Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.0/patches/2198447/?format=api
{ "id": 2198447, "url": "http://patchwork.ozlabs.org/api/1.0/patches/2198447/?format=api", "project": { "id": 22, "url": "http://patchwork.ozlabs.org/api/1.0/projects/22/?format=api", "name": "HostAP Development", "link_name": "hostap", "list_id": "hostap.lists.infradead.org", "list_email": "hostap@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260219202514.5781-57-andrei.otcheretianski@intel.com>", "date": "2026-02-19T20:25:12", "name": "[56/58] NAN: Add crypto API tests", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "b5dfdde47b42c9cbd2a7108280124e00f030c635", "submitter": { "id": 62065, "url": "http://patchwork.ozlabs.org/api/1.0/people/62065/?format=api", "name": "Andrei Otcheretianski", "email": "andrei.otcheretianski@intel.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260219202514.5781-57-andrei.otcheretianski@intel.com/mbox/", "series": [ { "id": 492721, "url": "http://patchwork.ozlabs.org/api/1.0/series/492721/?format=api", "date": "2026-02-19T20:24:21", "name": "NAN: Add NAN Data Path (NDP) support", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/492721/mbox/" } ], "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2198447/checks/", "tags": {}, "headers": { "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=SfJa91fh;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256\n header.s=desiato.20200630 header.b=WazWdQpR;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=H1ag4OLc;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fH4kN5MFvz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 20 Feb 2026 07:30:04 +1100 (AEDT)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1vtAeP-0000000C0nm-3P2d;\n\tThu, 19 Feb 2026 20:29:29 +0000", "from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1vtAdO-0000000BzNh-3jeb\n\tfor hostap@bombadil.infradead.org;\n\tThu, 19 Feb 2026 20:28:27 +0000", "from mgamail.intel.com ([198.175.65.18])\n\tby desiato.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1vtAdF-00000001qHa-1bUi\n\tfor hostap@lists.infradead.org;\n\tThu, 19 Feb 2026 20:28:22 +0000", "from orviesa004.jf.intel.com ([10.64.159.144])\n by orvoesa110.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 19 Feb 2026 12:28:10 -0800", "from aotchere-mobl1.ger.corp.intel.com (HELO\n aotchere-mobl1.intel.com) ([10.245.246.171])\n by orviesa004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 19 Feb 2026 12:28:06 -0800" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=ogkn9p0X6ZKtw4iU49z+ars0pwlfF4FW3c8ZD7bBYAk=; b=SfJa91fht3K+u8\n\tCofOgj3ublgRl0d0Pl9eB4tHwTAbUUmoC0Hpl3TdGVVRlNDDWJdVZ8ymlbc5FmHaKCq9CJon9v0K3\n\tsyQcuwFM0Ios0wUcUpacRy6qw8KHcXmZLwKhJTC7rnA35m6o6S6AcJPUBnOeKkZWDWAzVCc8IvEJO\n\t6hvT5WuTmO/8yny+erqn5keFHnQoKvVToFcy6H4jRVSTEJoZ7TxE421ssC8Saj0GSIz69s2mjnOqW\n\tLY9x5b6L6C7umzLe8vHdOZryGZXe/Ep+ed5PCZOTVIxxmwMssP1OnOUsmz2A7ejwlJs60r2ajXwOM\n\t/Zt/siNxsjLsKOrJdcPA==;", "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