Skip to content

Commit b9a9c7d

Browse files
authored
Merge pull request #404 from nasa/nos3#483
Nos3#483: Replace gethost to getaddrinfo
2 parents 1acbc5a + 43c9bb2 commit b9a9c7d

File tree

12 files changed

+95
-69
lines changed

12 files changed

+95
-69
lines changed

src/core/crypto.c

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -783,7 +783,7 @@ int32_t Crypto_Get_Managed_Parameters_For_Gvcid(uint8_t tfvn, uint16_t scid, uin
783783
* @return int32: Success/Failure
784784
* @note TODO - Actually update based on variable config
785785
* @note Allows EPs to be processed one of two ways.
786-
* @note - 1) By using a packet layer with APID 0x1880
786+
* @note - 1) By using a packet layer with APID 0x1980
787787
* @note - 2) By using a defined Virtual Channel ID
788788
* @note Requires this to happen on either SPI_MIN (0) or SPI_MAX (configurable)
789789
**/
@@ -809,8 +809,9 @@ int32_t Crypto_Process_Extended_Procedure_Pdu(TC_t *tc_sdls_processed_frame, uin
809809
if (status == CRYPTO_LIB_SUCCESS)
810810
{
811811
// Check for specific App ID for EPs - the CryptoLib Apid in this case
812-
if ((tc_sdls_processed_frame->tc_pdu[0] == 0x18) && (tc_sdls_processed_frame->tc_pdu[1] == 0x80))
812+
if ((tc_sdls_processed_frame->tc_pdu[0] == 0x19) && (tc_sdls_processed_frame->tc_pdu[1] == 0x80))
813813
{
814+
814815
#ifdef CRYPTO_EPROC
815816
// Check validity of SAs used for EP
816817
if (valid_ep_sa == CRYPTO_TRUE)
@@ -911,8 +912,13 @@ int32_t Crypto_Process_Extended_Procedure_Pdu(TC_t *tc_sdls_processed_frame, uin
911912
}
912913

913914
#else // Received an EP command without EPs being built
915+
if (valid_ep_sa)
916+
{
917+
status = CRYPTO_LIB_ERR_SDLS_EP_NOT_BUILT;
918+
return status;
919+
}
914920
valid_ep_sa = valid_ep_sa; // Suppress build error
915-
status = CRYPTO_LIB_ERR_SDLS_EP_NOT_BUILT;
921+
status = CRYPTO_LIB_SUCCESS;
916922
#endif // CRYPTO_EPROC
917923
}
918924

src/core/crypto_config.c

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ int32_t Crypto_SC_Init(void)
7272

7373
// Crypto_Config_Add_Gvcid_Managed_Parameter(0, 0x0003, 4, TC_HAS_FECF, TC_HAS_SEGMENT_HDRS, TC_OCF_NA, 1024,
7474
// AOS_FHEC_NA, AOS_IZ_NA, 0);
75-
TC_UT_Managed_Parameters.vcid = 4;
75+
TC_UT_Managed_Parameters.vcid = 2;
7676
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
7777

7878
// TM
@@ -81,6 +81,8 @@ int32_t Crypto_SC_Init(void)
8181
GvcidManagedParameters_t TM_UT_Managed_Parameters = {
8282
0, 0x0003, 1, TM_HAS_FECF, AOS_FHEC_NA, AOS_IZ_NA, 0, TM_SEGMENT_HDRS_NA, 1786, TM_HAS_OCF, 1};
8383
Crypto_Config_Add_Gvcid_Managed_Parameters(TM_UT_Managed_Parameters);
84+
TM_UT_Managed_Parameters.vcid = 2;
85+
Crypto_Config_Add_Gvcid_Managed_Parameters(TM_UT_Managed_Parameters);
8486
status = Crypto_Init();
8587
return status;
8688
}
@@ -104,6 +106,8 @@ int32_t Crypto_Init_TC_Unit_Test(void)
104106
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
105107
TC_UT_Managed_Parameters.vcid = 1;
106108
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
109+
TC_UT_Managed_Parameters.vcid = 2;
110+
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
107111
TC_UT_Managed_Parameters.vcid = 4;
108112
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
109113
// Crypto_Config_Add_Gvcid_Managed_Parameter(0, 0x0003, 1, TC_HAS_FECF, TC_HAS_SEGMENT_HDRS, TC_OCF_NA, 1024,

