]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Use sha256_prf_bits for failure stack matching
authorBenjamin Berg <benjamin.berg@intel.com>
Fri, 14 Jun 2024 08:13:48 +0000 (10:13 +0200)
committerJouni Malinen <j@w1.fi>
Thu, 11 Jul 2024 16:51:29 +0000 (19:51 +0300)
It seems that sha256_prf may not always be in the stack trace for
failure checking, possibly due to tail call optimization as it simply
calls sha256_prf_bits with updated parameters. Simply match against
sha256_prf_bits directly to avoid issues due to optimizations.

Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
tests/hwsim/test_ap_psk.py
tests/hwsim/test_sae.py

index 9e34e7b6df99134947ab9f43aa7598faa879f25f..085619f0d32bd361013deab7ea88c98a9b43ae51 100644 (file)
@@ -3418,7 +3418,7 @@ def test_ap_wpa2_psk_local_error(dev, apdev):
         dev[0].request("REMOVE_NETWORK all")
         dev[0].dump_monitor()
 
-    with fail_test(dev[0], 1, "sha256_prf;wpa_pmk_to_ptk"):
+    with fail_test(dev[0], 1, "sha256_prf_bits;wpa_pmk_to_ptk"):
         id = dev[0].connect(ssid, key_mgmt="WPA-PSK-SHA256", psk=passphrase,
                             scan_freq="2412", wait_connect=False)
         ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5)
index b55673493678be66e56abdba8ddbd8e4cc126ee0..aed52d0f7aca2063faa49208cf46c659b2bc6487 100644 (file)
@@ -1610,7 +1610,7 @@ def test_sae_bignum_failure(dev, apdev):
              (2, "crypto_ec_point_mul;sae_derive_k_ecc"),
              (1, "crypto_ec_point_to_bin;sae_derive_k_ecc"),
              (1, "crypto_bignum_legendre;dragonfly_get_random_qr_qnr"),
-             (1, "sha256_prf;sae_derive_keys"),
+             (1, "sha256_prf_bits;sae_derive_keys"),
              (1, "crypto_bignum_init;sae_derive_keys"),
              (1, "crypto_bignum_init_set;sae_parse_commit_scalar"),
              (1, "crypto_bignum_to_bin;sae_parse_commit_element_ecc"),