=infradead.org; s=desiato.20200630; h=Content-Transfer-Encoding:MIME-Version\n\t:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:\n\tContent-Type:Content-ID:Content-Description;\n\tbh=xoZ4y21AvJxX3w+gFZJ28iYlx2m+3jv2ZXz1dk8PSM4=; b=WazWdQpRob7ED5hvOR8jf9BkFv\n\tAHc1lsDAzDnwBaJRuesf1f4ecq/ak5icdHmLE5cdrMKWBTgzgCIt6q5k5TungK2K+RYrehArgDUSW\n\teFx/XLxQYa9xOubZsqawblSWDx0tp2Fqr3Vz3gY8E0Q4GeKvxe2jqgsT+4q+E6GhGGqsGe+8ilf4K\n\tCNCwbLQP4zPGsMXddE/S2cj3oBYQmjNC9XQ3PNHCFgWECiPoUrDOJcVJl8ScxW2TFFIVHPOk7tNU5\n\ta/amUY7zxG6b5PlhlUNwqq768hjPOe3siq4SfXgRktXfalzkP/LrmuWCrWnQOZOmqzKmKkuWkfZah\n\tR9vea3aw==;", "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1771532898; x=1803068898;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=j7W9CMTLDTYyhtGVCGD5m5MaoNV8NA9QzqN7mL8Almk=;\n b=H1ag4OLcCeQmkguePKGQcDbEEaIqDR1PkSR8kxmsRn4Ued2u1nQ90tfo\n gL4nkSIqjcNWAS42+DupJClUjySq80ywchuAG9KZ+unUwo8vWgI7uQBCA\n byDDmGblxn+MVXuj2YBIeZ/Uua6Ox4PpWTDJD/ntifLhJdZH72i/q8lfz\n UPQXSWt57whojnaBxqXQSXxCgfEeuDMqhfgVyztnBHkJKPZlOFTPQc6jR\n zKqsJsfHQpSuss/Q3qe2lLaF2GviuU3WAANyR6PE7rj3FtUrwdXcZai6M\n EJ+W6IgyyLFbAp9TOFqGE+x/yEKs+KKJ/Iwl+CUhus7nmQaRueRgWIYRu\n A==;" ], "X-CSE-ConnectionGUID": [ "8Rjrbz3gTbSUxGas3DdAxw==", "R2EFkM1rRBmw1quT/SLhwg==" ], "X-CSE-MsgGUID": [ "agQtxTCLR5O2TylO/V+OtQ==", "7M7DD6rzRU+bGYollHSOPQ==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6800,10657,11706\"; a=\"72674105\"", "E=Sophos;i=\"6.21,300,1763452800\";\n d=\"scan'208\";a=\"72674105\"", "E=Sophos;i=\"6.21,300,1763452800\";\n d=\"scan'208\";a=\"219154145\"" ], "X-ExtLoop1": "1", "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>", "To": "hostap@lists.infradead.org,\n\tvamsin@qti.qualcomm.com,\n\tvganneva@qti.qualcomm.com,\n\tmaheshkkv@google.com", "Cc": "Ilan Peer <ilan.peer@intel.com>", "Subject": "[PATCH 56/58] NAN: Add crypto API tests", "Date": "Thu, 19 Feb 2026 22:25:12 +0200", "Message-ID": "<20260219202514.5781-57-andrei.otcheretianski@intel.com>", "X-Mailer": "git-send-email 2.52.0", "In-Reply-To": "<20260219202514.5781-1-andrei.otcheretianski@intel.com>", "References": "<20260219202514.5781-1-andrei.otcheretianski@intel.com>", "MIME-Version": "1.0", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260219_202820_497617_B6C78A2C ", "X-CRM114-Status": "GOOD ( 11.74 )", "X-Spam-Score": "-0.9 (/)", "X-Spam-Report": "Spam detection software,\n running on the system \"desiato.infradead.org\",\n has NOT identified this incoming email as spam. The original\n message has been attached to this so you can view it or label\n similar future email. If you have any questions, see\n the administrator of that system for details.