17003 Commits

Author SHA1 Message Date
Mathy
609e44b1b8 fragattacks: ability to add trailing data 2020-04-29 18:40:41 -04:00
Hai Shalom
c54a5e96b5 Randomize GAS dialog token
Randomize GAS dialog token field, instead of using an incremental
counter with predictable values. This change will make this field
unuseful for user fingerprinting.

Signed-off-by: Hai Shalom <haishalom@google.com>
2020-04-29 13:15:34 +03:00
Jouni Malinen
a803ba4f9d Use more specific reason codes for 4-way handshake timeouts
IEEE 802.11 defines reason codes for indicating 4-way handshake and
group key handshake timeouts. Use those reason codes instead of the more
generic one for these particular cases in the Authenticator state
machine.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-29 13:00:53 +03:00
Mathy
4fb673a9ca fragattacks: bugfix 2020-04-27 11:51:00 -04:00
Mathy
b4a5f635e8 fragattack: add icmp-size parameter 2020-04-27 11:47:15 -04:00
Mathy
19b936a059 fragattack: improve error handling if hostap fails to start 2020-04-27 11:47:00 -04:00
Mathy
857aef45d3 fragattack: add to TODO 2020-04-27 08:40:43 -04:00
Mathy
46fb117db6 fragattack: cleanup FreeBSD code and update eapol_msdu 2020-04-26 12:51:39 -04:00
Mathy
72798c490a fragattack: working FreeBSD mixed key attack 2020-04-26 10:58:39 -04:00
Mathy
3c76b22e40 fragattack: monitor ctrl_iface to see when daemon started 2020-04-25 17:34:02 -04:00
Mathy
b62e788f1a fragattacks: fix linux_plain, add rekey-early-install and pn-per-qos 2020-04-25 17:29:31 -04:00
Jouni Malinen
83c9b69b01 tests: Wait a bit to get Beacon frames into capture
The ap_beacon_rate_* test cases could end up terminating before the very
first Beacon frame is captured, so wait a bit after the connection to
make sure at least one Beacon frame is going to be in the capture file.

Signed-off-by: Jouni Malinen <j@w1.fi>
2020-04-25 17:23:24 +03:00
Mathy
a7c1b406e4 fragattack: add --bcast option 2020-04-25 10:12:44 -04:00
Mathy
6774289188 fragattacks: option to deauth for full reconnect 2020-04-25 09:25:58 -04:00
Mathy
c2324f6482 fragattac: option for full reconnect with deauth first
Aruba AP doesn't seem to handle a reassociation well. Add this option
to test AP behaviour using a full deauthentication and normal
reconnection.
2020-04-24 15:02:05 -04:00
Mathy
b298bdafaa fragattack: option to perform PTK rekey in plaintext 2020-04-24 14:02:05 -04:00
Jouni Malinen
c794bdf9c8 tests: Beacon frame protection mismatch
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:16:51 +03:00
Jouni Malinen
ff0b87304c nl80211: Process unprotected Beacon frame RX events
Convert driver indications to internal events to allow invalid Beacon
frames to be reported to the AP.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:10:09 +03:00
Jouni Malinen
a39e9af908 nl80211: DPP listen mode callback
Update frame processing registration for DPP Public Action frames to
include multicast reception when in DPP listen mode and the driver
indicates support for this type of explicit request.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:07:01 +03:00
Jouni Malinen
05abebaa06 tests: Fix sigma_dut_sae_h2e_enabled_group_rejected to clear sae_pwe
This test case was using sigma_dut to set sae_pwe=2, but that value was
not cleared in the end. This could result in following SAE test cases
failing due to unexpected behavior.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
e81e2091b3 Remove now unused Boolean/TRUE/FALSE definitions
The previous users were converted to C99 bool.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
3d58e8286f FILS: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
86ea761e93 mesh: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
71140cd5b1 RADIUS: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
2c55e67aaf airtime_policy: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
f75a0339d5 state_machine: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
0365458eb8 HE: Replace Boolean with C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
5e5eb5a312 MACsec: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
db81d81451 eap_example: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
d15e109e29 EAP peer: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
c9d70dd329 RSN supp: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
da8478a1ab EAPOL supp: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
37e3501bf7 FST: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
3dc69721e8 EAPOL auth: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
56024a233a WPA auth: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
4d9c313f2a WPA: Fix wpa_parse_kde_ies() handling with vendor specific elements
Documentation of the return values for wpa_parse_vendor_specific() and
wpa_parse_generic() were not accurate and the parsing results from these
were not really handled appropriately. There is no point in calling
wpa_parse_vendor_specific() if wpa_parse_generic() recognizes a KDE. Not
that this would break anything in practice, but still, it looks
confusing.

The part about handling wpa_parse_vendor_specific() return value can, at
least in theory, break some cases where an unexpectedly short KDE/vendor
specific element were present and something would need to be recognized
after it. That does not really happen with any standard compliant
implementation and this is unlikely to cause any real harm, but it is
clearer to handle this more appropriately even for any theoretical case,
including misbehavior of a peer device.

Instead of stopping parsing on too short vendor specific element,
continue parsing the following KDEs/IEs. Skip the
wpa_parse_vendor_specific() call when a KDE has been recognized. Also
fix the return value documentation for wpa_parse_generic() and remove
the useless return value from wpa_parse_vendor_specific().

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2020-04-24 17:06:50 +03:00
Jouni Malinen
1025a9052c Sync with mac80211-next.git include/uapi/linux/nl80211.h
This brings in nl80211 definitions as of 2020-02-24.

Signed-off-by: Jouni Malinen <j@w1.fi>
2020-04-24 17:06:36 +03:00
Mathy
5e0a69d6f5 fragattacks: ability to skip fragment numbers in pings 2020-04-24 09:56:32 -04:00
Mathy
05d2288d10 fragattack: eapol_msdu test after getting IP 2020-04-24 08:21:15 -04:00
Mathy
5b526124bc fragattack: option to send a fake A-MSDU 2020-04-23 21:15:15 -04:00
Mathy
34c17f2a4f fragattack: option to let client request PTK rekey 2020-04-23 16:05:34 -04:00
Mathy
68380ff502 fragattack: bugfix in inc-pn parameter 2020-04-23 16:05:16 -04:00
Mathy
4ef5b08880 fragattacks: avoid false positives in linux plaintext test 2020-04-23 15:43:47 -04:00
Mathy
a4d62d03e8 frattack: control over when macos test frames are sent 2020-04-23 12:38:54 -04:00
Mathy
4c124a728c fragattacks: ability to override request type from command line 2020-04-23 12:26:00 -04:00
Mathy
0275ac30d9 fragattacks: option to execute Linux plaintext append attack 2020-04-23 12:06:04 -04:00
Mathy
459fa3c33f fragattack: updated eapol_msdu test and clean up test selection 2020-04-23 11:50:21 -04:00
Mathy
1027a7f902 fragattacks: various improvements to ping test for experiments 2020-04-23 10:19:14 -04:00
Mathy
e26278f4b5 fragattacks: detect rekey event as AP 2020-04-23 10:17:50 -04:00
Mathy
33fd6c30f3 fragattack: tests against WEP 2020-04-22 19:14:35 -04:00