path: root/wlantest/rx_data.c
Commit message (Collapse)AuthorAgeFilesLines
* wlantest: Fix handling of PTK rekeyingJouni Malinen2011-11-141-1/+1
| | | | | | | | | | | | | | | | | Use a temporary PTK buffer during 4-way handshake when rekeying PTK so that the new EAPOL-Key frame MIC values are checked against the new PTK and frames are decrypted using the old PTK. Take the new PTK into use once msg 4/4 is processed and clear RSC counters at that point (including moving of RSC update to avoid setting RSC based on the msg 4/4). In addition, add a workaround to handle supplicant implementations that set Secure bit to one during PTK rekeying 4-way handshake in msg 2/4. This was previously assumed to be msg 4/4, but the key data contents can be used to figure out whether this is msg 2/4 even if the Secure bit is set to one. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* wlantest: Fix source address for FromDS framesJouni Malinen2011-03-141-1/+1
* wlantest: Fix compiler warningsJouni Malinen2011-01-241-2/+1
* wlantest: Determine ping matches properly for direct linkJouni Malinen2011-01-241-9/+25
| | | | | Check ICMP echo request/response matches for both STAs to get proper counter values for a ping from a one STA to another one using TDLS.
* wlantest: Add support for decrypting WEP framesJouni Malinen2011-01-141-2/+15
* wlantest: Add STA counter prot_data_txJouni Malinen2011-01-071-0/+2
* wlantest: Add more details for replay debug messagesJouni Malinen2011-01-071-4/+14
| | | | | These make it easier to find the frame in question when looking at the capture in Wireshark.
* wlantest: Add counters and AP/direct path validation for TDLSJouni Malinen2010-12-161-0/+63
| | | | | These can be used to write automated test scripts for verifying that TDLS STAs are using correct data path.
* wlantest: Add support for decrypting TDLS framesJouni Malinen2010-12-131-8/+41
| | | | | Derive TPK based on TDLS TPK Handshake and decrypt frames on the direct link with TPK-TK.
* wlantest: Parse ICMP echo packet and record STA ping successJouni Malinen2010-11-201-9/+30
* wlantest: Move RX EAPOL processing into its own fileJouni Malinen2010-11-201-969/+0
* wlantest: Add support for protecting injected broadcast framesJouni Malinen2010-11-191-0/+10
* wlantest: Add BSS/STA statistics countersJouni Malinen2010-11-181-0/+1
| | | | | These counters can be cleared and queried from external programs to script various testing tasks.
* wlantest: Validate EAPOL-Key reserved fieldsJouni Malinen2010-11-131-5/+93
| | | | | In addition, this handles WPA difference in Key Info for Secure bit in msg 3/4 and 4/4 (not set, since GTK is not yet available).
* wlantest: Validate reserved bits in TKIP/CCMP headerJouni Malinen2010-11-131-0/+42
* wlantest: Verify that TKIP/CCMP frames set ExtIV=1Jouni Malinen2010-11-131-0/+16
* wlantest: Implement TKIP replay detectionJouni Malinen2010-11-131-3/+8
* wlantest: Add support for WPA key handshakesJouni Malinen2010-11-131-28/+66
| | | | | The Key Data field is handled differently in msg 3/4 and 1/2 in WPA, so add separate code for processing non-RSN case.
* wlantest: Add support for TKIP decryptionJouni Malinen2010-11-131-6/+11
* wlantest: Use negotiated AKM/cipher to select PMK-to-PTK parametersJouni Malinen2010-11-121-2/+3
* wlantest: Verify that WPA/RSN IE matches in EAPOL-Key and mgmt framesJouni Malinen2010-11-121-0/+58
| | | | | | | | Verify that WPA/RSN IE in (Re)Association Request is identical to the one used in EAPOL-Key message 2/4. Verify that WPA/RSN IE in Beacon/Probe Response is identical to the one(s) used in EAPOL-Key message 3/4.
* wlantest: Dump decrypted Key Data from Group Handshake msg 1/2Jouni Malinen2010-11-111-0/+38
* wlantest: Add option for writing a PCAP dump fileJouni Malinen2010-11-111-0/+42
| | | | | | | The output file includes all the capture (or read from wireless PCAP file) frames in their original contents and another copy of each frame that is decrypted in wlantest (including EAPOL-Key Key Data field).
* wlantest: Add Group Key handshake processingJouni Malinen2010-11-111-2/+80
| | | | | | Decrypt GTK/IGTK updates in Group Key message 1/2 and update the keys. In addition, verify the MIC on both Group Key handshake messages.
* wlantest: Add replay detection for CCMPJouni Malinen2010-11-111-7/+48
* wlantest: Decrypt group addressed Data framesJouni Malinen2010-11-111-1/+9
* wlantest: Add support for decrypting CCMP protected unicast Data framesJouni Malinen2010-11-101-2/+75
* wlantest: Parse KDEs from message 2/4Jouni Malinen2010-11-091-1/+33
* wlantest: Use more consistent debug levels for keysJouni Malinen2010-11-091-8/+13
* wlantest: Parse Key Data KDEs and store GTK and IGTKJouni Malinen2010-11-091-1/+67
* wlantest: Decrypt EAPOL-Key 3/4 Key DataJouni Malinen2010-11-081-2/+112
* wlantest: Derive PMK from RADIUS exchangeJouni Malinen2010-11-071-21/+35
| | | | | | Decrypt MPPE keys and derive PMK from RADIUS exchange if RADIUS shared secret is known. Use the derived PMK when trying to derive PTK during 4-Way Handshake.
* wlantest: Fix LLC debug printJouni Malinen2010-11-071-1/+4
* wlantest: Add PTK derivation based on passphrasesJouni Malinen2010-11-071-3/+166
| | | | | | | Allow pre-configuration of passphrases (-p<passphrase>) to provide enough information for wlantest to be able to derive PMK for each BSS and PTK for each STA going through 4-Way Handshake (at least message 2 and 3 needs to be received).
* wlantest: Parse EAPOL-Key framesJouni Malinen2010-11-071-1/+300
* wlantest: Move Mgmt and Data frame processing into their own filesJouni Malinen2010-11-071-0/+111