aboutsummaryrefslogtreecommitdiffstats
path: root/wlantest
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2012-09-08 11:03:43 (GMT)
committerJouni Malinen <j@w1.fi>2012-09-08 13:44:37 (GMT)
commit3ae89686799c4c11d48e2e44f5cd1c82931faf7e (patch)
treee6f1f49ef558e6c5cd3451413a1ff0791f08ba8a /wlantest
parent729f02e1499cfe63386dcedb3ca264bbcc2250e7 (diff)
downloadhostap-3ae89686799c4c11d48e2e44f5cd1c82931faf7e.zip
hostap-3ae89686799c4c11d48e2e44f5cd1c82931faf7e.tar.gz
hostap-3ae89686799c4c11d48e2e44f5cd1c82931faf7e.tar.bz2
wlantest: Add program for generating IEEE 802.11 test vectors
This version can generate CCMP and TKIP test vectors that match with the IEEE Std 802.11-2012, Annex M.6.3 and M.6.4. Signed-hostap: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'wlantest')
-rw-r--r--wlantest/Makefile11
-rw-r--r--wlantest/test_vectors.c121
2 files changed, 131 insertions, 1 deletions
diff --git a/wlantest/Makefile b/wlantest/Makefile
index c165ed4..272a098 100644
--- a/wlantest/Makefile
+++ b/wlantest/Makefile
@@ -1,4 +1,4 @@
-ALL=wlantest wlantest_cli
+ALL=wlantest wlantest_cli test_vectors
all: $(ALL)
@@ -70,6 +70,12 @@ OBJS += wep.o
LIBS += -lpcap
+TOBJS += test_vectors.o
+TOBJS += crc32.o
+TOBJS += ccmp.o
+TOBJS += tkip.o
+TOBJS += wep.o
+
../src/utils/libutils.a:
$(MAKE) -C ../src/utils
@@ -104,6 +110,9 @@ wlantest: $(OBJS) $(LIBWLANTEST)
wlantest_cli: $(OBJS_cli) $(LIBWLANTEST)
$(LDO) $(LDFLAGS) -o wlantest_cli $(OBJS_cli) -L. -lwlantest
+test_vectors: $(TOBJS) $(LIBWLANTEST)
+ $(LDO) $(LDFLAGS) -o test_vectors $(TOBJS) -L. -lwlantest $(LIBS)
+
clean:
$(MAKE) -C ../src clean
rm -f core *~ *.o *.d libwlantest.a libwlantest.so $(ALL)
diff --git a/wlantest/test_vectors.c b/wlantest/test_vectors.c
new file mode 100644
index 0000000..783fbdf
--- /dev/null
+++ b/wlantest/test_vectors.c
@@ -0,0 +1,121 @@
+/*
+ * test_vectors - IEEE 802.11 test vector generator
+ * Copyright (c) 2012, Jouni Malinen <j@w1.fi>
+ *
+ * This software may be distributed under the terms of the BSD license.
+ * See README for more details.
+ */
+
+#include "utils/includes.h"
+
+#include "utils/common.h"
+#include "utils/eloop.h"
+#include "wlantest.h"
+
+
+extern int wpa_debug_level;
+extern int wpa_debug_show_keys;
+
+
+static void test_vector_tkip(void)
+{
+ u8 tk[] = {
+ 0x12, 0x34, 0x56, 0x78, 0x90, 0x12, 0x34, 0x56,
+ 0x78, 0x90, 0x12, 0x34, 0x56, 0x78, 0x90, 0x12,
+ 0x34, 0x56, 0x78, 0x90, 0x12, 0x34, 0x56, 0x78,
+ 0x90, 0x12, 0x34, 0x56, 0x78, 0x90, 0x12, 0x34
+ };
+ u8 pn[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 };
+ u8 frame[] = {
+ 0x08, 0x42, 0x2c, 0x00, 0x02, 0x03, 0x04, 0x05,
+ 0x06, 0x08, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0xd0, 0x02,