\n Content preview: From: Ilan Peer <ilan.peer@intel.com> Based on the test\n vectors\n provided in WiFi Aware specification v4.0. Signed-off-by: Ilan Peer\n <ilan.peer@intel.com>\n --- src/nan/nan_module_tests.c | 237 +++++++++++++++++++++++++++++++++++++\n 1 file changed, 237 insertions(+)\n Content analysis details: (-0.9 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at https://www.dnswl.org/, low\n trust\n [198.175.65.18 listed in list.dnswl.org]\n -0.0 SPF_PASS SPF: sender matches SPF record\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n 0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n query to Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.18 listed in\n sa-trusted.bondedsender.org]\n 0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.18 listed in sa-accredit.habeas.com]\n -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender\n 0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [198.175.65.18 listed in\n bl.score.senderscore.com]", "X-BeenThere": "hostap@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<hostap.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>", "List-Post": "<mailto:hostap@lists.infradead.org>", "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>", "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "From: Ilan Peer <ilan.peer@intel.com>\n\nBased on the test vectors provided in WiFi Aware specification v4.0.\n\nSigned-off-by: Ilan Peer <ilan.peer@intel.com>\n---\n src/nan/nan_module_tests.c | 237 +++++++++++++++++++++++++++++++++++++\n 1 file changed, 237 insertions(+)", "diff": "diff --git a/src/nan/nan_module_tests.c b/src/nan/nan_module_tests.c\nindex 468ef90083..fa2b1f0cc2 100644\n--- a/src/nan/nan_module_tests.c\n+++ b/src/nan/nan_module_tests.c\n@@ -7,6 +7,9 @@\n */\n \n #include \"nan_module_tests.h\"\n+#include \"crypto/sha256.h\"\n+#include \"crypto/sha384.h\"\n+#include \"crypto/crypto.h\"\n \n #define NAN_TEST_MAX_NAF_LEN 1024\n #define NAN_TEST_MAX_PEERS 20\n@@ -1158,7 +1161,241 @@ static int nan_test_run(void)\n }\n \n \n+static const u8 nan_key[32] = {\n+\t0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,\n+\t0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,\n+\t0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,\n+\t0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,\n+};\n+\n+static u8 nan_addrs[][ETH_ALEN] = {\n+\t{\n+\t\t0x00, 0x01, 0x02, 0x03, 0x04, 0x05,\n+\t},\n+\t{\n+\t\t0x10, 0x11, 0x12, 0x13, 0x14, 0x15,\n+\t},\n+};\n+\n+static u8 nan_nonce[][WPA_NONCE_LEN] = {\n+\t{\n+\t\t0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,\n+\t\t0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,\n+\t\t0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,\n+\t\t0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,\n+\t},\n+\t{\n+\t\t0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,\n+\t\t0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,\n+\t\t0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,\n+\t\t0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,\n+\t},\n+};\n+\n+static struct nan_ptk nan_ptk_128 = {\n+\t.kck =\t{\n+\t\t0x67, 0x40, 0x47, 0x6f, 0x9c, 0xb4, 0xcd, 0xee,\n+\t\t0xfb, 0xc7, 0xad, 0x25, 0x78, 0xd5, 0x5e, 0xb2,\n+\t},\n+\t.kek = {\n+\t\t0xe5, 0xc7, 0x55, 0xbb, 0x4e, 0x4f, 0xd7, 0xbb,\n+\t\t0xdb, 0x19, 0xa5, 0xb3, 