aboutsummaryrefslogtreecommitdiffstats
path: root/wlantest
Commit message (Collapse)AuthorAgeFilesLines
...
* wlantest: Get rid of compiler warningJouni Malinen2013-03-291-2/+0
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add wlantest_cli command add_wepJouni Malinen2013-03-291-1/+29
| | | | | | This can be used to configure a known WEP key for decrypting WEP frames. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add radiotap header when re-writing DLT_IEEE802_11 fileJouni Malinen2013-01-171-1/+37
| | | | | | | | When using DLT_IEEE802_11 datalink type in a pcap file, wlantest will now add a radiotap header to the re-written pcap file to make sure all frames in the output file will include the radiotap header. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* wlantest: Add -F option for assuming FCS is includedJouni Malinen2013-01-173-2/+21
| | | | | | | | | When using DLT_IEEE802_11 datalink type in a pcap file, wlantest can now be instructed to assume there is an FCS included in the frame by adding the new -F command line argument. This will make wlantest validate the FCS and strip it from the frame before processing. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* wlantest: Process TX status frames as RX frames tooJouni Malinen2012-12-161-1/+4
| | | | | | | | This is needed to allow capture files from the mac80211 cooked monitor mode interface to be processed properly. Without this, the locally generated frames may not get processed. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add BIP-GMAC-128/256 test vectorsJouni Malinen2012-09-093-0/+142
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add CCMP-256 test vectorJouni Malinen2012-09-093-0/+153
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Move AES-CCM implementation into src/cryptoJouni Malinen2012-09-091-198/+1
| | | | | | | | This is a generic AES CCM implementation that can be used for other purposes than just implementing CCMP, so it fits better in a separate file in src/crypto. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Move generic AES-CCM into separate functionsJouni Malinen2012-09-091-191/+216
| | | | | | | This part of the implementation is not specific to CCMP and could be used for other purposes, too. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add GCMP-256 test vectorJouni Malinen2012-09-093-10/+76
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Add support for using 192-bit and 256-bit keys with AES-GCMJouni Malinen2012-09-091-4/+4
| | | | | | | | This adds 192-bit and 256-bit key support to the internal AES implementation and extends the AES-GCM functions to accept key length to enable longer AES key use. Signed-hostap: Jouni Malinen <j@w1.fi>
* Support arbitrary IV length with AES-GCMJouni Malinen2012-09-081-4/+4
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Move AES-GCM implementation into src/cryptoJouni Malinen2012-09-081-282/+3
| | | | | | | | This is a generic AES GCM and GMAC implementation that can be used for other purposes than just implementing GCMP, so it fits better in a separate file in src/crypto. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Allow GHASH update calls to avoid extra allocationJouni Malinen2012-09-081-70/+39
| | | | | | | | There is no need to allocate a temporary buffer and build GHASH input data into it. Instead, ghash() is trivial to split into update part that can be called separately for each segment. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Remove CCMP specific AAD handling from GCMPJouni Malinen2012-09-081-10/+8
| | | | | | | GCMP encodes length of AAD differently, so remove the unnecessary code that got copied from the CCMP implementation. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Move GCM-AE and GCM-AD into separate functionsJouni Malinen2012-09-081-160/+185
| | | | | | | This splits the more generic GCM operations from GCMP specific implementation. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add GCMP implementation and test vectors from P802.11ad/D9.0Jouni Malinen2012-09-084-0/+517
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Check TKIP/CCMP decryption routines for test vectorsJouni Malinen2012-09-081-6/+60
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add IEEE Std 802.11-2012, M.9.1 BIP test vectorJouni Malinen2012-09-082-0/+36
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Move BIP function into a separate function and fileJouni Malinen2012-09-084-41/+77
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add IEEE Std 802.11-2012, M.9.2 CCMP (mgmt) test vectorJouni Malinen2012-09-081-0/+34
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Add program for generating IEEE 802.11 test vectorsJouni Malinen2012-09-082-1/+131
| | | | | | | This version can generate CCMP and TKIP test vectors that match with the IEEE Std 802.11-2012, Annex M.6.3 and M.6.4. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Implement tkip_encrypt()Jouni Malinen2012-09-081-2/+49
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Fix couple of compiler warningsJouni Malinen2012-08-222-3/+1
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Convert os_zalloc() for an array to use os_calloc()Jouni Malinen2012-08-131-12/+12
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* edit: Add support for setting prompt stringJanusz Dziedzic2012-08-051-1/+1
| | | | Signed-hostap: Janusz Dziedzic <janusz.dziedzic@tieto.com>