src/sa/internal/sa_interface_inmemory.template.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -255,10 +255,10 @@ void sa_populate(void)
255255
sa[1].ast = 0;
256256
sa[1].shivf_len = 12;
257257
sa[1].iv_len = 12;
258-
sa[1].shsnf_len = 2;
258+
sa[1].shsnf_len = 0;
259259
sa[1].arsnw = 5;
260260
sa[1].arsnw_len = 1;
261-
sa[1].arsn_len = 2;
261+
sa[1].arsn_len = 0;
262262
sa[1].gvcid_blk.tfvn = 0;
263263
sa[1].gvcid_blk.scid = SCID & 0x3FF;
264264
sa[1].gvcid_blk.vcid = 0;
@@ -269,7 +269,7 @@ void sa_populate(void)
269269
// EKID = 2
270270
sa[2].spi = 2;
271271
sa[2].ekid = 2;
272-
sa[2].sa_state = SA_KEYED;
272+
sa[2].sa_state = SA_OPERATIONAL;
273273
sa[2].ecs_len = 1;
274274
sa[2].ecs = CRYPTO_CIPHER_AES256_GCM;
275275
sa[2].est = 1;
@@ -278,10 +278,10 @@ void sa_populate(void)
278278
sa[2].iv_len = 12;
279279
sa[2].arsnw_len = 1;
280280
sa[2].arsnw = 5;
281-
sa[2].arsn_len = ((sa[2].arsnw * 2) + 1);
281+
sa[2].arsn_len = 0;
282282
sa[2].gvcid_blk.tfvn = 0;
283283
sa[2].gvcid_blk.scid = SCID & 0x3FF;
284-
sa[2].gvcid_blk.vcid = 0;
284+
sa[2].gvcid_blk.vcid = 2;
285285
sa[2].gvcid_blk.mapid = TYPE_TC;
286286

287287
// TC - Authentication Only - HMAC_SHA512 (Keyed)

support/standalone/standalone.c

Lines changed: 23 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -221,22 +221,36 @@ int32_t crypto_standalone_process_command(int32_t cc, int32_t num_tokens, char *
221221

222222
int32_t crypto_host_to_ip(const char *hostname, char *ip)
223223
{
224-
struct hostent *he;
225-
struct in_addr **addr_list;
224+
struct addrinfo hints, *res, *p;
225+
int status;
226+
void *addr;
226227

227-
if ((he = gethostbyname(hostname)) == NULL)
228+
memset(&hints, 0, sizeof hints);
229+
hints.ai_family = AF_INET; // Uses IPV4 only. AF_UNSPEC for IPV6 Support
230+
hints.ai_socktype = SOCK_STREAM;
231+
232+
if ((status = getaddrinfo(hostname, NULL, &hints, &res)) != 0)
228233
{
229234
return 1;
230235
}
231236

232-
addr_list = (struct in_addr **)he->h_addr_list;
233-
234-
for (int i = 0; addr_list[i] != NULL; i++)
237+
for (p = res; p != NULL; p = p->ai_next)
235238
{
236-
strcpy(ip, inet_ntoa(*addr_list[i]));
237-
return 0;
239+
struct sockaddr_in *ipv4 = (struct sockaddr_in *)p->ai_addr;
240+
addr = &(ipv4->sin_addr);
241+
242+
// Convert IP to String
243+
if (inet_ntop(p->ai_family, addr, ip, INET_ADDRSTRLEN) == NULL)
244+
{
245+
freeaddrinfo(res);
246+
return 1;
247+
}
248+
249+
freeaddrinfo(res);
250+
return 0; // IP Found
238251
}
239-
return 1;
252+
freeaddrinfo(res);
253+
return 1; // IP NOT Found
240254
}
241255

242256
int32_t crypto_standalone_udp_init(udp_info_t *sock, int32_t port, uint8_t bind_sock)

support/standalone/standalone.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ extern "C"
3737
#include <signal.h>
3838
#include <string.h>
3939
#include <sys/socket.h>
40+
#include <sys/types.h>
4041
#include <unistd.h>
4142