0x6c, 0xcc, 0x77, 0xe3,\n+\t},\n+\t.tk = {\n+\t\t0xe2, 0x7f, 0xfc, 0x7b, 0xa2, 0xd6, 0xb2, 0x44,\n+\t\t0x63, 0x4a, 0x0c, 0xf2, 0x09, 0xf8, 0x06, 0x9a,\n+\t},\n+\t.kck_len = 16,\n+\t.kek_len = 16,\n+\t.tk_len = 16,\n+};\n+\n+static struct nan_ptk nan_ptk_256 = {\n+\t.kck =\t{\n+\t\t0x72, 0x70, 0xd5, 0xdc, 0x05, 0x44, 0x8a, 0xb4,\n+\t\t0x1a, 0x73, 0xe5, 0x51, 0x56, 0xa0, 0x78, 0x3a,\n+\t\t0x33, 0x74, 0x62, 0x4e, 0x81, 0xe0, 0x39, 0xf8,\n+\t},\n+\t.kek = {\n+\t\t0x55, 0x3e, 0x2c, 0x8a, 0x0b, 0xab, 0xfc, 0xe1,\n+\t\t0xf9, 0x45, 0xfb, 0xa7, 0xa6, 0xc9, 0x0c, 0x77,\n+\t\t0x76, 0x64, 0x6b, 0xaa, 0xc0, 0x59, 0x7c, 0xd6,\n+\t\t0xa4, 0x99, 0x31, 0xf2, 0x6e, 0xbf, 0x0e, 0x49,\n+\t},\n+\t.tk = {\n+\t\t0x44, 0x61, 0x12, 0xba, 0x4c, 0x25, 0x8b, 0xe5,\n+\t\t0x29, 0x33, 0x8f, 0x77, 0x45, 0x55, 0x13, 0x87,\n+\t\t0x69, 0x61, 0xf4, 0x33, 0xad, 0x87, 0x47, 0xbb,\n+\t\t0xa1, 0xd6, 0x5b, 0x4d, 0xaf, 0x0a, 0x37, 0x5a\n+\t},\n+\t.kck_len = 24,\n+\t.kek_len = 32,\n+\t.tk_len = 32,\n+};\n+\n+static const u8 nan_service_id[NAN_SERVICE_ID_LEN] = {\n+\t0x48, 0xda, 0x63, 0xdc, 0xde, 0x19,\n+};\n+\n+static u8 nan_pmkid_128[PMKID_LEN] = {\n+\t0xcf, 0x4f, 0x64, 0x44, 0xd8, 0xe2, 0xc4, 0xef,\n+\t0xa4, 0xf3, 0xa6, 0x51, 0xf3, 0x0f, 0x63, 0x4f,\n+};\n+\n+static u8 nan_pmkid_256[PMKID_LEN] = {\n+\t0x08, 0x11, 0x23, 0xc8, 0x57, 0x52, 0x6a, 0x09,\n+\t0x6d, 0x46, 0x48, 0x2b, 0xa8, 0x02, 0xfc, 0x28,\n+};\n+\n+static u8 nan_crypto_sha256_digest[SHA256_MAC_LEN] = {\n+\t0xde, 0x7a, 0xa9, 0x34, 0x0d, 0x1d, 0xbb, 0x73,\n+\t0x4d, 0x4d, 0x5a, 0xcb, 0x6b, 0xe4, 0xed, 0xc9,\n+\t0x0a, 0x16, 0x37, 0xaa, 0x1e, 0x5a, 0x34, 0x2e,\n+\t0x58, 0xdd, 0x0b, 0x30, 0x4b, 0xa4, 0x8c, 0x32,\n+};\n+\n+static u8 nan_crypto_sha384_digest[SHA384_MAC_LEN] = {\n+\t0xb1, 0xf9, 0x75, 0xbd, 0x80, 0x84, 0x21, 0x35,\n+\t0xc2, 0x38, 0xf7, 0x0d, 0x03, 0x32, 0x38, 0xe7,\n+\t0xbb, 0x55, 0x39, 0x21, 0xf5, 0xb3, 0xbd, 0x5c,\n+\t0x93, 0x78, 0x52, 0x61, 0x6f, 0x83, 0x58, 0x2d,\n+\t0xdc, 0x0d, 0xe2, 0x25, 0x5e, 0x72, 0x6c, 0x95,\n+\t0xd0, 0xcb, 0x09, 0xef, 0x2a, 0x8f, 0x08, 0x17,\n+};\n+\n+static u8 sha_data[] = \"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\";\n+\n+static u8 sha256_digest[] = {\n+\t0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8,\n+\t0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39,\n+\t0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67,\n+\t0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1,\n+};\n+\n+static u8 sha384_digest[] = {\n+\t0x33, 0x91, 0xfd, 0xdd, 0xfc, 0x8d, 0xc7, 0x39,\n+\t0x37, 0x07, 0xa6, 0x5b, 0x1b, 0x47, 0x09, 0x39,\n+\t0x7c, 0xf8, 0xb1, 0xd1, 0x62, 0xaf, 0x05, 0xab,\n+\t0xfe, 0x8f, 0x45, 0x0d, 0xe5, 0xf3, 0x6b, 0xc6,\n+\t0xb0, 0x45, 0x5a, 0x85, 0x20, 0xbc, 0x4e, 0x6f,\n+\t0x5f, 0xe9, 0x5b, 0x1f, 0xe3, 0xc8, 0x45, 0x2b,\n+};\n+\n+#define NAN_CRYPTO_FAIL(_ret) \\\n+\tif (_ret) { \\\n+\t\twpa_printf(MSG_ERROR, \\\n+\t\t\t \"NAN Crypto test fail: %s:%d\", \\\n+\t\t\t __func__, __LINE__); \\\n+\t\treturn -1; \\\n+\t}\n+\n+\n+static int