+ /* 0x00, 0x20, 0x01, 0x20, 0x00, 0x00, 0x00, 0x00, */
+ 0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00, 0x08, 0x00,
+ 0x45, 0x00, 0x00, 0x54, 0x00, 0x00, 0x40, 0x00,
+ 0x40, 0x01, 0xa5, 0x55, 0xc0, 0xa8, 0x0a, 0x02,
+ 0xc0, 0xa8, 0x0a, 0x01, 0x08, 0x00, 0x3a, 0xb0,
+ 0x00, 0x00, 0x00, 0x00, 0xcd, 0x4c, 0x05, 0x00,
+ 0x00, 0x00, 0x00, 0x00, 0x08, 0x09, 0x0a, 0x0b,
+ 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13,
+ 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b,
+ 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23,
+ 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b,
+ 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33,
+ 0x34, 0x35, 0x36, 0x37,
+ /* 0x68, 0x81, 0xa3, 0xf3, 0xd6, 0x48, 0xd0, 0x3c */
+ };
+ u8 *enc;
+ size_t enc_len;
+
+ wpa_printf(MSG_INFO, "\nIEEE Std 802.11-2012, M.6.3 TKIP test "
+ "vector\n");
+
+ wpa_hexdump(MSG_INFO, "TK", tk, sizeof(tk));
+ wpa_hexdump(MSG_INFO, "PN", pn, sizeof(pn));
+ wpa_hexdump(MSG_INFO, "Plaintext MPDU", frame, sizeof(frame));
+
+ enc = tkip_encrypt(tk, frame, sizeof(frame), 24, NULL, pn, 0, &enc_len);
+ if (enc == NULL) {
+ wpa_printf(MSG_ERROR, "Failed to encrypt TKIP frame");
+ return;
+ }
+
+ wpa_hexdump(MSG_INFO, "Encrypted MPDU (without FCS)", enc, enc_len);
+ os_free(enc);
+}
+
+
+static void test_vector_ccmp(void)
+{
+ u8 tk[] = { 0xc9, 0x7c, 0x1f, 0x67, 0xce, 0x37, 0x11, 0x85,
+ 0x51, 0x4a, 0x8a, 0x19, 0xf2, 0xbd, 0xd5, 0x2f };
+ u8 pn[] = { 0xB5, 0x03, 0x97, 0x76, 0xE7, 0x0C };
+ u8 frame[] = {
+ 0x08, 0x48, 0xc3, 0x2c, 0x0f, 0xd2, 0xe1, 0x28,
+ 0xa5, 0x7c, 0x50, 0x30, 0xf1, 0x84, 0x44, 0x08,
+ 0xab, 0xae, 0xa5, 0xb8, 0xfc, 0xba, 0x80, 0x33,
+ 0xf8, 0xba, 0x1a, 0x55, 0xd0, 0x2f, 0x85, 0xae,
+ 0x96, 0x7b, 0xb6, 0x2f, 0xb6, 0xcd, 0xa8, 0xeb,
+ 0x7e, 0x78, 0xa0, 0x50
+ };
+ u8 *enc;
+ size_t enc_len;
+ u8 fcs[4];
+
+ wpa_printf(MSG_INFO, "\nIEEE Std 802.11-2012, M.6.4 CCMP test "
+ "vector\n");
+
+ wpa_hexdump(MSG_INFO, "TK", tk, sizeof(tk));
+ wpa_hexdump(MSG_INFO, "PN", pn, sizeof(pn));
+ wpa_hexdump(MSG_INFO, "802.11 Header", frame, 24);
+ wpa_hexdump(MSG_INFO, "Plaintext Data", frame + 24, sizeof(frame) - 24);
+
+ enc = ccmp_encrypt(tk, frame, sizeof(frame), 24, NULL, pn, 0, &enc_len);
+ if (enc == NULL) {
+ wpa_printf(MSG_ERROR, "Failed to encrypt CCMP frame");
+ return;
+ }
+
+ wpa_hexdump(MSG_INFO, "Encrypted MPDU (without FCS)", enc, enc_len);
+ WPA_PUT_LE32(fcs, crc32(enc, enc_len));
+ wpa_hexdump(MSG_INFO, "FCS", fcs, sizeof(fcs));
+ os_free(enc);
+}
+
+
+int main(int argc, char *argv[])
+{
+ wpa_debug_level = MSG_EXCESSIVE;
+ wpa_debug_show_keys = 1;
+
+ if (os_program_init())
+ return -1;
+
+ test_vector_tkip();
+ test_vector_ccmp();
+
+ os_program_deinit();
+
+ return 0;
+}