msg 1/4 from AP to STA self.msg = recv_eapol(self.hapd) self.anonce = self.msg['rsn_key_nonce'] send_eapol(self.dev, self.bssid, build_eapol(self.msg)) # Capture msg 2/4 from the STA so we can derive the session keys self.msg = recv_eapol(dev) self.snonce = self.msg['rsn_key_nonce'] (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid, self.snonce, self.anonce) self.counter = struct.unpack('>Q', self.msg['rsn_replay_counter'])[0] + 1
def __init__(self, apdev, dev, params, sta_params=None): self.init_params() self.dev = dev self.bssid = apdev['bssid'] freq = params.pop("freq") if sta_params is None: sta_params = dict() if "ocv" not in sta_params: sta_params["ocv"] = "1" if "ieee80211w" not in sta_params: sta_params["ieee80211w"] = "1" params.update(hostapd.wpa2_params(ssid=self.ssid, passphrase=self.passphrase)) params['wpa_pairwise_update_count'] = "10" try: self.hapd = hostapd.add_ap(apdev, params) except Exception as e: if "Failed to set hostapd parameter ocv" in str(e): raise HwsimSkip("OCV not supported") raise self.hapd.request("SET ext_eapol_frame_io 1") self.dev.request("SET ext_eapol_frame_io 1") pmk = binascii.unhexlify("c2c6c255af836bed1b3f2f1ded98e052f5ad618bb554e2836757b55854a0eab7") self.gtkie = binascii.unhexlify("dd16000fac010100dc11188831bf4aa4a8678d2b41498618") if sta_params["ocv"] != "0": self.rsne = binascii.unhexlify("30140100000fac040100000fac040100000fac028c40") else: self.rsne = binascii.unhexlify("30140100000fac040100000fac040100000fac028c00") self.dev.connect(self.ssid, raw_psk=self.psk, scan_freq=freq, wait_connect=False, **sta_params) if "country_code" in params: self.dev.wait_regdom(country_ie=True) self.addr = dev.p2p_interface_addr() # Forward msg 1/4 from AP to STA self.msg = recv_eapol(self.hapd) self.anonce = self.msg['rsn_key_nonce'] send_eapol(self.dev, self.bssid, build_eapol(self.msg)) # Capture msg 2/4 from the STA so we can derive the session keys self.msg = recv_eapol(dev) self.snonce = self.msg['rsn_key_nonce'] (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid, self.snonce, self.anonce) self.counter = struct.unpack('>Q', self.msg['rsn_replay_counter'])[0] + 1
def __init__(self, apdev, dev, params): self.init_params() # By default, OCV is enabled for both the client and AP. The following # parameters can be used to disable OCV for the client or AP. ap_ocv = params.pop("ap_ocv", "1") sta_ocv = params.pop("sta_ocv", "1") freq = params.pop("freq") params.update( hostapd.wpa2_params(ssid=self.ssid, passphrase=self.passphrase)) params["wpa_pairwise_update_count"] = "10" params["ocv"] = ap_ocv try: self.hapd = hostapd.add_ap(apdev, params) except Exception as e: if "Failed to set hostapd parameter ocv" in str(e): raise HwsimSkip("OCV not supported") raise self.hapd.request("SET ext_eapol_frame_io 1") dev.request("SET ext_eapol_frame_io 1") self.bssid = apdev['bssid'] pmk = binascii.unhexlify( "c2c6c255af836bed1b3f2f1ded98e052f5ad618bb554e2836757b55854a0eab7") if sta_ocv != "0": self.rsne = binascii.unhexlify( "301a0100000fac040100000fac040100000fac0280400000000fac06") else: self.rsne = binascii.unhexlify( "301a0100000fac040100000fac040100000fac0280000000000fac06") self.snonce = binascii.unhexlify( '1111111111111111111111111111111111111111111111111111111111111111') dev.connect(self.ssid, raw_psk=self.psk, scan_freq=freq, ocv=sta_ocv, ieee80211w="1", wait_connect=False) if "country_code" in params: dev.wait_regdom(country_ie=True) self.addr = dev.p2p_interface_addr() # Wait for EAPOL-Key msg 1/4 from hostapd to determine when associated self.msg = recv_eapol(self.hapd) self.anonce = self.msg['rsn_key_nonce'] (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid, self.snonce, self.anonce)
def __init__(self, apdev, dev, params): self.init_params() # By default, OCV is enabled for both the client and AP. The following # parameters can be used to disable OCV for the client or AP. ap_ocv = params.pop("ap_ocv", "1") sta_ocv = params.pop("sta_ocv", "1") freq = params.pop("freq") params.update(hostapd.wpa2_params(ssid=self.ssid, passphrase=self.passphrase)) params["wpa_pairwise_update_count"] = "10" params["ocv"] = ap_ocv try: self.hapd = hostapd.add_ap(apdev, params) except Exception as e: if "Failed to set hostapd parameter ocv" in str(e): raise HwsimSkip("OCV not supported") raise self.hapd.request("SET ext_eapol_frame_io 1") dev.request("SET ext_eapol_frame_io 1") self.bssid = apdev['bssid'] pmk = binascii.unhexlify("c2c6c255af836bed1b3f2f1ded98e052f5ad618bb554e2836757b55854a0eab7") if sta_ocv != "0": self.rsne = binascii.unhexlify("301a0100000fac040100000fac040100000fac0280400000000fac06") else: self.rsne = binascii.unhexlify("301a0100000fac040100000fac040100000fac0280000000000fac06") self.snonce = binascii.unhexlify('1111111111111111111111111111111111111111111111111111111111111111') dev.connect(self.ssid, raw_psk=self.psk, scan_freq=freq, ocv=sta_ocv, ieee80211w="1", wait_connect=False) if "country_code" in params: dev.wait_regdom(country_ie=True) self.addr = dev.p2p_interface_addr() # Wait for EAPOL-Key msg 1/4 from hostapd to determine when associated self.msg = recv_eapol(self.hapd) self.anonce = self.msg['rsn_key_nonce'] (ptk, self.kck, self.kek) = pmk_to_ptk(pmk, self.addr, self.bssid, self.snonce, self.anonce)