3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-11-01 01:29:23 +01:00
Commit Graph

3410 Commits

Author SHA1 Message Date
Denis Kenzior
25d6dba008 unit: Rework unit test 2015-01-28 21:23:16 -06:00
Denis Kenzior
ce3ffd732f scan: Make const correct 2015-01-28 21:23:16 -06:00
Denis Kenzior
3b618172e2 unit: Remove unneeded whitespace 2015-01-28 21:23:16 -06:00
Denis Kenzior
532e00f686 gitignore: Add unit/test-ssid-security 2015-01-28 21:23:16 -06:00
Jukka Rissanen
f7efdeb5e2 unit: Add checking of SSID security settings 2015-01-28 14:15:14 -06:00
Jukka Rissanen
8f73bc825f scan: Add utility to categorize BSS security type
Utility function gets the RSNE information element and
figures out whether the SSID is Open, WEP, PSK or 802.1X
network.
2015-01-28 12:34:01 -06:00
Jukka Rissanen
27b45f926b ie: Add capability enum 2015-01-28 12:33:47 -06:00
Jukka Rissanen
9e655106fa wiphy: MLME warning message text incorrect
MLME notify function prints error if wiphy or netdev is missing.
The error text in this case talks about scan notification instead
of more proper MLME notification.
2015-01-28 11:49:03 -06:00
Jukka Rissanen
bd6189aef0 main: Remove obsolete -S option
As there is no handler for -S option, we can remove it.
2015-01-26 21:53:55 -06:00
Jukka Rissanen
9c380ad95c main: DBus debug option -B was missing
It was not possible to activate DBus debugging.
2015-01-26 21:53:30 -06:00
Denis Kenzior
63a57453da monitor: Fix transaction_sequence byte-ordering
transaction_sequence must be compared in host byte-order
2015-01-22 12:42:20 -06:00
Denis Kenzior
5247695d56 mpdu: fix transaction_sequence byte-ordering
transaction_sequence was not being considered in host CPU byte order
2015-01-22 12:41:10 -06:00
Denis Kenzior
e60b814dc8 mpdu: algorithm was not swapped to host byte-order 2015-01-22 12:41:10 -06:00
Denis Kenzior
373d276dfc monitor: algorithm was not in host byte-order
auth.algorithm field is an __le16, so must be converted to host byte
order first.
2015-01-22 12:41:08 -06:00
Denis Kenzior
f94f3d561c monitor: duration should be printed in host-order 2015-01-22 12:28:47 -06:00
Tomasz Bursztyka
9e3cc8bf42 monitor: Print (de)authentication frame info
This patch adds decoding and printing of information contained in
authentication and de-authentication management frames.
2015-01-22 12:24:20 -06:00
Tomasz Bursztyka
1d76163fb1 TODO: Add a unit test task for the mpdu frames
All frames need their own unit-test.
2015-01-22 12:20:50 -06:00
Tomasz Bursztyka
33ab01f669 unit: Update to the new eapol_key_validate API
eapol_key_validate will directly return a const pointer if the
validation succeeds.
2015-01-22 12:20:19 -06:00
Tomasz Bursztyka
8f946c0cdc eapol: Change function signatures
The frame which comes in is an EAPoL-key frame, thus changing the name
accordingly (as well as the parameter names).

Also, returning the cast pointer instead of a boolean is easier to
use as there won't be any need to perform the cast ourselves afterward
2015-01-22 12:18:17 -06:00
Tomasz Bursztyka
8fba847b9d unit: Update to the new mpdu_validate API
mpdu_validate will directly return a const pointer if the validation
succeeds.
2015-01-22 12:16:33 -06:00
Tomasz Bursztyka
e02f02fa69 mpdu: Change the validation function signature
What comes in is a frame, and let's set it to uint8_t pointer, which is
semantically better than unsigned char.

