From 867f1c466d3f31cd3254969a0f4c31a002a33620 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sat, 1 Jun 2019 17:00:21 +0300 Subject: [PATCH] tests: Fix test-eapol fuzzing tool Update the tool to use the current API for WPA authenticator functions. Signed-off-by: Jouni Malinen --- tests/test-eapol.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tests/test-eapol.c b/tests/test-eapol.c index 57f2118e2..0dd65e489 100644 --- a/tests/test-eapol.c +++ b/tests/test-eapol.c @@ -396,12 +396,14 @@ static int auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, static const u8 * auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, - size_t *psk_len) + size_t *psk_len, int *vlan_id) { struct wpa *wpa = ctx; wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", __func__, MAC2STR(addr), prev_psk); + if (vlan_id) + *vlan_id = 0; if (psk_len) *psk_len = PMK_LEN; if (prev_psk) @@ -501,7 +503,7 @@ static int auth_init(struct wpa *wpa) return -1; } - if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, wpa->supp_ie, + if (wpa_validate_wpa_ie(wpa->auth_group, wpa->auth, 2412, wpa->supp_ie, wpa->supp_ie_len, NULL, 0, NULL, 0) != WPA_IE_OK) { wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed"); -- 2.39.2