]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Skip PKCS#12 tests with internal TLS client implementation
authorJouni Malinen <j@w1.fi>
Sun, 29 Nov 2015 19:07:39 +0000 (21:07 +0200)
committerJouni Malinen <j@w1.fi>
Sun, 29 Nov 2015 19:07:39 +0000 (21:07 +0200)
Signed-off-by: Jouni Malinen <j@w1.fi>
tests/hwsim/test_ap_eap.py

index 5c45b36151d99761a6d661901eee5e79c27da690..a0b49760608882343b6184ce379804186de8965e 100644 (file)
@@ -67,6 +67,11 @@ def check_ocsp_support(dev):
     #if "BoringSSL" in tls:
     #    raise HwsimSkip("OCSP not supported with this TLS library: " + tls)
 
+def check_pkcs12_support(dev):
+    tls = dev.request("GET tls_library")
+    if tls.startswith("internal"):
+        raise HwsimSkip("PKCS#12 not supported with this TLS library: " + tls)
+
 def read_pem(fname):
     with open(fname, "r") as f:
         lines = f.readlines()
@@ -1355,6 +1360,7 @@ def test_ap_wpa2_eap_tls_blob(dev, apdev):
 
 def test_ap_wpa2_eap_tls_pkcs12(dev, apdev):
     """WPA2-Enterprise connection using EAP-TLS and PKCS#12"""
+    check_pkcs12_support(dev[0])
     params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
     hostapd.add_ap(apdev[0]['ifname'], params)
     eap_connect(dev[0], apdev[0], "TLS", "tls user", ca_cert="auth_serv/ca.pem",
@@ -1392,6 +1398,7 @@ def test_ap_wpa2_eap_tls_pkcs12(dev, apdev):
 
 def test_ap_wpa2_eap_tls_pkcs12_blob(dev, apdev):
     """WPA2-Enterprise connection using EAP-TLS and PKCS#12 from configuration blob"""
+    check_pkcs12_support(dev[0])
     params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
     hostapd.add_ap(apdev[0]['ifname'], params)
     cert = read_pem("auth_serv/ca.pem")