tests/fuzzing: Update WPA set_key() handler prototype

Update the fizzing test tools to use the new set_key() prototype, i.e.,
add the new key_flag argument, to get rid of compiler warnings.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2020-02-25 13:13:06 +02:00
parent e55dedbf6e
commit 5f11739d58
2 changed files with 7 additions and 6 deletions

View file

@ -169,12 +169,13 @@ static void supp_eapol_key_request(void *eloop_data, void *user_ctx)
static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg,
const u8 *addr, int idx, u8 *key,
size_t key_len)
size_t key_len, enum key_flag key_flag)
{
struct wpa *wpa = ctx;
wpa_printf(MSG_DEBUG, "AUTH: %s (vlan_id=%d alg=%d idx=%d key_len=%d)",
__func__, vlan_id, alg, idx, (int) key_len);
wpa_printf(MSG_DEBUG,
"AUTH: %s (vlan_id=%d alg=%d idx=%d key_len=%d key_flag=0x%x)",
__func__, vlan_id, alg, idx, (int) key_len, key_flag);
if (addr)
wpa_printf(MSG_DEBUG, "AUTH: addr=" MACSTR, MAC2STR(addr));

View file

@ -175,11 +175,11 @@ static int supp_get_beacon_ie(void *ctx)
static int supp_set_key(void *ctx, enum wpa_alg alg,
const u8 *addr, int key_idx, int set_tx,
const u8 *seq, size_t seq_len,
const u8 *key, size_t key_len)
const u8 *key, size_t key_len, enum key_flag key_flag)
{
wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
"set_tx=%d)",
__func__, alg, MAC2STR(addr), key_idx, set_tx);
"set_tx=%d key_flag=0x%x)",
__func__, alg, MAC2STR(addr), key_idx, set_tx, key_flag);
wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
wpa_hexdump(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
return 0;