3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-12-27 19:22:34 +01:00
Commit Graph

7314 Commits

Author SHA1 Message Date
Denis Kenzior
7e6b4f8bb0 unit: Add PTK Derivation unit tests 2014-12-27 22:34:39 -06:00
Denis Kenzior
5e7771ef66 crypto: Add crypto_derive_pairwise_ptk 2014-12-27 22:34:39 -06:00
Denis Kenzior
1c4e3bc774 crypto: Make const correct 2014-12-27 22:34:39 -06:00
Denis Kenzior
dab93ef14a crypto: Update comment 2014-12-27 22:34:39 -06:00
Denis Kenzior
f647e03166 crypto: Add crypto_cipher_tk_bits 2014-12-27 22:34:39 -06:00
Denis Kenzior
07c8876d9e crypto: Add crypto_cipher_key_len 2014-12-27 22:34:39 -06:00
Denis Kenzior
0693740731 crypto: Add crypto_derive_ptk 2014-12-27 22:34:39 -06:00
Denis Kenzior
f8c5e4d93b unit: Add another EAPoL test frame
This one is 2 of 4
2014-12-27 22:34:39 -06:00
Denis Kenzior
da8e10cc5f eapol: Verify key_descriptor_version 2014-12-27 22:34:39 -06:00
Denis Kenzior
c1b3858a07 unit: Add a call to eapol_verify in unit test 2014-12-27 22:34:39 -06:00
Denis Kenzior
1504e947ff unit: Add another EAPoL-Key frame test 2014-12-27 22:34:39 -06:00
Denis Kenzior
5da6ca89e4 eapol: Add eapol_verify 2014-12-27 22:34:39 -06:00
Marcel Holtmann
19fa80cb11 unit: Add NIST examples for AES-CMAC hashing function 2014-12-27 23:21:41 +01:00
Marcel Holtmann
1ee81e5854 core: Add support for AES-CMAC hashing function 2014-12-27 23:21:10 +01:00
Marcel Holtmann
d8e7515fc4 unit: Fix bug with commented out assert for test case 2014-12-27 23:13:21 +01:00
Marcel Holtmann
1d137ffba0 unit: Add test cases for hmac_md5, hmac_sha1 and hmac_256 functions 2014-12-27 07:02:13 +01:00
Marcel Holtmann
872c0e803a core: Add support for HMAC SHA256 helper function 2014-12-27 06:58:28 +01:00
Marcel Holtmann
b615a6f4e0 core: Add support for HMAC MD5 helper function 2014-12-27 06:44:04 +01:00
Jukka Rissanen
08d31e3b1b wiphy: Fixes due to nl80211.h changes 2014-12-22 11:48:26 -06:00
Jukka Rissanen
ce7d9dcab1 wiphy: Update nl80211.h
Updating the latest nl80211.h from upstream as the socket owner
attribute name was changed in nl80211.h.
2014-12-22 11:48:09 -06:00
Denis Kenzior
5ddea3684f unit: Add another EAPoL-Key frame test 2014-12-19 15:45:59 -06:00
Denis Kenzior
eded7b04c4 unit: Add rsc field to unit test 2014-12-19 15:45:40 -06:00
Denis Kenzior
7cf4f7b100 eapol: Add a couple of missing fields 2014-12-19 15:45:17 -06:00
Denis Kenzior
e3729cc0f5 eapol: Fix typo 2014-12-19 14:25:57 -06:00
Denis Kenzior
933a181c33 unit: Fix typo 2014-12-19 12:34:30 -06:00
Denis Kenzior
9460ca2eaf gitignore: Add unit/test-ssid-to-utf8 2014-12-19 12:33:44 -06:00
Patrik Flykt
e67d919048 unit: Create unit test for SSID UTF8 pretty-printing
Write a set of tests that check correct and incorrect UTF8 sequences
at the beginning, middle and end of a byte array. Also verify an all
zeros (hidden) SSID of varying length.
2014-12-19 12:31:03 -06:00
Ravi kumar Veeramally
ab16513cc1 gitignore: Add unit/test-eapol to .gitignore 2014-12-19 12:30:19 -06:00
Denis Kenzior
9f4f639698 unit: Update to the new framework 2014-12-19 12:26:41 -06:00
Denis Kenzior
7b6d8b54cd mpdu: Fix bitfield use on big endian 2014-12-19 12:26:41 -06:00
Marcel Holtmann
75ec08df73 monitor: Define ARPHRD_NETLINK if it not provided by system headers 2014-12-19 01:44:49 +01:00