* wlantest: Update STA info based on WPA/RSN IE in EAPOL-Key 2/4Jouni Malinen2012-03-211-0/+25
| | | | | | | | | | The WPA/RSN IE in EAPOL-Key 2/4 is more reliable than the one in (Re)Association Request frame. Update the STA info base don the EAPOL-Key frame so that the correct cipher information is used even if the (Re)Association Request frame is missing or corrupted in the capture. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-1122-176/+44
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Store last received GTK for each STAJouni Malinen2011-12-225-4/+26
| | | | | | | This allows info_sta command to be used to fetch the last received GTK separately for each STA. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Fix EAPOL-Key Key Data decryption for rekey caseJouni Malinen2011-12-221-2/+4
| | | | | | | KEK from TPTK needs to be used instead of from PTK when processing rekeying case similarly to what was already done with KCK. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Allow MSK/PMK list to be read from a text fileJouni Malinen2011-12-081-3/+42
| | | | | | | | A text file with MSK/PMK entries (one key per line in hexdump format) can be read into wlantest (-f<path to file>) to initialize list of known PMKs. Signed-hostap: Jouni Malinen <j@w1.fi>
* wlantest: Fix handling of PTK rekeyingJouni Malinen2011-11-143-14/+56
| | | | | | | | | | | | | | | | | Use a temporary PTK buffer during 4-way handshake when rekeying PTK so that the new EAPOL-Key frame MIC values are checked against the new PTK and frames are decrypted using the old PTK. Take the new PTK into use once msg 4/4 is processed and clear RSC counters at that point (including moving of RSC update to avoid setting RSC based on the msg 4/4). In addition, add a workaround to handle supplicant implementations that set Secure bit to one during PTK rekeying 4-way handshake in msg 2/4. This was previously assumed to be msg 4/4, but the key data contents can be used to figure out whether this is msg 2/4 even if the Secure bit is set to one. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* wlantest: Add STA counters for disconnect reason 6/7 RXJouni Malinen2011-10-253-2/+26
| | | | | | | | | These can be useful in tests involving association state mismatch between the AP and the STA (i.e., STA assumes it is still associated but the AP does not have association state). In such a case, the AP would be sending out unprotected Deauthentication or Disassociation frames with reason code 6 or 7 depending on what frame is triggering this.
* wlantest: Verify that comeback assoc resp includes correct typeJouni Malinen2011-09-201-8/+14
| | | | | | The Timeout Interval element needs to use Association Comeback time for the case when (Re)Association Response frame uses Status Code 30. Verify this before incrementing the (re)assocresp_comeback counters.
* wlantest: Allow injection of unprotected frames to unknown BSSJouni Malinen2011-08-282-7/+17
|
* wlantest: Use source address of TDLS Setup Confirm failure for matchingJouni Malinen2011-03-141-4/+4
| | | | | This is needed to be able to find the correct TDLS entry for the frame regardless of whether a FromDS or ToDS frame is being processed.
* wlantest: Fix source address for FromDS framesJouni Malinen2011-03-141-1/+1
|
* wlantest: Add command for adding WEP keys during run timeJouni Malinen2011-01-284-6/+35
|
* Fix couple of compiler warnings about uninitialized variablesJouni Malinen2011-01-261-1/+3
|
* wlantest: Handle missing fields in TDLS Setup Confirm error caseJouni Malinen2011-01-241-1/+45
|
* wlantest: Handle missing fields in TDLS Setup Response error caseJouni Malinen2011-01-241-2/+3
|
* wlantest: Count TDLS Teardown messagesJouni Malinen2011-01-243-0/+3
|
* wlantest: Fix compiler warningsJouni Malinen2011-01-241-2/+1
|
* wlantest: Fix TDLS setup failure countingJouni Malinen2011-01-241-12/+83
| | | | | | | Need to be able to handle TDLS Setup Response frame with LinkId IE when non-zero status code is used. In addition, allow finding of a TDLS entry based on real BSSID instead of the one used in the LinkId to allow negative testing of different BSS.
* wlantest: Determine ping matches properly for direct linkJouni Malinen2011-01-243-35/+63
| | | | | Check ICMP echo request/response matches for both STAs to get proper counter values for a ping from a one STA to another one using TDLS.
* wlantest: Set direct links down on deauth/disassocJouni Malinen2011-01-241-0/+16
|
* wlantest: Maintain only a single entry for an active direct linkJouni Malinen2011-01-244-9/+40
| | | | | | | | | | | The TDLS link itself is bidirectional, but there is explicit initiator/responder roles. Remove the other direction of the link if it exists when processing TDLS Setup Confirm to make sure that the link counters are stored for the current TDLS entery. This is also changing the control interface search for TDLS counters to require initiator/responder addresses in the correct order instead of matching entries regardless of the role.
* wlantest: Add counters for TDLS setup framesJouni Malinen2011-01-243-3/+25
|
* wlantest: Add TDLS entry on TDLS Setup RequestJouni Malinen2011-01-191-0/+1
| | | | This will make the TDLS counters available even if setup fails.
* wlantest: Check WPA/RSN IE match between AssocReq and BeaconJouni Malinen2011-01-171-0/+16
| | | | | | Note unexpected WPA/RSN IE in AssocReq and ignore them if the last Beacon/ProbeResp from the AP is not advertising support for WPA/RSN.