Commit Graph

15731 Commits

Author SHA1 Message Date
Mathy
6d818f08c1 fragattack: check if frames can be sent between fragments 2020-04-01 10:14:07 -04:00
Mathy
fc0653e0e0 fragattack: updated comment 2020-03-30 18:04:31 -04:00
Mathy
07c23f89db fragattack: working MacOs attack test 2020-03-30 18:01:56 -04:00
Mathy
82385b5972 fragattack: specify test ID as argument 2020-03-30 13:53:56 -04:00
Mathy
82e308f1b2 fragattack: easier definition of tests 2020-03-30 13:13:21 -04:00
Mathy
79de461d16 fragattack: add flags to Frag class and cache poison test 2020-03-29 18:11:35 -04:00
Mathy
8ce648e665 fragattack: use f-strings 2020-03-29 10:56:59 -04:00
Mathy
9f35e823f1 fragattack: improved test case generation 2020-03-28 13:33:34 -04:00
Mathy
624325b73e fragattack: reassociate without deauthenticating 2020-03-28 09:32:58 -04:00
Mathy
2dab452f52 fragattack: delete old linux attack test case 2020-03-28 09:31:28 -04:00
Mathy
21d0579abe fragattack: working rekeyed fragments attack against AP 2020-03-27 15:19:31 -04:00
Mathy
9f44009b47 fragattack: code to rekey the PTK 2020-03-27 14:22:12 -04:00
Mathy
22f603ceac fragattack: add separate connected event 2020-03-27 13:23:49 -04:00
Mathy
16fa93c888 fragattack: manually encrypt frames immediately after handshake 2020-03-27 12:58:11 -04:00
Mathy
80f3e334a0 fragattack: do not remove existing monitor interface 2020-03-27 12:50:28 -04:00
Mathy
c6a9274d4d fragattack: detect ath9k_htc for injection workaround 2020-03-27 12:49:33 -04:00
Mathy
e3fc1987a0 Let AP force reconnects of clients and confirmed Linux attack test 2020-03-25 09:53:38 -04:00
Mathy
656f5c7dbf fragattack: let client reconnect after obtaining an IP address 2020-03-24 08:52:31 -04:00
Mathy
e45726762e fragattack: track libwifi remote 2020-03-13 07:38:42 -04:00
Mathy
6ee241187f fragattack: can now use test cases to specify tests easily 2020-03-13 06:49:58 -04:00
Mathy
0e59343a22 fragattack: add GET_GTK and return key index as well 2020-03-13 06:49:09 -04:00
Mathy
c5659bf2b3 fragattack: consistent wpa_ctrl msg on client connect 2020-03-13 06:46:28 -04:00
Mathy
0296fc4f61 fragattack: ability to send QoS frames 2020-03-10 09:43:46 -04:00
Mathy
1af41d333e fragattack: only start after receiving DHCP request 2020-03-08 08:03:56 -04:00
Mathy
92d08ce6a8 fragattack: script to turn hardware encryption on or off 2020-03-07 21:10:55 -05:00
Mathy
6afbfcd108 fragattack: major rewrite to support both client and AP testing 2020-03-07 21:10:26 -05:00
Mathy
091ea84e50 fragattack: configuration for hostapd 2020-03-07 21:09:56 -05:00
Mathy
b61251c7eb fragattack: add connecting event to hostapd ctrl 2020-03-07 21:09:24 -05:00
Mathy
5fa03b70a7 fragattack: add GET_TK command to hostapd 2020-03-07 21:09:03 -05:00
Mathy
7b0205062e fragattack: refactored code 2020-03-04 06:36:52 -05:00
Mathy
20b60570ca fragattack: netbsd force fragment experiments 2020-03-01 19:03:08 -05:00
Mathy
db708054df fragattack: ath9k_htc firmware to preserve sequence numbers 2020-03-01 04:56:26 -05:00
Mathy
91fefc3856 fragattack: tests and results on forcing frame fragmentation 2020-02-29 15:56:41 -05:00
Mathy
ef4a66fe56 fragattack: script to inject encrypted fragmented frames 2020-02-27 07:07:19 -05:00
Mathy
0df030a726 fragattack: configuration files and scripts 2020-02-27 07:06:53 -05:00
Mathy
79eadfbc39 fragattack: make TK available over control interface 2020-02-27 07:05:08 -05:00
Thomas Pedersen
1c67a07603 tests: Add basic power saving tests for ap_open
ap_open_sta_ps checks whether a STA told its hardware to enter power
save after enabling power save.

ap_open_ps_mc_buf checks whether an AP properly buffers and releases
multicast frames when a STA with PS active is associated.

