The wolfSSL backend only does one malloc in
tls_connection_get_eap_fast_key(). Failing on the second one skips the
only malloc and fails the test.
Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
"""WPA2-Enterprise connection using EAP-FAST and OOM in PRF"""
check_eap_capa(dev[0], "FAST")
tls = dev[0].request("GET tls_library")
- if tls.startswith("OpenSSL") or tls.startswith("wolfSSL"):
+ if tls.startswith("OpenSSL"):
func = "tls_connection_get_eap_fast_key"
count = 2
+ elif tls.startswith("wolfSSL"):
+ func = "tls_connection_get_eap_fast_key"
+ count = 1
elif tls.startswith("internal"):
func = "tls_connection_prf"
count = 1