nan_test_crypto_key_mic(void)\n+{\n+\tu8 digest[SHA384_MAC_LEN];\n+\tu8 *data = nan_nonce[0];\n+\tsize_t data_len = sizeof(nan_nonce[0]);\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_key_mic(data, data_len, (u8 *)nan_key,\n+\t\t\t\t\t sizeof(nan_key), NAN_CS_SK_CCM_128,\n+\t\t\t\t\t digest));\n+\n+\tNAN_CRYPTO_FAIL(os_memcmp(digest, nan_crypto_sha256_digest,\n+\t\t\t\t NAN_KEY_MIC_LEN));\n+\n+\tos_memset(digest, 0, sizeof(digest));\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_key_mic(data, data_len, (u8 *)nan_key,\n+\t\t\t\t\t sizeof(nan_key), NAN_CS_SK_GCM_256,\n+\t\t\t\t\t digest));\n+\tNAN_CRYPTO_FAIL(os_memcmp(digest, nan_crypto_sha384_digest,\n+\t\t\t\t NAN_KEY_MIC_24_LEN));\n+\n+\treturn 0;\n+}\n+\n+\n+static int nan_test_crypto_pmkid(void)\n+{\n+\tu8 pmkid[PMKID_LEN];\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_calc_pmkid(nan_key, nan_addrs[0],\n+\t\t\t\t\t nan_addrs[1], nan_service_id,\n+\t\t\t\t\t NAN_CS_SK_CCM_128, pmkid));\n+\n+\tNAN_CRYPTO_FAIL(os_memcmp(pmkid, nan_pmkid_128, sizeof(pmkid)));\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_calc_pmkid(nan_key, nan_addrs[0],\n+\t\t\t\t\t nan_addrs[1], nan_service_id,\n+\t\t\t\t\t NAN_CS_SK_GCM_256, pmkid));\n+\n+\tNAN_CRYPTO_FAIL(os_memcmp(pmkid, nan_pmkid_256, sizeof(pmkid)));\n+\n+\treturn 0;\n+}\n+\n+\n+static int nan_test_ptk(void)\n+{\n+\tstruct nan_ptk tptk;\n+\n+\tos_memset(&tptk, 0, sizeof(tptk));\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_pmk_to_ptk(nan_key,\n+\t\t\t\t\t nan_addrs[0], nan_addrs[1],\n+\t\t\t\t\t nan_nonce[0], nan_nonce[1],\n+\t\t\t\t\t &tptk, NAN_CS_SK_CCM_128));\n+\n+\tNAN_CRYPTO_FAIL(os_memcmp(&tptk, &nan_ptk_128, sizeof(tptk)));\n+\n+\tos_memset(&tptk, 0, sizeof(tptk));\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_pmk_to_ptk(nan_key,\n+\t\t\t\t\t nan_addrs[0], nan_addrs[1],\n+\t\t\t\t\t nan_nonce[0], nan_nonce[1],\n+\t\t\t\t\t &tptk, NAN_CS_SK_GCM_256));\n+\n+\tNAN_CRYPTO_FAIL(os_memcmp(&tptk, &nan_ptk_256, sizeof(tptk)));\n+\n+\treturn 0;\n+}\n+\n+\n+static int nan_test_crypto_auth_token(void)\n+{\n+\tu8 digest[SHA384_MAC_LEN];\n+\tu8 *data = sha_data;\n+\tsize_t len = os_strlen((const char *)data);\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_calc_auth_token(NAN_CS_SK_CCM_128, data,\n+\t\t\t\t\t\t len, digest));\n+\tNAN_CRYPTO_FAIL(os_memcmp(digest, sha256_digest, NAN_AUTH_TOKEN_LEN));\n+\n+\tos_memset(digest, 0, sizeof(digest));\n+\n+\tNAN_CRYPTO_FAIL(nan_crypto_calc_auth_token(NAN_CS_SK_GCM_256, data, len,\n+\t\t\t\t\t\t digest));\n+\tNAN_CRYPTO_FAIL(os_memcmp(digest, sha384_digest, NAN_AUTH_TOKEN_LEN));\n+\n+\treturn 0;\n+}\n+\n+\n+int nan_test_crypto(void)\n+{\n+\tNAN_CRYPTO_FAIL(nan_test_crypto_key_mic());\n+\tNAN_CRYPTO_FAIL(nan_test_crypto_pmkid());\n+\tNAN_CRYPTO_FAIL(nan_test_ptk());\n+\tNAN_CRYPTO_FAIL(nan_test_crypto_auth_token());\n+\n+\treturn 0;\n+}\n+\n+\n int nan_module_tests(void)\n {\n+\tif (nan_test_crypto())\n+\t\treturn -1;\n+\n \treturn nan_test_run();\n }\n", "prefixes": [ "56/58" ] }