]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Skip eap_tls_pkcs8_pkcs5_v15 with BoringSSL
authorJouni Malinen <jouni@qca.qualcomm.com>
Wed, 21 Dec 2016 10:31:20 +0000 (12:31 +0200)
committerJouni Malinen <j@w1.fi>
Wed, 21 Dec 2016 10:31:20 +0000 (12:31 +0200)
It does not look like BoringSSL allows pbeWithMD5AndDES-CBC to be used
to protect the local private key, so skip this test case.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
tests/hwsim/test_ap_eap.py

index 9c5260c8d8266dd200a375b9080f824f803e99c4..a82ea088e849725e8a328f5bf061def0851779c2 100644 (file)
@@ -80,6 +80,11 @@ def check_ocsp_support(dev):
     #if "BoringSSL" in tls:
     #    raise HwsimSkip("OCSP not supported with this TLS library: " + tls)
 
+def check_pkcs5_v15_support(dev):
+    tls = dev.request("GET tls_library")
+    if "BoringSSL" in tls:
+        raise HwsimSkip("PKCS#5 v1.5 not supported with this TLS library: " + tls)
+
 def check_ocsp_multi_support(dev):
     tls = dev.request("GET tls_library")
     if not tls.startswith("internal"):
@@ -1848,6 +1853,7 @@ def test_eap_tls_pkcs8_pkcs5_v2_des3(dev, apdev):
 
 def test_eap_tls_pkcs8_pkcs5_v15(dev, apdev):
     """WPA2-Enterprise connection using EAP-TLS and PKCS #8, PKCS #5 v1.5 key"""
+    check_pkcs5_v15_support(dev[0])
     params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
     hapd = hostapd.add_ap(apdev[0], params)
     eap_connect(dev[0], hapd, "TLS", "tls user", ca_cert="auth_serv/ca.pem",