Wi-Fi Protected Access 3 (WPA3)

Test Case Summaries

  • Test Cases: 22

 

Test Name

Synopsis

Basic-WPA3-STA-001

SAE Commit DoS attack against a WiFi station

Basic-WPA3-STA-002

SAE Commit DoS attack with all-zero SCALAR and ELEMENT

Basic-WPA3-STA-003

SAE Commit DoS attack with broadcast source MAC

Basic-WPA3-STA-004

SAE Commit DoS attack with broadcast destination MAC

Basic-WPA3-STA-005

SAE Commit DoS attack with auth algo=2

Basic-WPA3-STA-006

SAE Commit DoS attack with wrong GROUP_ID

Cert-WPA3-STA-001

Verify STAUT's SAE connectivity and PMK caching with Hunting-and-Pecking only

Cert-WPA3-STA-002

Verify STAUT's SAE connectivity and PMK caching with Hash-to-Element only

Cert-WPA3-STA-003

Verify STAUT's SAE connectivity and PMK caching with both Hunting-and-Pecking and Hash-to-Element

Cert-WPA3-STA-004

Verify STAUT connects to an AP requiring anti-clogging token

Cert-WPA3-STA-005

Verify STAUT properly handles a reflection attack

Cert-WPA3-STA-006

Verify STAUT is able to connect to an AP with WPA3-SAE and WPA2-Personal

Cert-WPA3-STA-007

Verify STAUT supports DH finite cyclic group 19

Cert-WPA3-STA-008

Verify STAUT supports DH finite cyclic group 20

Cert-WPA3-STA-009

Verify STAUT supports DH finite cyclic group 21

Cert-WPA3-STA-010

Verify STAUT rejects to Commit with all zero scalar value

Cert-WPA3-STA-011

Verify STAUT rejects to Commit with scalar set to 1

Cert-WPA3-STA-012

Verify STAUT rejects to Commit with scalar set to the order of the elliptic curve

Cert-WPA3-STA-013

Verify STAUT completes the connection process when the AP transmits an SAE Confirm message immediately after its SAE Commit message

Cert-WPA3-STA-014

Verify STAUT does not request unsuitable Diffie-Hellman groups in SAE process

Cert-WPA3-STA-015

Verify STAUT can complete the SAE Authentication when the AP rejects offered groups by STAUT

Cert-WPA3-STA-016

Verify STAUT aborts 4-way handshake when it detects RSNXE mismatch