]> git.ipfire.org Git - thirdparty/hostap.git/commit
tests: ap_wpa_ie_parsing to allow EAPOL-Key msg 2/4 rejection
authorJouni Malinen <jouni@codeaurora.org>
Fri, 15 Feb 2019 00:06:46 +0000 (02:06 +0200)
committerJouni Malinen <j@w1.fi>
Fri, 15 Feb 2019 00:09:41 +0000 (02:09 +0200)
commitdd12e58e5faa9013fadeef8aee9ea48f70211145
treed1bdf2a12837f461b7f861d59d848e4875f1dbbd
parentb4788908cacaa8318d7f0ea31d2f91e05a7689a3
tests: ap_wpa_ie_parsing to allow EAPOL-Key msg 2/4 rejection

Once mac80211 starts reporting the used Association Request frame IEs in
the association event, wpa_supplicant will update RSN supplicant IE
information based on that and that will make the AP reject EAPOL-Key msg
2/4 in this particular test scenario due to the hack of including two
RSN IEs in the Association Request frame. Accept this sequence as a
valid test execution in addition to the previously expected connection
to avoid reporting incorrect failures.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
tests/hwsim/test_ap_psk.py