Browse Source

tests: Set PMK length in eapol-fuzzer

Commit b488a12948751f57871f09baa345e59b23959a41 ('Clear PMK length and
check for this when deriving PTK') started rejecting PTK derivation
based on PMK length. This reduced coverage from the eapol-fuzzer, so set
the default length when initializing the state machine in the fuzzer to
reach the previously used code paths.

Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen 7 years ago
parent
commit
7a27e5e03e
1 changed files with 5 additions and 1 deletions
  1. 5 1
      tests/eapol-fuzzer/eapol-fuzzer.c

+ 5 - 1
tests/eapol-fuzzer/eapol-fuzzer.c

@@ -12,6 +12,7 @@
 #include "utils/eloop.h"
 #include "eapol_supp/eapol_supp_sm.h"
 #include "rsn_supp/wpa.h"
+#include "rsn_supp/wpa_i.h"
 
 
 struct arg_ctx {
@@ -142,7 +143,10 @@ static int init_wpa(struct arg_ctx *arg)
 	ctx->get_bssid = get_bssid;
 
 	arg->wpa = wpa_sm_init(ctx);
-	return arg->wpa ? 0 : -1;
+	if (!arg->wpa)
+		return -1;
+	arg->wpa->pmk_len = PMK_LEN;
+	return 0;
 }