Skip to content

Commit 2f4e099

Browse files
author
Mika Leppänen
committed
Removed temporary KW functions and corrected ut and style
1 parent 6481549 commit 2f4e099

File tree

7 files changed

+75
-100
lines changed

7 files changed

+75
-100
lines changed

source/Security/protocols/fwh_sec_prot/supp_fwh_sec_prot.c

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -499,8 +499,7 @@ static int8_t supp_fwh_kde_handle(sec_prot_t *prot)
499499
}
500500

501501
switch (data->recv_msg) {
502-
case FWH_MESSAGE_1:
503-
{
502+
case FWH_MESSAGE_1: {
504503
uint8_t recv_pmkid[PMKID_LEN];
505504
uint8_t calc_pmkid[PMKID_LEN];
506505
if (kde_pmkid_read(kde, kde_len, recv_pmkid) < 0) {
@@ -512,8 +511,8 @@ static int8_t supp_fwh_kde_handle(sec_prot_t *prot)
512511
if (memcmp(recv_pmkid, calc_pmkid, PMKID_LEN) != 0) {
513512
goto error;
514513
}
515-
}
516-
break;
514+
}
515+
break;
517516

518517
case FWH_MESSAGE_3:
519518
// If a valid new GTK value present, insert it

source/Security/protocols/gkh_sec_prot/auth_gkh_sec_prot.c

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -201,8 +201,7 @@ static int8_t auth_gkh_sec_prot_message_send(sec_prot_t *prot, gkh_sec_prot_msg_
201201
uint8_t *kde_end = kde_start;
202202

203203
switch (msg) {
204-
case GKH_MESSAGE_1:
205-
{
204+
case GKH_MESSAGE_1: {
206205
int8_t gtk_set_index = prot->sec_keys->gtk_set_index;
207206
sec_prot_gtk_keys_t *gtks = prot->sec_keys->gtks;
208207
if (gtk_set_index >= 0 && gtks->gtk[gtk_set_index].set && gtks->gtk[gtk_set_index].live) {
@@ -211,8 +210,8 @@ static int8_t auth_gkh_sec_prot_message_send(sec_prot_t *prot, gkh_sec_prot_msg_
211210
kde_end = kde_lifetime_write(kde_end, GTK_DEFAULT_LIFETIME);
212211
kde_end = kde_gtkl_write(kde_end, gtks->gtk[0].live, gtks->gtk[1].live, gtks->gtk[2].live, gtks->gtk[3].live);
213212
kde_padding_write(kde_end, kde_start + kde_len);
214-
}
215-
break;
213+
}
214+
break;
216215
default:
217216
break;
218217
}

source/Security/protocols/gkh_sec_prot/supp_gkh_sec_prot.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -310,7 +310,7 @@ static int8_t supp_gkh_kde_handle(sec_prot_t *prot)
310310
if (ret < 0 || prot->sec_keys->gtk_set_index < 0) {
311311
return -1;
312312
} else {
313-
return 0;
313+
return 0;
314314
}
315315
}
316316

source/Security/protocols/sec_prot_lib.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -364,7 +364,7 @@ int8_t sec_prot_lib_gtk_read(uint8_t *kde, uint16_t kde_len, sec_prot_gtk_keys_t
364364
*gtk_set_index = key_id; // Insert
365365
}
366366
uint32_t lifetime;
367-
if (kde_lifetime_read(kde, kde_len, &lifetime) >=0 ) {
367+
if (kde_lifetime_read(kde, kde_len, &lifetime) >= 0) {
368368
if (gtks->gtk[key_id].set) {
369369
gtks->gtk[key_id].lifetime = lifetime;
370370
}

source/Service_Libs/nist_aes_kw/nist_aes_kw.c

Lines changed: 1 addition & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
#include "mbedtls/nist_kw.h"
2424
#include "Service_Libs/nist_aes_kw/nist_aes_kw.h"
2525

26-
#ifdef HAVE_WS
26+
#if defined(HAVE_WS) && (defined(HAVE_PAE_SUPP) || defined(HAVE_PAE_AUTH))
2727

2828
#define TRACE_GROUP "naes"
2929

@@ -99,58 +99,4 @@ int8_t nist_aes_key_wrap(uint8_t is_wrap, const uint8_t *key, int16_t key_bits,
9999
return ret_val;
100100
}
101101

