Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Johannes Berg | 1211 | 99.92% | 5 | 83.33% |
Thomas Gleixner | 1 | 0.08% | 1 | 16.67% |
Total | 1212 | 6 |
// SPDX-License-Identifier: GPL-2.0-only /* * KUnit tests for management frame acceptance * * Copyright (C) 2023 Intel Corporation */ #include <kunit/test.h> #include <kunit/skbuff.h> #include "../ieee80211_i.h" #include "../sta_info.h" MODULE_IMPORT_NS(EXPORTED_FOR_KUNIT_TESTING); static const struct mfp_test_case { const char *desc; bool sta, mfp, decrypted, unicast, assoc; u8 category; u8 stype; u8 action; ieee80211_rx_result result; } accept_mfp_cases[] = { /* regular public action */ { .desc = "public action: accept unicast from unknown peer", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PUBLIC, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = true, .result = RX_CONTINUE, }, { .desc = "public action: accept multicast from unknown peer", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PUBLIC, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = false, .result = RX_CONTINUE, }, { .desc = "public action: accept unicast without MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PUBLIC, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = true, .sta = true, .result = RX_CONTINUE, }, { .desc = "public action: accept multicast without MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PUBLIC, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = false, .sta = true, .result = RX_CONTINUE, }, { .desc = "public action: drop unicast with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PUBLIC, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = true, .sta = true, .mfp = true, .result = RX_DROP_U_UNPROT_UNICAST_PUB_ACTION, }, { .desc = "public action: accept multicast with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PUBLIC, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = false, .sta = true, .mfp = true, .result = RX_CONTINUE, }, /* protected dual of public action */ { .desc = "protected dual: drop unicast from unknown peer", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = true, .result = RX_DROP_U_UNPROT_DUAL, }, { .desc = "protected dual: drop multicast from unknown peer", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = false, .result = RX_DROP_U_UNPROT_DUAL, }, { .desc = "protected dual: drop unicast without MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = true, .sta = true, .result = RX_DROP_U_UNPROT_DUAL, }, { .desc = "protected dual: drop multicast without MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = false, .sta = true, .result = RX_DROP_U_UNPROT_DUAL, }, { .desc = "protected dual: drop undecrypted unicast with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = true, .sta = true, .mfp = true, .result = RX_DROP_U_UNPROT_DUAL, }, { .desc = "protected dual: drop undecrypted multicast with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .unicast = false, .sta = true, .mfp = true, .result = RX_DROP_U_UNPROT_DUAL, }, { .desc = "protected dual: accept unicast with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .decrypted = true, .unicast = true, .sta = true, .mfp = true, .result = RX_CONTINUE, }, { .desc = "protected dual: accept multicast with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_PROTECTED_DUAL_OF_ACTION, .action = WLAN_PUB_ACTION_DSE_ENABLEMENT, .decrypted = true, .unicast = false, .sta = true, .mfp = true, .result = RX_CONTINUE, }, /* deauth/disassoc before keys are set */ { .desc = "deauth: accept unicast with MFP but w/o key", .stype = IEEE80211_STYPE_DEAUTH, .sta = true, .mfp = true, .unicast = true, .result = RX_CONTINUE, }, { .desc = "disassoc: accept unicast with MFP but w/o key", .stype = IEEE80211_STYPE_DEAUTH, .sta = true, .mfp = true, .unicast = true, .result = RX_CONTINUE, }, /* non-public robust action frame ... */ { .desc = "BA action: drop unicast before assoc", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_BACK, .unicast = true, .sta = true, .result = RX_DROP_U_UNPROT_ROBUST_ACTION, }, { .desc = "BA action: drop unprotected after assoc", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_BACK, .unicast = true, .sta = true, .mfp = true, .result = RX_DROP_U_UNPROT_UCAST_MGMT, }, { .desc = "BA action: accept unprotected without MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_BACK, .unicast = true, .sta = true, .assoc = true, .mfp = false, .result = RX_CONTINUE, }, { .desc = "BA action: drop unprotected with MFP", .stype = IEEE80211_STYPE_ACTION, .category = WLAN_CATEGORY_BACK, .unicast = true, .sta = true, .mfp = true, .result = RX_DROP_U_UNPROT_UCAST_MGMT, }, }; KUNIT_ARRAY_PARAM_DESC(accept_mfp, accept_mfp_cases, desc); static void accept_mfp(struct kunit *test) { static struct sta_info sta; const struct mfp_test_case *params = test->param_value; struct ieee80211_rx_data rx = { .sta = params->sta ? &sta : NULL, }; struct ieee80211_rx_status *status; struct ieee80211_hdr_3addr hdr = { .frame_control = cpu_to_le16(IEEE80211_FTYPE_MGMT | params->stype), .addr1 = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }, .addr2 = { 0x12, 0x22, 0x33, 0x44, 0x55, 0x66 }, /* A3/BSSID doesn't matter here */ }; memset(&sta, 0, sizeof(sta)); if (!params->sta) { KUNIT_ASSERT_FALSE(test, params->mfp); KUNIT_ASSERT_FALSE(test, params->decrypted); } if (params->mfp) set_sta_flag(&sta, WLAN_STA_MFP); if (params->assoc) set_bit(WLAN_STA_ASSOC, &sta._flags); rx.skb = kunit_zalloc_skb(test, 128, GFP_KERNEL); KUNIT_ASSERT_NOT_NULL(test, rx.skb); status = IEEE80211_SKB_RXCB(rx.skb); if (params->decrypted) { status->flag |= RX_FLAG_DECRYPTED; if (params->unicast) hdr.frame_control |= cpu_to_le16(IEEE80211_FCTL_PROTECTED); } if (params->unicast) hdr.addr1[0] = 0x02; skb_put_data(rx.skb, &hdr, sizeof(hdr)); switch (params->stype) { case IEEE80211_STYPE_ACTION: skb_put_u8(rx.skb, params->category); skb_put_u8(rx.skb, params->action); break; case IEEE80211_STYPE_DEAUTH: case IEEE80211_STYPE_DISASSOC: { __le16 reason = cpu_to_le16(WLAN_REASON_UNSPECIFIED); skb_put_data(rx.skb, &reason, sizeof(reason)); } break; } KUNIT_EXPECT_EQ(test, (__force u32)ieee80211_drop_unencrypted_mgmt(&rx), (__force u32)params->result); } static struct kunit_case mfp_test_cases[] = { KUNIT_CASE_PARAM(accept_mfp, accept_mfp_gen_params), {} }; static struct kunit_suite mfp = { .name = "mac80211-mfp", .test_cases = mfp_test_cases, }; kunit_test_suite(mfp);
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1