Signed-off-by: Thomas Pedersen <thomas@adapt-ip.com>
2020-02-15 18:36:29 +02:00
Thomas Pedersen
1d9d6c2432 tests: Factor out multicast connectivity check
A test may want to check multicast connectivity independent of unicast
or check multicast without exercising unicast first. Factor out the
multicast connectivity check code into its own function.

Signed-off-by: Thomas Pedersen <thomas@adapt-ip.com>
2020-02-15 18:36:29 +02:00
Jouni Malinen
b056275111 Fix exception checking in a wpa_supplicant P2P example script
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 18:36:29 +02:00
Jouni Malinen
91cce45226 tests: Fix exception generation in persistent_group_per_sta_psk
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 18:36:29 +02:00
Jouni Malinen
7e7e32f7e6 tests: Fix a typo in raising an exception
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 18:36:29 +02:00
Jouni Malinen
afd10e880b tests: Require wps=1 tag in ap_wps_per_station_psk
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 18:36:27 +02:00
Jouni Malinen
2bab073dfe WPS: Add new PSK entries with wps=1 tag
Now that hostapd wpa_psk_file has a new tag for identifying PSKs that
can be used with WPS, add that tag to new entries for PSKs from WPS.
This makes it clearer where the PSK came from and in addition, this
allows the same PSK to be assigned if the same Enrollee goes through WPS
provisioning again.

Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 17:37:27 +02:00
Jouni Malinen
68e9b8cb16 tests: Prepare ap_wps_per_station_psk for the new wps=1 tag in PSK file
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 17:37:27 +02:00
Tomasz Jankowski
fde8e79463 WPS: Make it possible to use PSKs loaded from the PSK file
By default, when configuration file set wpa_psk_file, hostapd generated
a random PSK for each Enrollee provisioned using WPS and appended that
PSK to wpa_psk_file.

Changes that behavior by adding a new step. WPS will first try to use a
PSK from wpa_psk_file. It will only try PSKs with wps=1 tag.
Additionally it'll try to match enrollee's MAC address (if provided). If
it fails to find an appropriate PSK, it falls back to generating a new
PSK.

Signed-off-by: Tomasz Jankowski <tomasz.jankowski@plume.com>
2020-02-15 17:28:00 +02:00
Jouni Malinen
b1977a652d WPS: Use PMK_LEN instead of hardcoded 32
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 17:27:52 +02:00
Jouni Malinen
b27ed050db Do not split strings into multiple lines
Convert hostapd_config_read_wpa_psk() to the newer style of not
splitting strings into multiple lines.

Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 17:12:45 +02:00
Jouni Malinen
838180877f Use PMK_LEN macro instead of hardcoded value 64 (= 2 * 32)
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 17:11:18 +02:00
Jouni Malinen
f5da5810c9 Check pbkdf2_sha1() result when generating PSK from PSK file
This function can fail in theory, so check the return value.

Signed-off-by: Jouni Malinen <j@w1.fi>
2020-02-15 17:10:08 +02:00
Sergey Matyukevich
e7d8842e6b OWE: Rename owe_assoc_req_process() parameter reason to status
In the function owe_assoc_req_process(), values assigned to the reason
argument imply that it should be renamed to status. Rename 'reason' to
'status' and modify the uses of owe_assoc_req_process() accordingly.

Signed-off-by: Sergey Matyukevich <sergey.matyukevich.os@quantenna.com>
2020-02-15 16:46:32 +02:00