wlantest: Remove unnecessary duplication of tk_len from STA entries
The length of the TK is available within struct wpa_ptk, so there is no need to try to maintain it separately in wlantest. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
		
							parent
							
								
									1d624a0702
								
							
						
					
					
						commit
						5420bcf477
					
				
					 3 changed files with 2 additions and 4 deletions
				
			
		|  | @ -426,7 +426,7 @@ skip_replay_det: | ||||||
| 			decrypted = ccmp_256_decrypt(tk, hdr, data, len, &dlen); | 			decrypted = ccmp_256_decrypt(tk, hdr, data, len, &dlen); | ||||||
| 		else if (sta->pairwise_cipher == WPA_CIPHER_GCMP || | 		else if (sta->pairwise_cipher == WPA_CIPHER_GCMP || | ||||||
| 			 sta->pairwise_cipher == WPA_CIPHER_GCMP_256) | 			 sta->pairwise_cipher == WPA_CIPHER_GCMP_256) | ||||||
| 			decrypted = gcmp_decrypt(tk, sta->tk_len, hdr, data, | 			decrypted = gcmp_decrypt(tk, sta->ptk.tk_len, hdr, data, | ||||||
| 						 len, &dlen); | 						 len, &dlen); | ||||||
| 		else | 		else | ||||||
| 			decrypted = ccmp_decrypt(tk, hdr, data, len, &dlen); | 			decrypted = ccmp_decrypt(tk, hdr, data, len, &dlen); | ||||||
|  | @ -440,7 +440,7 @@ skip_replay_det: | ||||||
| 						     len, &dlen); | 						     len, &dlen); | ||||||
| 		else if (sta->pairwise_cipher == WPA_CIPHER_GCMP || | 		else if (sta->pairwise_cipher == WPA_CIPHER_GCMP || | ||||||
| 			 sta->pairwise_cipher == WPA_CIPHER_GCMP_256) | 			 sta->pairwise_cipher == WPA_CIPHER_GCMP_256) | ||||||
| 			decrypted = gcmp_decrypt(sta->ptk.tk, sta->tk_len, | 			decrypted = gcmp_decrypt(sta->ptk.tk, sta->ptk.tk_len, | ||||||
| 						 hdr, data, len, &dlen); | 						 hdr, data, len, &dlen); | ||||||
| 		else | 		else | ||||||
| 			decrypted = ccmp_decrypt(sta->ptk.tk, hdr, data, len, | 			decrypted = ccmp_decrypt(sta->ptk.tk, hdr, data, len, | ||||||
|  |  | ||||||
|  | @ -136,7 +136,6 @@ static int try_pmk(struct wlantest *wt, struct wlantest_bss *bss, | ||||||
| 		return -1; | 		return -1; | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	sta->tk_len = wpa_cipher_key_len(sta->pairwise_cipher); |  | ||||||
| 	wpa_printf(MSG_INFO, "Derived PTK for STA " MACSTR " BSSID " MACSTR, | 	wpa_printf(MSG_INFO, "Derived PTK for STA " MACSTR " BSSID " MACSTR, | ||||||
| 		   MAC2STR(sta->addr), MAC2STR(bss->bssid)); | 		   MAC2STR(sta->addr), MAC2STR(bss->bssid)); | ||||||
| 	sta->counters[WLANTEST_STA_COUNTER_PTK_LEARNED]++; | 	sta->counters[WLANTEST_STA_COUNTER_PTK_LEARNED]++; | ||||||
|  |  | ||||||
|  | @ -72,7 +72,6 @@ struct wlantest_sta { | ||||||
| 	u8 anonce[32]; /* ANonce from the previous EAPOL-Key msg 1/4 or 3/4 */ | 	u8 anonce[32]; /* ANonce from the previous EAPOL-Key msg 1/4 or 3/4 */ | ||||||
| 	u8 snonce[32]; /* SNonce from the previous EAPOL-Key msg 2/4 */ | 	u8 snonce[32]; /* SNonce from the previous EAPOL-Key msg 2/4 */ | ||||||
| 	struct wpa_ptk ptk; /* Derived PTK */ | 	struct wpa_ptk ptk; /* Derived PTK */ | ||||||
| 	size_t tk_len; |  | ||||||
| 	int ptk_set; | 	int ptk_set; | ||||||
| 	struct wpa_ptk tptk; /* Derived PTK during rekeying */ | 	struct wpa_ptk tptk; /* Derived PTK during rekeying */ | ||||||
| 	int tptk_set; | 	int tptk_set; | ||||||
|  |  | ||||||
		Loading…
	
		Reference in a new issue
	
	 Jouni Malinen
						Jouni Malinen