Skip to content

Commit

Permalink
Merge pull request #404 from nasa/nos3#483
Browse files Browse the repository at this point in the history
Nos3#483: Replace gethost to getaddrinfo
  • Loading branch information
Donnie-Ice authored Feb 18, 2025
2 parents 1acbc5a + 43c9bb2 commit b9a9c7d
Show file tree
Hide file tree
Showing 12 changed files with 95 additions and 69 deletions.
12 changes: 9 additions & 3 deletions src/core/crypto.c
Original file line number Diff line number Diff line change
Expand Up @@ -783,7 +783,7 @@ int32_t Crypto_Get_Managed_Parameters_For_Gvcid(uint8_t tfvn, uint16_t scid, uin
* @return int32: Success/Failure
* @note TODO - Actually update based on variable config
* @note Allows EPs to be processed one of two ways.
* @note - 1) By using a packet layer with APID 0x1880
* @note - 1) By using a packet layer with APID 0x1980
* @note - 2) By using a defined Virtual Channel ID
* @note Requires this to happen on either SPI_MIN (0) or SPI_MAX (configurable)
**/
Expand All @@ -809,8 +809,9 @@ int32_t Crypto_Process_Extended_Procedure_Pdu(TC_t *tc_sdls_processed_frame, uin
if (status == CRYPTO_LIB_SUCCESS)
{
// Check for specific App ID for EPs - the CryptoLib Apid in this case
if ((tc_sdls_processed_frame->tc_pdu[0] == 0x18) && (tc_sdls_processed_frame->tc_pdu[1] == 0x80))
if ((tc_sdls_processed_frame->tc_pdu[0] == 0x19) && (tc_sdls_processed_frame->tc_pdu[1] == 0x80))
{

#ifdef CRYPTO_EPROC
// Check validity of SAs used for EP
if (valid_ep_sa == CRYPTO_TRUE)
Expand Down Expand Up @@ -911,8 +912,13 @@ int32_t Crypto_Process_Extended_Procedure_Pdu(TC_t *tc_sdls_processed_frame, uin
}

#else // Received an EP command without EPs being built
if (valid_ep_sa)
{
status = CRYPTO_LIB_ERR_SDLS_EP_NOT_BUILT;
return status;
}
valid_ep_sa = valid_ep_sa; // Suppress build error
status = CRYPTO_LIB_ERR_SDLS_EP_NOT_BUILT;
status = CRYPTO_LIB_SUCCESS;
#endif // CRYPTO_EPROC
}

Expand Down
6 changes: 5 additions & 1 deletion src/core/crypto_config.c
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ int32_t Crypto_SC_Init(void)

// Crypto_Config_Add_Gvcid_Managed_Parameter(0, 0x0003, 4, TC_HAS_FECF, TC_HAS_SEGMENT_HDRS, TC_OCF_NA, 1024,
// AOS_FHEC_NA, AOS_IZ_NA, 0);
TC_UT_Managed_Parameters.vcid = 4;
TC_UT_Managed_Parameters.vcid = 2;
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);

