tests: Fix test-eapol fuzzing tool
Update the tool to use the current API for WPA authenticator functions. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
1006c4be2d
commit
867f1c466d
1 changed files with 4 additions and 2 deletions
|
@ -396,12 +396,14 @@ static int auth_send_eapol(void *ctx, const u8 *addr, const u8 *data,
|
||||||
|
|
||||||
static const u8 * auth_get_psk(void *ctx, const u8 *addr,
|
static const u8 * auth_get_psk(void *ctx, const u8 *addr,
|
||||||
const u8 *p2p_dev_addr, const u8 *prev_psk,
|
const u8 *p2p_dev_addr, const u8 *prev_psk,
|
||||||
size_t *psk_len)
|
size_t *psk_len, int *vlan_id)
|
||||||
{
|
{
|
||||||
struct wpa *wpa = ctx;
|
struct wpa *wpa = ctx;
|
||||||
|
|
||||||
wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
||||||
__func__, MAC2STR(addr), prev_psk);
|
__func__, MAC2STR(addr), prev_psk);
|
||||||
|
if (vlan_id)
|
||||||
|
*vlan_id = 0;
|
||||||
if (psk_len)
|
if (psk_len)
|
||||||
*psk_len = PMK_LEN;
|
*psk_len = PMK_LEN;
|
||||||
if (prev_psk)
|
if (prev_psk)
|
||||||
|
@ -501,7 +503,7 @@ static int auth_init(struct wpa *wpa)
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, wpa->supp_ie,
|
if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, 2412, wpa->supp_ie,
|
||||||
wpa->supp_ie_len, NULL, 0, NULL, 0) !=
|
wpa->supp_ie_len, NULL, 0, NULL, 0) !=
|
||||||
WPA_IE_OK) {
|
WPA_IE_OK) {
|
||||||
wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed");
|
wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed");
|
||||||
|
|
Loading…
Reference in a new issue