Wi-Fi Protected Access 3 (WPA3)
Test Case Summaries
- Test Cases: 60
|
Test Name |
Synopsis |
|
Basic-WPA3-AP-001 |
SAE Commit message flooding attack |
|
Basic-WPA3-AP-004 |
Send SAE Commit message flooding with all-zero SCALAR and ELEMENT |
|
Basic-WPA3-AP-005 |
Send SAE Commit message flooding with broadcast source MAC |
|
Basic-WPA3-AP-006 |
Send SAE Commit message flooding with broadcast destination MAC |
|
Basic-WPA3-AP-007 |
Send SAE Commit message flooding with algo = 2 |
|
Basic-WPA3-AP-008 |
Send SAE Commit message flooding with wrong GROUP_ID |
|
Basic-WPA3-AP-009 |
Handshake message 2 flooding with WPA3 authentication |
|
Basic-WPA3-AP-010 |
Handshake message 4 flooding with WPA3 authentication |
|
Basic-WPA3-AP-011 |
Handshake message 2 with broadcast source MAC |
|
Basic-WPA3-AP-012 |
Handshake message 2 with broadcast destination MAC |
|
Basic-WPA3-AP-013 |
Handshake message 2 with wrong MIC |
|
Basic-WPA3-AP-014 |
Handshake message 2 with wrong nonce |
|
Basic-WPA3-AP-015 |
Handshake message 2 with all zero Snonce |
|
Basic-WPA3-AP-016 |
Handshake message 2 with long WPA key length |
|
Basic-WPA3-AP-017 |
Handshake message 2 with WPA key length 0 |
|
Basic-WPA3-AP-018 |
Handshake message 2 with inconsistent WPA key length |
|
Basic-WPA3-AP-019 |
Handshake message 4 with broadcast source MAC |
|
Basic-WPA3-AP-020 |
Handshake message 4 with broadcast destination MAC |
|
Basic-WPA3-AP-021 |
Handshake message 4 with bad nonce |
|
Basic-WPA3-AP-022 |
Send a valid commit and empty body to crash an AP |
|
Basic-WPA3-AP-023 |
Send an empty body to crash an AP |
|
Basic-WPA3-AP-024 |
Send a valid commit and confirm to crash an AP |
|
Basic-WPA3-AP-025 |
Send a valid commit and an invalid confirm to crash an AP |
|
Basic-WPA3-AP-026 |
Send a number of messages to crash an AP |
|
Basic-WPA3-AP-027 |
Verify WPA3 EAPOL handshake timeout when APUT does not receive EAPOL M2 |
|
Basic-WPA3-AP-028 |
Verify WPA3 EAPOL handshake timeout when APUT does not receive EAPOL M4 |
|
Basic-WPA3-AP-029 |
Verify WPA3 EAPOL handshake timeout when the station responds M4 directly to APUT's M1 |
|
Basic-WPA3-AP-030 |
Send M2 message to WPA3 APUT when the EAPOL handshake process completes |
|
Basic-WPA3-AP-031 |
WPA3 APUT receives deauthentication with reason codes 1 during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-032 |
WPA3 APUT receives deauthentication with reason codes 3 during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-033 |
WPA3 APUT receives deauthentication with reason codes 5 during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-034 |
WPA3 APUT receives deauthentication with reason codes 15 during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-035 |
WPA3 APUT receives deauthentication with reason codes 1 during the EAPOL handshake process 3-4 |
|
Basic-WPA3-AP-036 |
WPA3 APUT receives deauthentication with reason codes 4 during the EAPOL handshake process 3-4 |
|
Basic-WPA3-AP-037 |
WPA3 APUT receives deauthentication with reason codes 11 during the EAPOL handshake process 3-4 |
|
Basic-WPA3-AP-038 |
WPA3 APUT receives deauthentication with reason codes 14 during the EAPOL handshake process 3-4 |
|
Basic-WPA3-AP-039 |
WPA3 APUT receives disassociation with reason code 12 during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-040 |
WPA3 APUT receives disassociation with reason codes 22 during the EAPOL handshake process 3-4 |
|
Basic-WPA3-AP-041 |
WPA3 APUT receives reassociation during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-042 |
Verify WPA3 APUT receives EAPOL M2 when the WiFi state is connected |
|
Basic-WPA3-AP-043 |
WPA3 APUT receives EAPOL Message 1 during the EAPOL handshake process 1-2 |
|
Basic-WPA3-AP-044 |
WPA3 APUT receives EAPOL Message 1 during the EAPOL handshake process 3-4 |
|
Basic-WPA3-AP-045 |
Send plaintext ARP traffic to WPA3 APUT during handshake process 1-2 |
|
Basic-WPA3-AP-046 |
Send plaintext ARP traffic to WPA3 APUT during handshake process 3-4 |
|
Basic-WPA3-AP-047 |
Verify WPA3 APUT receives EAPOL M1 when the WiFi state is connected |
|
Basic-WPA3-AP-100 |
Kr00k vulnerability detection |
|
Cert-WPA3-AP-001 |
Verify commit dos attack triggers anti-clogging protection mechanism |
|
Cert-WPA3-AP-002 |
Verify transition mode allows WPA3 SAE and WPA2 PSK connections |
|
Cert-WPA3-AP-003 |
Verify WPA3 SAE connection with valid DH group 19 |
|
Cert-WPA3-AP-004 |
Verify WPA3 SAE connection with valid DH group 20 |
|
Cert-WPA3-AP-005 |
Verify WPA3 SAE connection with valid DH group 21 |
|
Cert-WPA3-AP-006 |
Verify AP correctly responses to Commit with scalar set to 0 |
|
Cert-WPA3-AP-007 |
Verify AP correctly responses to Commit with scalar set to 1 |
|
Cert-WPA3-AP-008 |
Verify AP correctly responses to Commit with scalar set to the order of the elliptic curve |
|
Cert-WPA3-AP-009 |
Verify AP set to transition mode correctly rejects an association request with PMF set to disabled |
|
Cert-WPA3-AP-010 |
Verify AP rejects DH group 18 in WPA3 SAE connection |
|
Cert-WPA3-AP-011 |
Verify AP rejects DH group 22 in WPA3 SAE connection |
|
Cert-WPA3-AP-012 |
Verify AP rejects DH group 25 in WPA3 SAE connection |
|
Cert-WPA3-AP-013 |
Verify RejectDHGroups |
|
Cert-WPA3-AP-014 |
Verify AP aborts 4-way handshake with RSNXE mismatch test |