Also, returning the cast pointer instead of a boolean is easier to
use as there won't be any need to perform the cast ourselves afterward
2015-01-22 12:14:47 -06:00
Tomasz Bursztyka
e573b7ca0f TODO: Updating PACKET_RECV_OUTPUT task
Since it's not implemented in the kernel, setting the priority to Low
and the complexity to 8.
2015-01-22 09:41:21 -06:00
Denis Kenzior
66c98d0998 HACKING: Add Submitting Patches section 2015-01-22 08:53:10 -06:00
Denis Kenzior
572fee1176 TODO: Add task to set TK into the kernel 2015-01-21 19:21:43 -06:00
Denis Kenzior
7199f61dc2 TODO: Add task to obtain Replay Counter
If Re-Key Offload is enabled, and a re-key occurs, the kernel will send
us an event with the updated Replay Counter.  This information needs to
be processed accordingly.
2015-01-21 19:20:07 -06:00
Denis Kenzior
66596c30bc TODO: Add new task for REKEY_DATA 2015-01-21 19:19:11 -06:00
Denis Kenzior
0a70aaefa7 TODO: Add Decode netlink REKEY_DATA attribute task 2015-01-21 19:18:33 -06:00
Denis Kenzior
ff2163a348 doc: Add overview of WPA Authentication 2015-01-21 18:43:52 -06:00
Tomasz Bursztyka
9b4011333b TODO: Removing the authentication frames parsing task 2015-01-21 14:39:20 -06:00
Tomasz Bursztyka
55d3283aeb mpdu: Add member 'ies' for mpdu_deauthentication
Even if this will never really be useful, it's better this way rather
than having a todo comment.
2015-01-21 14:37:27 -06:00
Tomasz Bursztyka
3d5fe2fddd mpdu: Validate beacon mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:31:26 -06:00
Tomasz Bursztyka
9ce1745ede mpdu: Validate timing advertisement mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:30:51 -06:00
Tomasz Bursztyka
8078f18c35 mpdu: Validate probe response mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:30:12 -06:00
Tomasz Bursztyka
cc1cc64843 mpdu: Validate probe request mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:29:39 -06:00
Tomasz Bursztyka
142a6a8a0c mpdu: Validate reassociation response mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame
2015-01-21 14:29:05 -06:00
Tomasz Bursztyka
efcaefc5dd mpdu: Validate reassociation request mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame.
2015-01-21 14:28:21 -06:00
Tomasz Bursztyka
8353ac445d mpdu: Validate association response mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame.
2015-01-21 14:28:14 -06:00
Tomasz Bursztyka
5c9f1db01f mpdu: Validate association request mpdu subtype
We do not currently validate the IEs that are following until the end
of the frame.
2015-01-21 14:28:07 -06:00
Tomasz Bursztyka
d1c29daa24 mpdu: Validate disassociation mpdu subtype
These own a reason code which is currently the only interesting
information to handle. Let's skip the vendor specific ones for now.
2015-01-21 14:27:59 -06:00
Tomasz Bursztyka
e106033fce mpdu: Validate ATIM mpdu subtype
ATIM management frames have an empty body.
2015-01-21 14:27:38 -06:00
Denis Kenzior
c3aef948db mpdu: Update offset for authentication frames
Offset was not updated properly when validating authentication frames
2015-01-21 14:25:07 -06:00
Ravi kumar Veeramally
a83dc52d50 monitor: Decode additional flags from NLMSG header
Additional universal message flags are defined which are applied
only for GET requests (NLM_F_ROOT, NLM_F_ATOMIC, NLM_F_MATCH,
NLM_F_DUMP) and flags which are related to NEW requests
(NLM_F_REPLACE, NLM_F_EXCL, NLM_F_CREATE, NLM_F_APPEND).
2015-01-21 13:31:55 -06:00
Denis Kenzior
3b3de7923a unit: Add checking of Group Management Cipher 2015-01-20 00:31:13 -06:00
Denis Kenzior
8a4e135bc8 ie: Add parsine of Group Management Cipher field 2015-01-20 00:30:54 -06:00
Denis Kenzior
d7cd5dbae7 unit: Add checking of PMKIDs in RSNE tests 2015-01-19 23:27:41 -06:00
Denis Kenzior
e5574d031d ie: Parse PMKIDs in RSN IE 2015-01-19 23:26:45 -06:00
Jukka Rissanen
ddd376978b TODO: Add task to coalesce BSS and Network objects
Taking this task in the same patch.
2015-01-19 21:26:50 -06:00
Ravi kumar Veeramally
a0124f89e9 TODO: Set Owner
Take ownership of task 'Track RTNL messages for wireless network interface'
2015-01-19 21:26:13 -06:00
Ravi kumar Veeramally
fa40340d68 monitor: Print netlink core control messages
Decode core control messages (NLMSG_ERROR and NLMSG_DONE).
2015-01-19 21:17:52 -06:00
Ravi kumar Veeramally
4d7ff64f38 monitor: Print NLMSG header
Print NLMSG header for detailed information.

e.g:
> RTNL: Done (0x03) len 4 [multi]
  Flags: 2 (0x002)
  Sequence number: 1421667486 (0x54bcec9e)
  Port ID: 24768
2015-01-19 21:11:45 -06:00