102-
#if !defined(MBEDTLS_NIST_KW_C)
103-
104-
// Temporal implementation until MBEDTLS_NIST_KW_C is enabled on all platforms
105-
106-
void mbedtls_nist_kw_init(mbedtls_nist_kw_context *ctx)
107-
{
108-
(void) ctx;
109-
}
110-
111-
int mbedtls_nist_kw_setkey(mbedtls_nist_kw_context *ctx,
112-
mbedtls_cipher_id_t cipher,
113-
const unsigned char *key,
114-
unsigned int keybits,
115-
const int is_wrap)
116-
{
117-
(void) ctx;
118-
(void) cipher;
119-
(void) key;
120-
(void) keybits;
121-
(void) is_wrap;
122-
return 0;
123-
}
124-
125-
int mbedtls_nist_kw_wrap(mbedtls_nist_kw_context *ctx, mbedtls_nist_kw_mode_t mode,
126-
const unsigned char *input, size_t in_len,
127-
unsigned char *output, size_t *out_len, size_t out_size)
128-
{
129-
(void) ctx;
130-
(void) mode;
131-
memset(output, 0, out_size);
132-
memcpy(output, input, in_len);
133-
*out_len = in_len + 8;
134-
return 0;
135-
}
136-
137-
int mbedtls_nist_kw_unwrap(mbedtls_nist_kw_context *ctx, mbedtls_nist_kw_mode_t mode,
138-
const unsigned char *input, size_t in_len,
139-
unsigned char *output, size_t *out_len, size_t out_size)
140-
{
141-
(void) ctx;
142-
(void) mode;
143-
*out_len = in_len - 8;
144-
memset(output, 0, out_size);
145-
memcpy(output, input, *out_len);
146-
return 0;
147-
}
148-
149-
void mbedtls_nist_kw_free(mbedtls_nist_kw_context *ctx)
150-
{
151-
(void) ctx;
152-
}
153-
154-
#endif
155-
156102
#endif

test/nanostack/unittest/service_libs/nist_aes_kw/test_nist_aes_kw.c

Lines changed: 65 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@
2525
#include "mbedtls_stub.h"
2626
#include "test_nist_aes_kw.h"
2727

28+
#if defined(HAVE_WS) && (defined(HAVE_PAE_SUPP) || defined(HAVE_PAE_AUTH))
29+
2830
static const uint8_t key[] = {"1234567890123456"};
2931
static const uint8_t key_len = sizeof(key) - 1;
3032

