From: Jouni Malinen Date: Tue, 18 Aug 2015 16:52:38 +0000 (+0300) Subject: tests: Allow group 25 to fail in ap_wpa2_eap_pwd_groups with BoringSSL X-Git-Tag: hostap_2_5~134 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=5f2e454790f82e5070919e1de9a037dbb6a8e711;p=thirdparty%2Fhostap.git tests: Allow group 25 to fail in ap_wpa2_eap_pwd_groups with BoringSSL It looks like NID_X9_62_prime192v1 is not available, so allow that group to fail without failing the full ap_wpa2_eap_pwd_groups test case. Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 1fc0bfd4b..4ea474369 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -1864,6 +1864,7 @@ def test_ap_wpa2_eap_pwd_nthash(dev, apdev): def test_ap_wpa2_eap_pwd_groups(dev, apdev): """WPA2-Enterprise connection using various EAP-pwd groups""" check_eap_capa(dev[0], "PWD") + tls = dev[0].request("GET tls_library") params = { "ssid": "test-wpa2-eap", "wpa": "2", "wpa_key_mgmt": "WPA-EAP", "rsn_pairwise": "CCMP", "ieee8021x": "1", "eap_server": "1", "eap_user_file": "auth_serv/eap_user.conf" } @@ -1871,7 +1872,16 @@ def test_ap_wpa2_eap_pwd_groups(dev, apdev): params['pwd_group'] = str(i) hostapd.add_ap(apdev[0]['ifname'], params) dev[0].request("REMOVE_NETWORK all") - eap_connect(dev[0], apdev[0], "PWD", "pwd user", password="secret password") + try: + eap_connect(dev[0], apdev[0], "PWD", "pwd user", + password="secret password") + except: + if "BoringSSL" in tls and i in [ 25 ]: + logger.info("Ignore connection failure with group %d with BoringSSL" % i) + dev[0].request("DISCONNECT") + time.sleep(0.1) + continue + raise def test_ap_wpa2_eap_pwd_invalid_group(dev, apdev): """WPA2-Enterprise connection using invalid EAP-pwd group"""