4243
#include "crypto.h"

test/unit/ut_crypto.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
UTEST(CRYPTO_C, CALC_CRC16)
3232
{
3333
remove("sa_save_file.bin");
34-
char *data_h = "2003002000ff000100001880d2c9000e197f0b001b0004000400003040d95e";
34+
char *data_h = "2003002000ff000100001980d2c9000e197f0b001b0004000400003040d95e";
3535
uint8_t *data_b = NULL;
3636
int data_b_len = 0;
3737
Crypto_Init_TC_Unit_Test();
@@ -40,10 +40,10 @@ UTEST(CRYPTO_C, CALC_CRC16)
4040

4141
int size = 31;
4242
uint16_t crc = 0x00;
43-
uint16_t validated_crc = 0xA61A;
43+
uint16_t validated_crc = 0x73EC;
4444
crc = Crypto_Calc_CRC16(data_b, size);
4545

46-
// printf("CRC = 0x%04x\n", crc);
46+
printf("CRC = 0x%04x\n", crc);
4747
ASSERT_EQ(crc, validated_crc);
4848
}
4949

@@ -68,7 +68,7 @@ UTEST(CRYPTO_C, BAD_CC_FLAG)
6868
Crypto_Config_Add_Gvcid_Managed_Parameters(TC_UT_Managed_Parameters);
6969

7070
Crypto_Init();
71-
char *raw_tc_sdls_ping_h = "3003002000ff000100001880d2c9000e197f0b001b0004000400003040d95ea61a";
71+
char *raw_tc_sdls_ping_h = "3003002000ff000100001980d2c9000e197f0b001b0004000400003040d95ea61a";
7272
char *raw_tc_sdls_ping_b = NULL;
7373
int raw_tc_sdls_ping_len = 0;
7474

@@ -424,7 +424,7 @@ UTEST(CRYPTO_C, OTAR_0_140_142_FAIL_TEST)
424424
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
425425
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
426426
char *buffer_OTAR_h =
427-
"2003009e00ff000000001880d037008c197f0b000100840000344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
427+
"2003009e00ff000000001980d037008c197f0b000100840001344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
428428
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
429429
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986166f5ffd95555";
430430

test/unit/ut_ep_key_mgmt.c

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ UTEST(EP_KEY_MGMT, OTAR_0_140_142)
3030
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
3131
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
3232
char *buffer_OTAR_h =
33-
"2003009c00ff00001880d037008c197f0b000100840000344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
34-
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
35-
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986166f5ffd95555";
33+
"2003009e00ff00001980d037008c197f0b000100840000344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
34+
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148"
35+
"af896d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986166f5ffd95555";
3636

3737
uint8_t *buffer_nist_key_b, *buffer_OTAR_b = NULL;
3838
int buffer_nist_key_len, buffer_OTAR_len = 0;
@@ -100,7 +100,7 @@ UTEST(EP_KEY_MGMT, ACTIVATE_141_142)
100100
// NOTE: Added Transfer Frame header to the plaintext
101101
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
102102
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
103-
char *buffer_ACTIVATE_h = "2003001c00ff00001880d038000c197f0b00020004008d008e82ebe4fc55555555";
103+
char *buffer_ACTIVATE_h = "2003001c00ff00001980d038000c197f0b00020004008d008e82ebe4fc55555555";
104104

105105
uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_ACTIVATE_b = NULL;
106106
int buffer_nist_iv_len, buffer_nist_key_len, buffer_ACTIVATE_len = 0;
@@ -175,7 +175,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142)
175175
// NOTE: Added Transfer Frame header to the plaintext
176176
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
177177
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
178-
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039000a197f0b00030002008e1f6d21c4555555555555";
178+
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039000a197f0b00030002008e1f6d21c4555555555555";
179179

180180
uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
181181
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
@@ -249,7 +249,7 @@ UTEST(EP_KEY_MGMT, INVENTORY_132_134)
249249
// NOTE: Added Transfer Frame header to the plaintext
250250
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
251251
char *buffer_nist_iv_h = "000000000000000000000000"; // The last valid IV that was seen by the SA
252-
char *buffer_INVENTORY_h = "2003001c00ff00001880d03b000a197f0b00070004008400861f6d82ebe4fc55555555";
252+
char *buffer_INVENTORY_h = "2003001c00ff00001980d03b000a197f0b00070004008400861f6d82ebe4fc55555555";
253253

