]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: ap_wpa_ie_parsing to allow EAPOL-Key msg 2/4 rejection
authorJouni Malinen <jouni@codeaurora.org>
Fri, 15 Feb 2019 00:06:46 +0000 (02:06 +0200)
committerJouni Malinen <j@w1.fi>
Fri, 15 Feb 2019 00:09:41 +0000 (02:09 +0200)
Once mac80211 starts reporting the used Association Request frame IEs in
the association event, wpa_supplicant will update RSN supplicant IE
information based on that and that will make the AP reject EAPOL-Key msg
2/4 in this particular test scenario due to the hack of including two
RSN IEs in the Association Request frame. Accept this sequence as a
valid test execution in addition to the previously expected connection
to avoid reporting incorrect failures.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
tests/hwsim/test_ap_psk.py

index 9af31e24a2dec9b839fd8ce0d071a82a2e51f138..5540f734a2fb47b63ee0ca1d2cf843b72baa4171 100644 (file)
@@ -2712,7 +2712,10 @@ def test_ap_wpa_ie_parsing(dev, apdev):
             if "OK" not in dev[0].request("VENDOR_ELEM_ADD 13 " + t):
                 raise Exception("VENDOR_ELEM_ADD failed")
             dev[0].select_network(id)
-            dev[0].wait_connected()
+            ev = dev[0].wait_event(['CTRL-EVENT-CONNECTED',
+                                    'WPA: 4-Way Handshake failed'], timeout=10)
+            if ev is None:
+                raise Exception("Association failed unexpectedly")
             dev[0].request("DISCONNECT")
             dev[0].dump_monitor()
         finally: