tests: Set PMK length in eapol-fuzzer

Commit b488a12948 ('Clear PMK length and
check for this when deriving PTK') started rejecting PTK derivation
based on PMK length. This reduced coverage from the eapol-fuzzer, so set
the default length when initializing the state machine in the fuzzer to
reach the previously used code paths.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2017-12-27 12:27:33 +02:00
parent 2d0a04a86c
commit 7a27e5e03e

View file

@ -12,6 +12,7 @@
#include "utils/eloop.h"
#include "eapol_supp/eapol_supp_sm.h"
#include "rsn_supp/wpa.h"
#include "rsn_supp/wpa_i.h"
struct arg_ctx {
@ -142,7 +143,10 @@ static int init_wpa(struct arg_ctx *arg)
ctx->get_bssid = get_bssid;
arg->wpa = wpa_sm_init(ctx);
return arg->wpa ? 0 : -1;
if (!arg->wpa)
return -1;
arg->wpa->pmk_len = PMK_LEN;
return 0;
}