mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-26 02:19:26 +01:00
unit: Handle key_replay_counter as a uint64_t
This commit is contained in:
parent
005fc0c0d1
commit
11de45fa4d
@ -58,7 +58,7 @@ struct eapol_key_data {
|
|||||||
bool encrypted_key_data:1;
|
bool encrypted_key_data:1;
|
||||||
bool smk_message:1;
|
bool smk_message:1;
|
||||||
uint16_t key_length;
|
uint16_t key_length;
|
||||||
uint8_t key_replay_counter[8];
|
uint64_t key_replay_counter;
|
||||||
uint8_t key_nonce[32];
|
uint8_t key_nonce[32];
|
||||||
uint8_t eapol_key_iv[16];
|
uint8_t eapol_key_iv[16];
|
||||||
uint8_t key_rsc[8];
|
uint8_t key_rsc[8];
|
||||||
@ -96,8 +96,7 @@ static struct eapol_key_data eapol_key_test_1 = {
|
|||||||
.encrypted_key_data = false,
|
.encrypted_key_data = false,
|
||||||
.smk_message = false,
|
.smk_message = false,
|
||||||
.key_length = 32,
|
.key_length = 32,
|
||||||
.key_replay_counter =
|
.key_replay_counter = 1,
|
||||||
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 },
|
|
||||||
.key_nonce = { 0xd5, 0xe2, 0x13, 0x9b, 0x1b, 0x1c, 0x1e, 0xcb, 0xf4,
|
.key_nonce = { 0xd5, 0xe2, 0x13, 0x9b, 0x1b, 0x1c, 0x1e, 0xcb, 0xf4,
|
||||||
0xc7, 0x9d, 0xb3, 0x70, 0xcd, 0x1c, 0xea, 0x07, 0xf1,
|
0xc7, 0x9d, 0xb3, 0x70, 0xcd, 0x1c, 0xea, 0x07, 0xf1,
|
||||||
0x61, 0x76, 0xed, 0xa6, 0x78, 0x8a, 0xc6, 0x8c, 0x2c,
|
0x61, 0x76, 0xed, 0xa6, 0x78, 0x8a, 0xc6, 0x8c, 0x2c,
|
||||||
@ -142,8 +141,7 @@ static struct eapol_key_data eapol_key_test_2 = {
|
|||||||
.encrypted_key_data = false,
|
.encrypted_key_data = false,
|
||||||
.smk_message = false,
|
.smk_message = false,
|
||||||
.key_length = 16,
|
.key_length = 16,
|
||||||
.key_replay_counter =
|
.key_replay_counter = 0,
|
||||||
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
||||||
.key_nonce = { 0x12, 0x6a, 0xce, 0x64, 0xc1, 0xa6, 0x44, 0xd2, 0x7b,
|
.key_nonce = { 0x12, 0x6a, 0xce, 0x64, 0xc1, 0xa6, 0x44, 0xd2, 0x7b,
|
||||||
0x84, 0xe0, 0x39, 0x26, 0x3b, 0x63, 0x3b, 0xc3, 0x74,
|
0x84, 0xe0, 0x39, 0x26, 0x3b, 0x63, 0x3b, 0xc3, 0x74,
|
||||||
0xe3, 0x29, 0x9d, 0x7d, 0x45, 0xe1, 0xc4, 0x25, 0x44,
|
0xe3, 0x29, 0x9d, 0x7d, 0x45, 0xe1, 0xc4, 0x25, 0x44,
|
||||||
@ -186,8 +184,7 @@ static struct eapol_key_data eapol_key_test_3 = {
|
|||||||
.encrypted_key_data = false,
|
.encrypted_key_data = false,
|
||||||
.smk_message = false,
|
.smk_message = false,
|
||||||
.key_length = 16,
|
.key_length = 16,
|
||||||
.key_replay_counter =
|
.key_replay_counter = 0,
|
||||||
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
||||||
.key_nonce = { 0xc2, 0xbb, 0x57, 0xab, 0x58, 0x8f, 0x92, 0xeb, 0xbd,
|
.key_nonce = { 0xc2, 0xbb, 0x57, 0xab, 0x58, 0x8f, 0x92, 0xeb, 0xbd,
|
||||||
0x44, 0xe8, 0x11, 0x09, 0x4f, 0x60, 0x1c, 0x08, 0x79,
|
0x44, 0xe8, 0x11, 0x09, 0x4f, 0x60, 0x1c, 0x08, 0x79,
|
||||||
0x86, 0x03, 0x0c, 0x3a, 0xc7, 0x49, 0xcc, 0x61, 0xd6,
|
0x86, 0x03, 0x0c, 0x3a, 0xc7, 0x49, 0xcc, 0x61, 0xd6,
|
||||||
@ -232,8 +229,7 @@ static struct eapol_key_data eapol_key_test_4 = {