// TM
Expand All @@ -81,6 +81,8 @@ int32_t Crypto_SC_Init(void)
GvcidManagedParameters_t TM_UT_Managed_Parameters = {
0, 0x0003, 1, TM_HAS_FECF, AOS_FHEC_NA, AOS_IZ_NA, 0, TM_SEGMENT_HDRS_NA, 1786, TM_HAS_OCF, 1};
Crypto_Config_Add_Gvcid_Managed_Parameters(TM_UT_Managed_Parameters);
TM_UT_Managed_Parameters.vcid = 2;
Crypto_Config_Add_Gvcid_Managed_Parameters(TM_UT_Managed_Parameters);
status = Crypto_Init();
return status;
}
Expand All @@ -104,6 +106,8 @@ int32_t Crypto_Init_TC_Unit_Test(void)
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
TC_UT_Managed_Parameters.vcid = 1;
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
TC_UT_Managed_Parameters.vcid = 2;
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
TC_UT_Managed_Parameters.vcid = 4;
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
// Crypto_Config_Add_Gvcid_Managed_Parameter(0, 0x0003, 1, TC_HAS_FECF, TC_HAS_SEGMENT_HDRS, TC_OCF_NA, 1024,
Expand Down
10 changes: 5 additions & 5 deletions src/sa/internal/sa_interface_inmemory.template.c
Original file line number Diff line number Diff line change
Expand Up @@ -255,10 +255,10 @@ void sa_populate(void)
sa[1].ast = 0;
sa[1].shivf_len = 12;
sa[1].iv_len = 12;
sa[1].shsnf_len = 2;
sa[1].shsnf_len = 0;
sa[1].arsnw = 5;
sa[1].arsnw_len = 1;
sa[1].arsn_len = 2;
sa[1].arsn_len = 0;
sa[1].gvcid_blk.tfvn = 0;
sa[1].gvcid_blk.scid = SCID & 0x3FF;
sa[1].gvcid_blk.vcid = 0;
Expand All @@ -269,7 +269,7 @@ void sa_populate(void)
// EKID = 2
sa[2].spi = 2;
sa[2].ekid = 2;
sa[2].sa_state = SA_KEYED;
sa[2].sa_state = SA_OPERATIONAL;
sa[2].ecs_len = 1;
sa[2].ecs = CRYPTO_CIPHER_AES256_GCM;
sa[2].est = 1;
Expand All @@ -278,10 +278,10 @@ void sa_populate(void)
sa[2].iv_len = 12;
sa[2].arsnw_len = 1;
sa[2].arsnw = 5;
sa[2].arsn_len = ((sa[2].arsnw * 2) + 1);
sa[2].arsn_len = 0;
sa[2].gvcid_blk.tfvn = 0;
sa[2].gvcid_blk.scid = SCID & 0x3FF;
sa[2].gvcid_blk.vcid = 0;
sa[2].gvcid_blk.vcid = 2;
sa[2].gvcid_blk.mapid = TYPE_TC;

// TC - Authentication Only - HMAC_SHA512 (Keyed)
Expand Down
32 changes: 23 additions & 9 deletions support/standalone/standalone.c
Original file line number Diff line number Diff line change
Expand Up @@ -221,22 +221,36 @@ int32_t crypto_standalone_process_command(int32_t cc, int32_t num_tokens, char *

int32_t crypto_host_to_ip(const char *hostname, char *ip)
{
struct hostent *he;
struct in_addr **addr_list;
struct addrinfo hints, *res, *p;
int status;
void *addr;

if ((he = gethostbyname(hostname)) == NULL)
memset(&hints, 0, sizeof hints);
hints.ai_family = AF_INET; // Uses IPV4 only. AF_UNSPEC for IPV6 Support
hints.ai_socktype = SOCK_STREAM;

if ((status = getaddrinfo(hostname, NULL, &hints, &res)) != 0)
{
return 1;
}

addr_list = (struct in_addr **)he->h_addr_list;

for (int i = 0; addr_list[i] != NULL; i++)
for (p = res; p != NULL; p = p->ai_next)
{
strcpy(ip, inet_ntoa(*addr_list[i]));
return 0;
struct sockaddr_in *ipv4 = (struct sockaddr_in *)p->ai_addr;
addr = &(ipv4->sin_addr);

// Convert IP to String
if (inet_ntop(p->ai_family, addr, ip, INET_ADDRSTRLEN) == NULL)
{
freeaddrinfo(res);
return 1;
}

freeaddrinfo(res);
return 0; // IP Found
}
return 1;
freeaddrinfo(res);
return 1; // IP NOT Found
}

int32_t crypto_standalone_udp_init(udp_info_t *sock, int32_t port, uint8_t bind_sock)
Expand Down
1 change: 1 addition & 0 deletions support/standalone/standalone.h
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ extern "C"
#include <signal.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <unistd.h>

#include "crypto.h"
Expand Down
10 changes: 5 additions & 5 deletions test/unit/ut_crypto.c
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@
UTEST(CRYPTO_C, CALC_CRC16)
{
remove("sa_save_file.bin");
char *data_h = "2003002000ff000100001880d2c9000e197f0b001b0004000400003040d95e";
char *data_h = "2003002000ff000100001980d2c9000e197f0b001b0004000400003040d95e";
uint8_t *data_b = NULL;
int data_b_len = 0;
Crypto_Init_TC_Unit_Test();
Expand All @@ -40,10 +40,10 @@ UTEST(CRYPTO_C, CALC_CRC16)

int size = 31;
uint16_t crc = 0x00;
uint16_t validated_crc = 0xA61A;
uint16_t validated_crc = 0x73EC;
crc = Crypto_Calc_CRC16(data_b, size);

// printf("CRC = 0x%04x\n", crc);
printf("CRC = 0x%04x\n", crc);
ASSERT_EQ(crc, validated_crc);
}

Expand All @@ -68,7 +68,7 @@ UTEST(CRYPTO_C, BAD_CC_FLAG)
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);

Crypto_Init();
char *raw_tc_sdls_ping_h = "3003002000ff000100001880d2c9000e197f0b001b0004000400003040d95ea61a";
char *raw_tc_sdls_ping_h = "3003002000ff000100001980d2c9000e197f0b001b0004000400003040d95ea61a";
char *raw_tc_sdls_ping_b = NULL;
int raw_tc_sdls_ping_len = 0;

Expand Down Expand Up @@ -424,7 +424,7 @@ UTEST(CRYPTO_C, OTAR_0_140_142_FAIL_TEST)
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_OTAR_h =
"2003009e00ff000000001880d037008c197f0b000100840000344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"2003009e00ff000000001980d037008c197f0b000100840001344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986166f5ffd95555";

Expand Down
28 changes: 14 additions & 14 deletions test/unit/ut_ep_key_mgmt.c
Original file line number Diff line number Diff line change
Expand Up @@ -30,9 +30,9 @@ UTEST(EP_KEY_MGMT, OTAR_0_140_142)
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_OTAR_h =
"2003009c00ff00001880d037008c197f0b000100840000344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986166f5ffd95555";
"2003009e00ff00001980d037008c197f0b000100840000344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148"
"af896d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986166f5ffd95555";

uint8_t *buffer_nist_key_b, *buffer_OTAR_b = NULL;
int buffer_nist_key_len, buffer_OTAR_len = 0;
Expand Down Expand Up @@ -100,7 +100,7 @@ UTEST(EP_KEY_MGMT, ACTIVATE_141_142)
// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_ACTIVATE_h = "2003001c00ff00001880d038000c197f0b00020004008d008e82ebe4fc55555555";
char *buffer_ACTIVATE_h = "2003001c00ff00001980d038000c197f0b00020004008d008e82ebe4fc55555555";

uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_ACTIVATE_b = NULL;
int buffer_nist_iv_len, buffer_nist_key_len, buffer_ACTIVATE_len = 0;
Expand Down Expand Up @@ -175,7 +175,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142)
// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039000a197f0b00030002008e1f6d21c4555555555555";
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039000a197f0b00030002008e1f6d21c4555555555555";

uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
Expand Down Expand Up @@ -249,7 +249,7 @@ UTEST(EP_KEY_MGMT, INVENTORY_132_134)
// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_nist_iv_h = "000000000000000000000000"; // The last valid IV that was seen by the SA
char *buffer_INVENTORY_h = "2003001c00ff00001880d03b000a197f0b00070004008400861f6d82ebe4fc55555555";
char *buffer_INVENTORY_h = "2003001c00ff00001980d03b000a197f0b00070004008400861f6d82ebe4fc55555555";

uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_INVENTORY_b = NULL;
int buffer_nist_iv_len, buffer_nist_key_len, buffer_INVENTORY_len = 0;
Expand Down Expand Up @@ -345,7 +345,7 @@ UTEST(EP_KEY_MGMT, VERIFY_132_134)

// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_VERIFY_h = "2003003c00ff00001880d03a002c197f0b00040024008471fc3ad5b1c36ad56bd5a5432315cdab008675c0"
char *buffer_VERIFY_h = "2003003c00ff00001980d03a002c197f0b00040024008471fc3ad5b1c36ad56bd5a5432315cdab008675c0"
"6302465bc6d5091a29957eebed35c00a6ed8";
// TRUTH PDU
char *buffer_TRUTH_RESPONSE_h =
Expand Down Expand Up @@ -458,14 +458,14 @@ UTEST(EP_KEY_MGMT, OTAR_0_140_142_MK_NOT_ACTIVE)
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_OTAR_h =
"2003009e00ff000000001880d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"2003009e00ff000000001980d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986366f5ffd95555";
// |2003009e00| = Primary Header
// |ff| = Ext. Procs
// |0000| = SPI
// |0000| = ARSN
// |1880| = CryptoLib App ID
// |1980| = CryptoLib App ID
// |d037| = seq, pktid
// |008c| = pkt_length
// |197f| = pusv, ack, st
Expand Down Expand Up @@ -563,14 +563,14 @@ UTEST(EP_KEY_MGMT, OTAR_0_140_142_BAD_DECRYPT)
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_OTAR_h =
"2003009e00ff000000001880d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"2003009e00ff000000001980d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986366f5ffd95555";
// |2003009e00| = Primary Header
// |ff| = Ext. Procs
// |0000| = SPI
// |0000| = ARSN
// |1880| = CryptoLib App ID
// |1980| = CryptoLib App ID
// |d037| = seq, pktid
// |008c| = pkt_length
// |197f| = pusv, ack, st
Expand Down Expand Up @@ -663,7 +663,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142_NO_PUS)
// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039000a030002008e1f6d21c4555555555555";
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039000a030002008e1f6d21c4555555555555";

uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
Expand Down Expand Up @@ -744,7 +744,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142_NO_PUS_BAD_TLV)
// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039FFFF030002008e1f6d21c4555555555555";
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039FFFF030002008e1f6d21c4555555555555";

uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
Expand Down Expand Up @@ -821,7 +821,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142_PUS_BAD_TLV)
// NOTE: Added Transfer Frame header to the plaintext
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039FFFF197f0b00030002008e1f6d21c4555555555555";
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039FFFF197f0b00030002008e1f6d21c4555555555555";

uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
Expand Down
14 changes: 7 additions & 7 deletions test/unit/ut_ep_mc.c
Original file line number Diff line number Diff line change
Expand Up @@ -23,12 +23,12 @@ UTEST(EP_MC, MC_REGULAR_PING)
int status = CRYPTO_LIB_SUCCESS;

// NOTE: Added Transfer Frame header to the plaintext
char *buffer_PING_h = "2003001800ff00001880d2c70008197f0b00310000b1fe312855";
char *buffer_PING_h = "2003001800ff00001980d2c70008197f0b00310000b1fe312855";
// |2003001a00| = Primary Header
// |ff| = Ext. Procs
// |0000| = SPI
// |0000| = ARSN
// |1880| = CryptoLib App ID
// |1980| = CryptoLib App ID
// |d2c7| = seq, pktid
// |0008| = pkt_length
// |197f| = pusv, ack, st
Expand Down Expand Up @@ -122,7 +122,7 @@ UTEST(EP_MC, MC_STATUS)
int status = CRYPTO_LIB_SUCCESS;

// NOTE: Added Transfer Frame header to the plaintext
char *buffer_STATUS_h = "2003001800ff00001880d2c70008197f0b00320000b1fe312855";
char *buffer_STATUS_h = "2003001800ff00001980d2c70008197f0b00320000b1fe312855";

uint8_t *buffer_STATUS_b = NULL;
int buffer_STATUS_len = 0;
Expand Down Expand Up @@ -203,7 +203,7 @@ UTEST(EP_MC, MC_DUMP)

int status = CRYPTO_LIB_SUCCESS;

char *buffer_DUMP_h = "2003001800ff00001880d2c70008197f0b00330000b1fe312855";
char *buffer_DUMP_h = "2003001800ff00001980d2c70008197f0b00330000b1fe312855";

uint8_t *buffer_DUMP_b = NULL;
int buffer_DUMP_len = 0;
Expand Down Expand Up @@ -287,7 +287,7 @@ UTEST(EP_MC, MC_ERASE)
int status = CRYPTO_LIB_SUCCESS;

// NOTE: Added Transfer Frame header to the plaintext
char *buffer_ERASE_h = "2003001800ff00001880d2c70008197f0b00340000b1fe312855";
char *buffer_ERASE_h = "2003001800ff00001980d2c70008197f0b00340000b1fe312855";

uint8_t *buffer_ERASE_b = NULL;
int buffer_ERASE_len = 0;
Expand Down Expand Up @@ -369,7 +369,7 @@ UTEST(EP_MC, MC_SELF_TEST)
int status = CRYPTO_LIB_SUCCESS;

// NOTE: Added Transfer Frame header to the plaintext
char *buffer_SELF_h = "2003001800ff00001880d2c70008197f0b00350000b1fe312855";
char *buffer_SELF_h = "2003001800ff00001980d2c70008197f0b00350000b1fe312855";

uint8_t *buffer_SELF_b = NULL;
int buffer_SELF_len = 0;
Expand Down Expand Up @@ -452,7 +452,7 @@ UTEST(EP_MC, MC_ALARM_FLAG_RESET)
int status = CRYPTO_LIB_SUCCESS;

// NOTE: Added Transfer Frame header to the plaintext
char *buffer_ALARM_h = "2003001800ff00001880d2c70008197f0b00370000b1fe312855";
char *buffer_ALARM_h = "2003001800ff00001980d2c70008197f0b00370000b1fe312855";

uint8_t *buffer_ALARM_b = NULL;
int buffer_ALARM_len = 0;
Expand Down
Loading

0 comments on commit b9a9c7d

Please sign in to comment.