diff options
author | 2020-02-01 14:39:19 +0100 | |
---|---|---|
committer | 2020-02-01 14:39:19 +0100 | |
commit | dcd567c08f126b09548a98df0468ef1fe86d9f0a (patch) | |
tree | 2786e76e656739d4f6cdc260a0378751735265ee /src/wireguard/handshake/macs.rs | |
parent | Fixed typo in under load code (diff) | |
download | wireguard-rs-dcd567c08f126b09548a98df0468ef1fe86d9f0a.tar.xz wireguard-rs-dcd567c08f126b09548a98df0468ef1fe86d9f0a.zip |
Squashed commit of the following:
commit 1e26a0bef44e65023a97a16ecf3b123e688d19f7
Author: Mathias Hall-Andersen <mathias@hall-andersen.dk>
Date: Sat Feb 1 14:36:50 2020 +0100
Initial version of sticky sockets for Linux
commit 605cc656ad235d09ba6cd12d03dee2c5e0a9a80a
Author: Mathias Hall-Andersen <mathias@hall-andersen.dk>
Date: Thu Jan 30 14:57:00 2020 +0100
Clear src when sendmsg fails with EINVAL
commit dffd2b228af70f681e2a161642bbdaa348419bf3
Author: Mathias Hall-Andersen <mathias@hall-andersen.dk>
Date: Sun Jan 26 14:01:28 2020 +0100
Fix typoes
commit 2015663706fbe15ed1ac443a31de86b3e6c643c7
Author: Mathias Hall-Andersen <mathias@hall-andersen.dk>
Date: Sun Jan 26 13:51:59 2020 +0100
Restructure of public key -> peer state
Restructured the mapping of public keys to peer state in the project.
The handshake device is now generic over an opaque type,
which enables it to be the sole place where public keys are mapped to
the peer states.
This gets rid of the "peer" map in the WireGuard devices
and avoids having to include the public key in the handshake peer state.
commit bbcfaad4bcc5cf16bacdef0cefe7d29ba1519a23
Author: Mathias Hall-Andersen <mathias@hall-andersen.dk>
Date: Fri Jan 10 21:10:27 2020 +0100
Fixed bind6 also binding on IPv4
commit acbca236b70598c20c24de474690bcad883241d4
Author: Mathias Hall-Andersen <mathias@hall-andersen.dk>
Date: Thu Jan 9 11:24:13 2020 +0100
Work on sticky sockets
Diffstat (limited to 'src/wireguard/handshake/macs.rs')
-rw-r--r-- | src/wireguard/handshake/macs.rs | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/src/wireguard/handshake/macs.rs b/src/wireguard/handshake/macs.rs index 689826b..cb5d7d4 100644 --- a/src/wireguard/handshake/macs.rs +++ b/src/wireguard/handshake/macs.rs @@ -286,8 +286,7 @@ mod tests { use x25519_dalek::StaticSecret; fn new_validator_generator() -> (Validator, Generator) { - let mut rng = OsRng::new().unwrap(); - let sk = StaticSecret::new(&mut rng); + let sk = StaticSecret::new(&mut OsRng); let pk = PublicKey::from(&sk); (Validator::new(pk), Generator::new(pk)) } @@ -296,7 +295,6 @@ mod tests { #[test] fn test_cookie_reply(inner1 : Vec<u8>, inner2 : Vec<u8>, receiver : u32) { let mut msg = CookieReply::default(); - let mut rng = OsRng::new().expect("failed to create rng"); let mut macs = MacsFooter::default(); let src = "192.0.2.16:8080".parse().unwrap(); let (validator, mut generator) = new_validator_generator(); @@ -309,7 +307,7 @@ mod tests { // check validity of mac1 validator.check_mac1(&inner1[..], &macs).expect("mac1 of inner1 did not validate"); assert_eq!(validator.check_mac2(&inner1[..], &src, &macs), false, "mac2 of inner2 did not validate"); - validator.create_cookie_reply(&mut rng, receiver, &src, &macs, &mut msg); + validator.create_cookie_reply(&mut OsRng, receiver, &src, &macs, &mut msg); // consume cookie reply generator.process(&msg).expect("failed to process CookieReply"); |