|
|||||||
.encrypted_key_data = false,
|
.encrypted_key_data = false,
|
||||||
.smk_message = false,
|
.smk_message = false,
|
||||||
.key_length = 0,
|
.key_length = 0,
|
||||||
.key_replay_counter =
|
.key_replay_counter = 0,
|
||||||
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
|
|
||||||
.key_nonce = { 0x32, 0x89, 0xe9, 0x15, 0x65, 0x09, 0x4f, 0x32, 0x9a,
|
.key_nonce = { 0x32, 0x89, 0xe9, 0x15, 0x65, 0x09, 0x4f, 0x32, 0x9a,
|
||||||
0x9c, 0xd5, 0x4a, 0x4a, 0x09, 0x0d, 0x2c, 0xf4, 0x34,
|
0x9c, 0xd5, 0x4a, 0x4a, 0x09, 0x0d, 0x2c, 0xf4, 0x34,
|
||||||
0x46, 0x83, 0xbf, 0x50, 0xef, 0xee, 0x36, 0x08, 0xb6,
|
0x46, 0x83, 0xbf, 0x50, 0xef, 0xee, 0x36, 0x08, 0xb6,
|
||||||
@ -280,8 +276,7 @@ static struct eapol_key_data eapol_key_test_5 = {
|
|||||||
.encrypted_key_data = true,
|
.encrypted_key_data = true,
|
||||||
.smk_message = false,
|
.smk_message = false,
|
||||||
.key_length = 16,
|
.key_length = 16,
|
||||||
.key_replay_counter =
|
.key_replay_counter = 1,
|
||||||
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 },
|
|
||||||
.key_nonce = { 0xc2, 0xbb, 0x57, 0xab, 0x58, 0x8f, 0x92, 0xeb, 0xbd,
|
.key_nonce = { 0xc2, 0xbb, 0x57, 0xab, 0x58, 0x8f, 0x92, 0xeb, 0xbd,
|
||||||
0x44, 0xe8, 0x11, 0x09, 0x4f, 0x60, 0x1c, 0x08, 0x79,
|
0x44, 0xe8, 0x11, 0x09, 0x4f, 0x60, 0x1c, 0x08, 0x79,
|
||||||
0x86, 0x03, 0x0c, 0x3a, 0xc7, 0x49, 0xcc, 0x61, 0xd6,
|
0x86, 0x03, 0x0c, 0x3a, 0xc7, 0x49, 0xcc, 0x61, 0xd6,
|
||||||
@ -324,8 +319,7 @@ static struct eapol_key_data eapol_key_test_6 = {
|
|||||||
.encrypted_key_data = false,
|
.encrypted_key_data = false,
|
||||||
.smk_message = false,
|
.smk_message = false,
|
||||||
.key_length = 0,
|
.key_length = 0,
|
||||||
.key_replay_counter =
|
.key_replay_counter = 1,
|
||||||
{ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 },
|
|
||||||
.key_nonce = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
.key_nonce = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
@ -361,8 +355,8 @@ static void eapol_key_test(const void *data)
|
|||||||
assert(packet->encrypted_key_data == test->encrypted_key_data);
|
assert(packet->encrypted_key_data == test->encrypted_key_data);
|
||||||
assert(packet->smk_message == test->smk_message);
|
assert(packet->smk_message == test->smk_message);
|
||||||
assert(L_BE16_TO_CPU(packet->key_length) == test->key_length);
|
assert(L_BE16_TO_CPU(packet->key_length) == test->key_length);
|
||||||
assert(!memcmp(packet->key_replay_counter, test->key_replay_counter,
|
assert(L_BE64_TO_CPU(packet->key_replay_counter) ==
|
||||||
sizeof(packet->key_replay_counter)));
|
test->key_replay_counter);
|
||||||
assert(!memcmp(packet->key_nonce, test->key_nonce,
|
assert(!memcmp(packet->key_nonce, test->key_nonce,
|
||||||
sizeof(packet->key_nonce)));
|
sizeof(packet->key_nonce)));
|
||||||
assert(!memcmp(packet->eapol_key_iv, test->eapol_key_iv,
|
assert(!memcmp(packet->eapol_key_iv, test->eapol_key_iv,
|
||||||
|
Loading…
Reference in New Issue
Block a user