@@ -66,28 +68,28 @@ bool test_nist_aes_key_wrap_1()
6668
return false;
6769
}
6870
if (mbedtls_stub.kw.keybits != 128) {
69-
return false;
71+
return false;
7072
}
7173
if (mbedtls_stub.kw.is_wrap != 1) {
72-
return false;
74+
return false;
7375
}
7476
if (!mbedtls_stub.kw.wrap_called) {
7577
return false;
7678
}
77-
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW ) {
78-
return false;
79+
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW) {
80+
return false;
7981
}
8082
if (memcmp(mbedtls_stub.kw.input, data, data_len) != 0) {
81-
return false;
83+
return false;
8284
}
8385
if (mbedtls_stub.kw.in_len != data_len) {
84-
return false;
86+
return false;
8587
}
8688
if (mbedtls_stub.kw.out_len != out_len) {
87-
return false;
89+
return false;
8890
}
8991
if (mbedtls_stub.kw.out_size != out_len) {
90-
return false;
92+
return false;
9193
}
9294
if (mbedtls_stub.kw.free_ctx == 0) {
9395
return false;
@@ -127,28 +129,28 @@ bool test_nist_aes_key_wrap_2()
127129
return false;
128130
}
129131
if (mbedtls_stub.kw.keybits != 128) {
130-
return false;
132+
return false;
131133
}
132134
if (mbedtls_stub.kw.is_wrap != 0) {
133-
return false;
135+
return false;
134136
}
135137
if (!mbedtls_stub.kw.unwrap_called) {
136138
return false;
137139
}
138-
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW ) {
139-
return false;
140+
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW) {
141+
return false;
140142
}
141143
if (memcmp(mbedtls_stub.kw.input, data, data_len) != 0) {
142-
return false;
144+
return false;
143145
}
144146
if (mbedtls_stub.kw.in_len != data_len) {
145-
return false;
147+
return false;
146148
}
147149
if (mbedtls_stub.kw.out_len != out_len) {
148-
return false;
150+
return false;
149151
}
150152
if (mbedtls_stub.kw.out_size != out_len) {
151-
return false;
153+
return false;
152154
}
153155
if (mbedtls_stub.kw.free_ctx == 0) {
154156
return false;
@@ -185,10 +187,10 @@ bool test_nist_aes_key_wrap_3()
185187
return false;
186188
}
187189
if (mbedtls_stub.kw.keybits != 128) {
188-
return false;
190+
return false;
189191
}
190192
if (mbedtls_stub.kw.is_wrap != 1) {
191-
return false;
193+
return false;
192194
}
193195
if (mbedtls_stub.kw.wrap_called || mbedtls_stub.kw.unwrap_called) {
194196
return false;
@@ -231,28 +233,28 @@ bool test_nist_aes_key_wrap_4()
231233
return false;
232234
}
233235
if (mbedtls_stub.kw.keybits != 128) {
234-
return false;
236+
return false;
235237
}
236238
if (mbedtls_stub.kw.is_wrap != 1) {
237-
return false;
239+
return false;
238240
}
239241
if (!mbedtls_stub.kw.wrap_called) {
240242
return false;
241243
}
242-
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW ) {
243-
return false;
244+
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW) {
245+
return false;
244246
}
245247
if (memcmp(mbedtls_stub.kw.input, data, data_len) != 0) {
246-
return false;
248+
return false;
247249
}
248250
if (mbedtls_stub.kw.in_len != data_len) {
249-
return false;
251+
return false;
250252
}
251253
if (mbedtls_stub.kw.out_len != out_len) {
252-
return false;
254+
return false;
253255
}
254256
if (mbedtls_stub.kw.out_size != out_len) {
255-
return false;
257+
return false;
256258
}
257259
if (mbedtls_stub.kw.free_ctx == 0) {
258260
return false;
@@ -292,31 +294,60 @@ bool test_nist_aes_key_wrap_5()
292294
return false;
293295
}
294296
if (mbedtls_stub.kw.keybits != 128) {
295-
return false;
297+
return false;
296298
}
297299
if (mbedtls_stub.kw.is_wrap != 0) {
298-
return false;
300+
return false;
299301
}
300302
if (!mbedtls_stub.kw.unwrap_called) {
301303
return false;
302304
}
303-
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW ) {
304-
return false;
305+
if (mbedtls_stub.kw.mode != MBEDTLS_KW_MODE_KW) {
306+
return false;
305307
}
306308
if (memcmp(mbedtls_stub.kw.input, data, data_len) != 0) {
307-
return false;
309+
return false;
308310
}
309311
if (mbedtls_stub.kw.in_len != data_len) {
310-
return false;
312+
return false;
311313
}
312314
if (mbedtls_stub.kw.out_len != out_len) {
313-
return false;
315+
return false;
314316
}
315317
if (mbedtls_stub.kw.out_size != out_len) {
316-
return false;
318+
return false;
317319
}
318320
if (mbedtls_stub.kw.free_ctx == 0) {
319321
return false;
320322
}
321323
return true;
322324
}
325+
326+
#else
327+
328+
bool test_nist_aes_key_wrap_1()
329+
{
330+
return true;
331+
}
332+
333+
bool test_nist_aes_key_wrap_2()
334+
{
335+
return true;
336+
}
337+
338+
bool test_nist_aes_key_wrap_3()
339+
{
340+
return true;
341+
}
342+
343+
bool test_nist_aes_key_wrap_4()
344+
{
345+
return true;
346+
}
347+
348+
bool test_nist_aes_key_wrap_5()
349+
{
350+
return true;
351+
}
352+
353+
#endif

test/nanostack/unittest/stub/mbedtls_stub.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ void mbedtls_nist_kw_init(mbedtls_nist_kw_context *ctx)
403403
mbedtls_stub.kw.ctx = ctx;
404404
}
405405

406-
int mbedtls_nist_kw_setkey(mbedtls_nist_kw_context *ctx, mbedtls_cipher_id_t cipher, const unsigned char *key, unsigned int keybits, const int is_wrap )
406+
int mbedtls_nist_kw_setkey(mbedtls_nist_kw_context *ctx, mbedtls_cipher_id_t cipher, const unsigned char *key, unsigned int keybits, const int is_wrap)
407407
{
408408
if (mbedtls_stub.kw.ctx == ctx) {
409409
mbedtls_stub.kw.cipher = cipher;

0 commit comments

Comments
 (0)