It was possible for the GTK-found-in-memory case to be triggered due to
a retransmission of EAPOL-Key msg 3/4 especially when running test cases
under heavy load (i.e., timeout on hostapd due to not receiving the 4/4
response quickly enough). Make this false failure report less likely by
waiting a bit longer after the connection has been completed before
fetching the process memory.
Signed-off-by: Jouni Malinen <j@w1.fi>
id = eap_connect(dev[0], apdev[0], "TTLS", "pap-secret",
anonymous_identity="ttls", password=password,
ca_cert="auth_serv/ca.pem", phase2="auth=PAP")
id = eap_connect(dev[0], apdev[0], "TTLS", "pap-secret",
anonymous_identity="ttls", password=password,
ca_cert="auth_serv/ca.pem", phase2="auth=PAP")
buf = read_process_memory(pid, password)
dev[0].request("DISCONNECT")
buf = read_process_memory(pid, password)
dev[0].request("DISCONNECT")
dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2",
scan_freq="2412")
dev[0].connect(ssid, psk=passphrase, key_mgmt="FT-PSK", proto="WPA2",
scan_freq="2412")
buf = read_process_memory(pid, pmk)
buf = read_process_memory(pid, pmk)
get_key_locations(buf, pmk, "PMK")
dev[0].connect_network(id, timeout=20)
get_key_locations(buf, pmk, "PMK")
dev[0].connect_network(id, timeout=20)
buf = read_process_memory(pid, pmk)
buf = read_process_memory(pid, pmk)
ca_cert="auth_serv/ca.pem", phase2="auth=PAP",
erp="1", scan_freq="2412")
ca_cert="auth_serv/ca.pem", phase2="auth=PAP",
erp="1", scan_freq="2412")
buf = read_process_memory(pid, password)
dev[0].request("DISCONNECT")
buf = read_process_memory(pid, password)
dev[0].request("DISCONNECT")
id = dev[0].connect("test-sae", psk=password, key_mgmt="SAE",
scan_freq="2412")
id = dev[0].connect("test-sae", psk=password, key_mgmt="SAE",
scan_freq="2412")
buf = read_process_memory(pid, password)
dev[0].request("DISCONNECT")
buf = read_process_memory(pid, password)
dev[0].request("DISCONNECT")