diff options
author | Jouni Malinen <jouni@qca.qualcomm.com> | 2017-01-13 22:05:47 (GMT) |
---|---|---|
committer | Jouni Malinen <j@w1.fi> | 2017-01-13 22:05:47 (GMT) |
commit | 1e40cf22f436534de3882258018367b8f3232703 (patch) | |
tree | b95ad0b8d49d251eeb3d11a74c8abf44fe056046 /tests | |
parent | 7f2905e0dabcdbabd943a78bae9b2d6de9d101cc (diff) | |
download | hostap-1e40cf22f436534de3882258018367b8f3232703.zip hostap-1e40cf22f436534de3882258018367b8f3232703.tar.gz hostap-1e40cf22f436534de3882258018367b8f3232703.tar.bz2 |
tests: Fix peerkey_sniffer_check with tshark 1.10.6
It looks like the previous mechanism for catching older tshark versions
for EAPOL-Key key info field was not sufficient. Fix that to cover the
version used in Ubuntu 14.04.
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/hwsim/test_peerkey.py | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/tests/hwsim/test_peerkey.py b/tests/hwsim/test_peerkey.py index ec18285..74c8102 100644 --- a/tests/hwsim/test_peerkey.py +++ b/tests/hwsim/test_peerkey.py @@ -79,6 +79,15 @@ def test_peerkey_sniffer_check(dev, apdev, params): pass else: raise + if not try_other: + found = False + for pkt in out.splitlines(): + sa, da, key_info = pkt.split('\t') + if key_info != '': + found = True + break + if not found: + try_other = True if try_other: out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"), "eapol.type == 3", |