diff options
author | avatar <avatar@FreeBSD.org> | 2005-05-05 13:16:30 +0000 |
---|---|---|
committer | avatar <avatar@FreeBSD.org> | 2005-05-05 13:16:30 +0000 |
commit | 5264ecc9eb40380b089ba452a3fa433651d400b6 (patch) | |
tree | 44cf8fdc3fad112ec9f7936548fd34ec303e606a /tools | |
parent | 06c6095d7e784b43177728dd58aa46213c995134 (diff) | |
download | FreeBSD-src-5264ecc9eb40380b089ba452a3fa433651d400b6.zip FreeBSD-src-5264ecc9eb40380b089ba452a3fa433651d400b6.tar.gz |
Catching up with the latest crypto API changes in net80211.
Reviewed by: sam
Diffstat (limited to 'tools')
-rw-r--r-- | tools/regression/net80211/ccmp/test_ccmp.c | 3 | ||||
-rw-r--r-- | tools/regression/net80211/tkip/test_tkip.c | 3 | ||||
-rw-r--r-- | tools/regression/net80211/wep/test_wep.c | 3 |
3 files changed, 6 insertions, 3 deletions
diff --git a/tools/regression/net80211/ccmp/test_ccmp.c b/tools/regression/net80211/ccmp/test_ccmp.c index 6560dd7..d78be95 100644 --- a/tools/regression/net80211/ccmp/test_ccmp.c +++ b/tools/regression/net80211/ccmp/test_ccmp.c @@ -606,7 +606,8 @@ runtest(struct ieee80211com *ic, struct ciphertest *t) memset(&key, 0, sizeof(key)); key.wk_flags = IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV; key.wk_cipher = &ieee80211_cipher_none; - if (!ieee80211_crypto_newkey(ic, t->cipher, &key)) { + if (!ieee80211_crypto_newkey(ic, t->cipher, + IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV, &key)) { printf("FAIL: ieee80211_crypto_newkey failed\n"); goto bad; } diff --git a/tools/regression/net80211/tkip/test_tkip.c b/tools/regression/net80211/tkip/test_tkip.c index 8c7e655..5a63978 100644 --- a/tools/regression/net80211/tkip/test_tkip.c +++ b/tools/regression/net80211/tkip/test_tkip.c @@ -196,7 +196,8 @@ runtest(struct ieee80211com *ic, struct ciphertest *t) memset(&key, 0, sizeof(key)); key.wk_flags = IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV; key.wk_cipher = &ieee80211_cipher_none; - if (!ieee80211_crypto_newkey(ic, IEEE80211_CIPHER_TKIP, &key)) { + if (!ieee80211_crypto_newkey(ic, IEEE80211_CIPHER_TKIP, + IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV, &key)) { printf("FAIL: ieee80211_crypto_newkey failed\n"); goto bad; } diff --git a/tools/regression/net80211/wep/test_wep.c b/tools/regression/net80211/wep/test_wep.c index 6dcd72e..b498195 100644 --- a/tools/regression/net80211/wep/test_wep.c +++ b/tools/regression/net80211/wep/test_wep.c @@ -199,7 +199,8 @@ runtest(struct ieee80211com *ic, struct ciphertest *t) memset(&key, 0, sizeof(key)); key.wk_flags = IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV; key.wk_cipher = &ieee80211_cipher_none; - if (!ieee80211_crypto_newkey(ic, t->cipher, &key)) { + if (!ieee80211_crypto_newkey(ic, t->cipher, + IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV, &key)) { printf("FAIL: ieee80211_crypto_newkey failed\n"); goto bad; } |