254254
uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_INVENTORY_b = NULL;
255255
int buffer_nist_iv_len, buffer_nist_key_len, buffer_INVENTORY_len = 0;
@@ -345,7 +345,7 @@ UTEST(EP_KEY_MGMT, VERIFY_132_134)
345345

346346
// NOTE: Added Transfer Frame header to the plaintext
347347
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
348-
char *buffer_VERIFY_h = "2003003c00ff00001880d03a002c197f0b00040024008471fc3ad5b1c36ad56bd5a5432315cdab008675c0"
348+
char *buffer_VERIFY_h = "2003003c00ff00001980d03a002c197f0b00040024008471fc3ad5b1c36ad56bd5a5432315cdab008675c0"
349349
"6302465bc6d5091a29957eebed35c00a6ed8";
350350
// TRUTH PDU
351351
char *buffer_TRUTH_RESPONSE_h =
@@ -458,14 +458,14 @@ UTEST(EP_KEY_MGMT, OTAR_0_140_142_MK_NOT_ACTIVE)
458458
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
459459
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
460460
char *buffer_OTAR_h =
461-
"2003009e00ff000000001880d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
461+
"2003009e00ff000000001980d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
462462
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
463463
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986366f5ffd95555";
464464
// |2003009e00| = Primary Header
465465
// |ff| = Ext. Procs
466466
// |0000| = SPI
467467
// |0000| = ARSN
468-
// |1880| = CryptoLib App ID
468+
// |1980| = CryptoLib App ID
469469
// |d037| = seq, pktid
470470
// |008c| = pkt_length
471471
// |197f| = pusv, ack, st
@@ -563,14 +563,14 @@ UTEST(EP_KEY_MGMT, OTAR_0_140_142_BAD_DECRYPT)
563563
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
564564
// char* buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
565565
char *buffer_OTAR_h =
566-
"2003009e00ff000000001880d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
566+
"2003009e00ff000000001980d037008c197f0b00010084007F344892bbc54f5395297d4c37172f2a3c46f6a81c1349e9e26ac80985d8bb"
567567
"d55a5814c662e49fba52f99ba09558cd21cf268b8e50b2184137e80f76122034c580464e2f06d2659a50508bdfe9e9a55990ba4148af89"
568568
"6d8a6eebe8b5d2258685d4ce217a20174fdd4f0efac62758c51b04e55710a47209c923b641d19a39001f9e986366f5ffd95555";
569569
// |2003009e00| = Primary Header
570570
// |ff| = Ext. Procs
571571
// |0000| = SPI
572572
// |0000| = ARSN
573-
// |1880| = CryptoLib App ID
573+
// |1980| = CryptoLib App ID
574574
// |d037| = seq, pktid
575575
// |008c| = pkt_length
576576
// |197f| = pusv, ack, st
@@ -663,7 +663,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142_NO_PUS)
663663
// NOTE: Added Transfer Frame header to the plaintext
664664
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
665665
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
666-
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039000a030002008e1f6d21c4555555555555";
666+
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039000a030002008e1f6d21c4555555555555";
667667

668668
uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
669669
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
@@ -744,7 +744,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142_NO_PUS_BAD_TLV)
744744
// NOTE: Added Transfer Frame header to the plaintext
745745
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
746746
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
747-
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039FFFF030002008e1f6d21c4555555555555";
747+
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039FFFF030002008e1f6d21c4555555555555";
748748

749749
uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
750750
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;
@@ -821,7 +821,7 @@ UTEST(EP_KEY_MGMT, DEACTIVATE_142_PUS_BAD_TLV)
821821
// NOTE: Added Transfer Frame header to the plaintext
822822
char *buffer_nist_key_h = "000102030405060708090A0B0C0D0E0F000102030405060708090A0B0C0D0E0F";
823823
char *buffer_nist_iv_h = "b6ac8e4963f49207ffd6374b"; // The last valid IV that was seen by the SA
824-
char *buffer_DEACTIVATE_h = "2003001a00ff00001880d039FFFF197f0b00030002008e1f6d21c4555555555555";
824+
char *buffer_DEACTIVATE_h = "2003001a00ff00001980d039FFFF197f0b00030002008e1f6d21c4555555555555";
825825

