aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJouni Malinen <jouni@qca.qualcomm.com>2016-03-21 11:12:10 (GMT)
committerJouni Malinen <j@w1.fi>2016-03-21 11:12:10 (GMT)
commit71666dc33a29e052e97155891ee9e8bd5507fa94 (patch)
treecf4b9f470e9f9350fd064c34bf6823ce0fd733a8
parentd4944fad72859606ea9fb7a6cca23cd49f19fd91 (diff)
downloadhostap-71666dc33a29e052e97155891ee9e8bd5507fa94.zip
hostap-71666dc33a29e052e97155891ee9e8bd5507fa94.tar.gz
hostap-71666dc33a29e052e97155891ee9e8bd5507fa94.tar.bz2
tests: Allow RC4-SHA failure in ap_wpa2_eap_fast_cipher_suites
This needs to be allowed with OpenSSL 1.1.0 since the RC4-based cipher has been disabled by default. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
-rw-r--r--tests/hwsim/test_ap_eap.py22
1 files changed, 17 insertions, 5 deletions
diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py
index e3c644a..3146771 100644
--- a/tests/hwsim/test_ap_eap.py
+++ b/tests/hwsim/test_ap_eap.py
@@ -3437,11 +3437,23 @@ def test_ap_wpa2_eap_fast_cipher_suites(dev, apdev):
"AES256-SHA",
"DHE-RSA-AES256-SHA" ]
for cipher in tests:
- eap_connect(dev[0], apdev[0], "FAST", "user",
- openssl_ciphers=cipher,
- anonymous_identity="FAST", password="password",
- ca_cert="auth_serv/ca.pem", phase2="auth=GTC",
- pac_file="blob://fast_pac_ciphers")
+ dev[0].dump_monitor()
+ logger.info("Testing " + cipher)
+ try:
+ eap_connect(dev[0], apdev[0], "FAST", "user",
+ openssl_ciphers=cipher,
+ anonymous_identity="FAST", password="password",
+ ca_cert="auth_serv/ca.pem", phase2="auth=GTC",
+ pac_file="blob://fast_pac_ciphers")
+ except Exception, e:
+ if "Could not select EAP method" in str(e) and cipher == "RC4-SHA":
+ tls = dev[0].request("GET tls_library")
+ if "run=OpenSSL 1.1" in tls:
+ logger.info("Allow failure due to missing TLS library support")
+ dev[0].request("REMOVE_NETWORK all")
+ dev[0].wait_disconnected()
+ continue
+ raise
res = dev[0].get_status_field('EAP TLS cipher')
dev[0].request("REMOVE_NETWORK all")
dev[0].wait_disconnected()