]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Skip ap_wpa2_eap_fast_server_oom with wolfSSL
authorJuliusz Sosinowicz <juliusz@wolfssl.com>
Thu, 4 Apr 2024 18:16:30 +0000 (20:16 +0200)
committerJouni Malinen <j@w1.fi>
Sun, 2 Feb 2025 17:33:48 +0000 (19:33 +0200)
wolfSSL sends the session ticket extension on the first TLS handshake.
This causes the malloc error to be triggered on the first connection
instead of the second and the failure event is not registered in this
test case.

Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
tests/hwsim/test_ap_eap.py

index 498883f1aea2b12fa3504609d8082b81145bb493..96b6d0f27c414c4af07e6eba01af54da1b1f8872 100644 (file)
@@ -4276,6 +4276,9 @@ def test_ap_wpa2_eap_fast_prf_oom(dev, apdev):
 def test_ap_wpa2_eap_fast_server_oom(dev, apdev):
     """EAP-FAST/MSCHAPv2 and server OOM"""
     check_eap_capa(dev[0], "FAST")
+    tls = dev[0].request("GET tls_library")
+    if not tls.startswith("OpenSSL"):
+        raise HwsimSkip("TLS library is not OpenSSL: " + tls)
 
     params = int_eap_server_params()
     params['dh_file'] = 'auth_serv/dh.conf'