826826
uint8_t *buffer_nist_iv_b, *buffer_nist_key_b, *buffer_DEACTIVATE_b = NULL;
827827
int buffer_nist_iv_len, buffer_nist_key_len, buffer_DEACTIVATE_len = 0;

test/unit/ut_ep_mc.c

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,12 @@ UTEST(EP_MC, MC_REGULAR_PING)
2323
int status = CRYPTO_LIB_SUCCESS;
2424

2525
// NOTE: Added Transfer Frame header to the plaintext
26-
char *buffer_PING_h = "2003001800ff00001880d2c70008197f0b00310000b1fe312855";
26+
char *buffer_PING_h = "2003001800ff00001980d2c70008197f0b00310000b1fe312855";
2727
// |2003001a00| = Primary Header
2828
// |ff| = Ext. Procs
2929
// |0000| = SPI
3030
// |0000| = ARSN
31-
// |1880| = CryptoLib App ID
31+
// |1980| = CryptoLib App ID
3232
// |d2c7| = seq, pktid
3333
// |0008| = pkt_length
3434
// |197f| = pusv, ack, st
@@ -122,7 +122,7 @@ UTEST(EP_MC, MC_STATUS)
122122
int status = CRYPTO_LIB_SUCCESS;
123123

124124
// NOTE: Added Transfer Frame header to the plaintext
125-
char *buffer_STATUS_h = "2003001800ff00001880d2c70008197f0b00320000b1fe312855";
125+
char *buffer_STATUS_h = "2003001800ff00001980d2c70008197f0b00320000b1fe312855";
126126

127127
uint8_t *buffer_STATUS_b = NULL;
128128
int buffer_STATUS_len = 0;
@@ -203,7 +203,7 @@ UTEST(EP_MC, MC_DUMP)
203203

204204
int status = CRYPTO_LIB_SUCCESS;
205205

206-
char *buffer_DUMP_h = "2003001800ff00001880d2c70008197f0b00330000b1fe312855";
206+
char *buffer_DUMP_h = "2003001800ff00001980d2c70008197f0b00330000b1fe312855";
207207

208208
uint8_t *buffer_DUMP_b = NULL;
209209
int buffer_DUMP_len = 0;
@@ -287,7 +287,7 @@ UTEST(EP_MC, MC_ERASE)
287287
int status = CRYPTO_LIB_SUCCESS;
288288

289289
// NOTE: Added Transfer Frame header to the plaintext
290-
char *buffer_ERASE_h = "2003001800ff00001880d2c70008197f0b00340000b1fe312855";
290+
char *buffer_ERASE_h = "2003001800ff00001980d2c70008197f0b00340000b1fe312855";
291291

292292
uint8_t *buffer_ERASE_b = NULL;
293293
int buffer_ERASE_len = 0;
@@ -369,7 +369,7 @@ UTEST(EP_MC, MC_SELF_TEST)
369369
int status = CRYPTO_LIB_SUCCESS;
370370

371371
// NOTE: Added Transfer Frame header to the plaintext
372-
char *buffer_SELF_h = "2003001800ff00001880d2c70008197f0b00350000b1fe312855";
372+
char *buffer_SELF_h = "2003001800ff00001980d2c70008197f0b00350000b1fe312855";
373373

374374
uint8_t *buffer_SELF_b = NULL;
375375
int buffer_SELF_len = 0;
@@ -452,7 +452,7 @@ UTEST(EP_MC, MC_ALARM_FLAG_RESET)
452452
int status = CRYPTO_LIB_SUCCESS;
453453

454454
// NOTE: Added Transfer Frame header to the plaintext
455-
char *buffer_ALARM_h = "2003001800ff00001880d2c70008197f0b00370000b1fe312855";
455+
char *buffer_ALARM_h = "2003001800ff00001980d2c70008197f0b00370000b1fe312855";
456456

457457
uint8_t *buffer_ALARM_b = NULL;
458458
int buffer_ALARM_len = 0;

0 commit comments

Comments
 (0)