Denis Kenzior
89d0df7d1a unit: Add initial unit test for EAPoL 2014-12-18 18:11:12 -06:00
Denis Kenzior
2cc842a302 eapol: Add beginnings of EAPoL utilities 2014-12-18 18:10:10 -06:00
Patrik Flykt
ac663fba69 monitor: Print SSID IE
Print the SSID IE. If the SSID is not UTF-8 compliant, replace the non-
compliant byte with the UTF-8 substitution character. If the SSID is
hidden, its length and/or all characters are zero; print nothing in
this case.
2014-12-18 11:10:03 -06:00
Patrik Flykt
bf25abf38d util: Add SSID to UTF8 pretty-print function
Use a static buffer for converting an SSID to an approximate string in
UTF8. Replace each char that is not UTF8 compatible with the UTF8
replacement symbol.
2014-12-18 11:06:48 -06:00
Denis Kenzior
007d9f3bd1 unit: Update mpdu unit test to new world order 2014-12-17 17:44:59 -06:00
Denis Kenzior
b22f93203c mpdu: Rework to a zero-copy based framework 2014-12-17 17:44:44 -06:00
Denis Kenzior
b38bf4d0b7 .gitignore: Add unit/test-mpdu 2014-12-17 16:23:07 -06:00
Denis Kenzior
754264fe6a unit: Add basic mpdu unit test 2014-12-17 16:22:39 -06:00
Denis Kenzior
d7b6a36db8 mpdu: Rework structure definitions
The current setup was not endian safe
2014-12-17 16:22:06 -06:00
Denis Kenzior
3ef0ff1e1a mpdu: Fix invalid read
The cast was being done incorrectly resulting in invalid values being
obtained
2014-12-17 16:21:05 -06:00
Denis Kenzior
ca742bb95d mpdu: Fix style 2014-12-16 16:57:30 -06:00
Denis Kenzior
b0af0177ac mpdu: Replace for loop with memcpy 2014-12-16 14:26:33 -06:00
Denis Kenzior
61a44dd485 mpdu: Fix style 2014-12-16 14:23:36 -06:00
Denis Kenzior
6a011f0d92 mpdu: Simplify checks 2014-12-16 14:22:13 -06:00
Denis Kenzior
002290998e mpdu: Add x-ref in comments for struct definitions 2014-12-16 14:21:18 -06:00
Tomasz Bursztyka
805619fc9d core: Add the preliminary logic to parse 802.11 MPDUs
It currently focuses on parsing management frames, and specifically its
authentication and deauthentication frames.
2014-12-16 10:53:20 -06:00
Denis Kenzior
dd47f485af AUTHORS: Mention Ravi's contributions 2014-12-16 08:58:15 -06:00
Denis Kenzior
02b0f6e27a AUTHORS: Mention Tomasz's contributions 2014-12-16 08:58:05 -06:00
Ravi kumar Veeramally
deb80322ea monitor: Fix memory leak
Memory allocated l_timeout struct from l_timeout_create not being
freed.

==4184== HEAP SUMMARY:
==4184==     in use at exit: 32 bytes in 1 blocks
==4184==   total heap usage: 50 allocs, 49 frees, 39,902 bytes allocated
==4184==
==4184== 32 bytes in 1 blocks are definitely lost in loss record 1 of 1
==4184==    at 0x4C2ABA0: malloc (in /usr/lib/valgrind/vgpreload_memcheck-amd64-linux.so)
==4184==    by 0x40706D: l_malloc (util.c:62)
==4184==    by 0x408D9A: l_timeout_create (timeout.c:117)
==4184==    by 0x40896A: signal_callback (signal.c:82)
==4184==    by 0x408692: l_main_run (main.c:346)
==4184==    by 0x402474: main (main.c:797)
==4184==
==4184== LEAK SUMMARY:
==4184==    definitely lost: 32 bytes in 1 blocks
==4184==    indirectly lost: 0 bytes in 0 blocks
==4184==      possibly lost: 0 bytes in 0 blocks
==4184==    still reachable: 0 bytes in 0 blocks
==4184==         suppressed: 0 bytes in 0 blocks
2014-12-16 08:56:57 -06:00