3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-12-22 13:02:44 +01:00

unit: Tweak style

This commit is contained in:
Denis Kenzior 2016-12-14 23:09:55 -06:00
parent aca4641fad
commit 3d4da25b6c

View File

@ -36,46 +36,53 @@
/* https://tools.ietf.org/html/rfc2759 */ /* https://tools.ietf.org/html/rfc2759 */
const char *user = "User"; const char *user = "User";
const char *nt_password = "clientPass"; const char *nt_password = "clientPass";
const uint8_t password_hash[] = const uint8_t password_hash[] = {
{ 0x44, 0xEB, 0xBA, 0x8D, 0x44, 0xEB, 0xBA, 0x8D,
0x53, 0x12, 0xB8, 0xD6, 0x53, 0x12, 0xB8, 0xD6,
0x11, 0x47, 0x44, 0x11, 0x11, 0x47, 0x44, 0x11,
0xF5, 0x69, 0x89, 0xAE}; 0xF5, 0x69, 0x89, 0xAE
const uint8_t server_challenge[] = };
{ 0x5B, 0x5D, 0x7C, 0x7D, const uint8_t server_challenge[] = {
0x5B, 0x5D, 0x7C, 0x7D,
0x7B, 0x3F, 0x2F, 0x3E, 0x7B, 0x3F, 0x2F, 0x3E,
0x3C, 0x2C, 0x60, 0x21, 0x3C, 0x2C, 0x60, 0x21,
0x32, 0x26, 0x26, 0x28}; 0x32, 0x26, 0x26, 0x28
const uint8_t peer_challenge[] = };
{ 0x21, 0x40, 0x23, 0x24, const uint8_t peer_challenge[] = {
0x21, 0x40, 0x23, 0x24,
0x25, 0x5E, 0x26, 0x2A, 0x25, 0x5E, 0x26, 0x2A,
0x28, 0x29, 0x5F, 0x2B, 0x28, 0x29, 0x5F, 0x2B,
0x3A, 0x33, 0x7C, 0x7E}; 0x3A, 0x33, 0x7C, 0x7E
const uint8_t nt_response[] = };
{ 0x82, 0x30, 0x9E, 0xCD, const uint8_t nt_response[] = {
0x82, 0x30, 0x9E, 0xCD,
0x8D, 0x70, 0x8B, 0x5E, 0x8D, 0x70, 0x8B, 0x5E,
0xA0, 0x8F, 0xAA, 0x39, 0xA0, 0x8F, 0xAA, 0x39,
0x81, 0xCD, 0x83, 0x54, 0x81, 0xCD, 0x83, 0x54,
0x42, 0x33, 0x11, 0x4A, 0x42, 0x33, 0x11, 0x4A,
0x3D, 0x85, 0xD6, 0xDF}; 0x3D, 0x85, 0xD6, 0xDF
const uint8_t password_hash_hash[] = };
{ 0x41, 0xC0, 0x0C, 0x58, const uint8_t password_hash_hash[] = {
0x41, 0xC0, 0x0C, 0x58,
0x4B, 0xD2, 0xD9, 0x1C, 0x4B, 0xD2, 0xD9, 0x1C,
0x40, 0x17, 0xA2, 0xA1, 0x40, 0x17, 0xA2, 0xA1,
0x2F, 0xA5, 0x9F, 0x3F}; 0x2F, 0xA5, 0x9F, 0x3F
};
const char *authenticator_response = const char *authenticator_response =
"S=407A5589115FD0D6209F510FE9C04566932CDA56"; "S=407A5589115FD0D6209F510FE9C04566932CDA56";
/* https://tools.ietf.org/html/draft-ietf-pppext-mschapv2-keys-02 */ /* https://tools.ietf.org/html/draft-ietf-pppext-mschapv2-keys-02 */
const uint8_t master_key[] = const uint8_t master_key[] = {
{ 0xFD, 0xEC, 0xE3, 0x71, 0xFD, 0xEC, 0xE3, 0x71,
0x7A, 0x8C, 0x83, 0x8C, 0x7A, 0x8C, 0x83, 0x8C,
0xB3, 0x88, 0xE5, 0x27, 0xB3, 0x88, 0xE5, 0x27,
0xAE, 0x3C, 0xDD, 0x31}; 0xAE, 0x3C, 0xDD, 0x31
const uint8_t m_session_key[] = };
{ 0x8B, 0x7C, 0xDC, 0x14, const uint8_t m_session_key[] = {
0x8B, 0x7C, 0xDC, 0x14,
0x9B, 0x99, 0x3A, 0x1B, 0x9B, 0x99, 0x3A, 0x1B,
0xA1, 0x18, 0xCB, 0x15, 0xA1, 0x18, 0xCB, 0x15,
0x3F, 0x56, 0xDC, 0xCB}; 0x3F, 0x56, 0xDC, 0xCB
};
static void test_nt_password_hash(const void *data) static void test_nt_password_hash(const void *data)
{ {