tests: Allow group 25 to fail in ap_wpa2_eap_pwd_groups with BoringSSL
authorJouni Malinen <jouni@qca.qualcomm.com>
Tue, 18 Aug 2015 16:52:38 +0000 (19:52 +0300)
committerJouni Malinen <j@w1.fi>
Tue, 18 Aug 2015 16:52:38 +0000 (19:52 +0300)
It looks like NID_X9_62_prime192v1 is not available, so allow that group
to fail without failing the full ap_wpa2_eap_pwd_groups test case.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
tests/hwsim/test_ap_eap.py

index 1fc0bfd..4ea4743 100644 (file)
@@ -1864,6 +1864,7 @@ def test_ap_wpa2_eap_pwd_nthash(dev, apdev):
 def test_ap_wpa2_eap_pwd_groups(dev, apdev):
     """WPA2-Enterprise connection using various EAP-pwd groups"""
     check_eap_capa(dev[0], "PWD")
+    tls = dev[0].request("GET tls_library")
     params = { "ssid": "test-wpa2-eap", "wpa": "2", "wpa_key_mgmt": "WPA-EAP",
                "rsn_pairwise": "CCMP", "ieee8021x": "1",
                "eap_server": "1", "eap_user_file": "auth_serv/eap_user.conf" }
@@ -1871,7 +1872,16 @@ def test_ap_wpa2_eap_pwd_groups(dev, apdev):
         params['pwd_group'] = str(i)
         hostapd.add_ap(apdev[0]['ifname'], params)
         dev[0].request("REMOVE_NETWORK all")
-        eap_connect(dev[0], apdev[0], "PWD", "pwd user", password="secret password")
+        try:
+            eap_connect(dev[0], apdev[0], "PWD", "pwd user",
+                        password="secret password")
+        except:
+            if "BoringSSL" in tls and i in [ 25 ]:
+                logger.info("Ignore connection failure with group %d with BoringSSL" % i)
+                dev[0].request("DISCONNECT")
+                time.sleep(0.1)
+                continue
+            raise
 
 def test_ap_wpa2_eap_pwd_invalid_group(dev, apdev):
     """WPA2-Enterprise connection using invalid EAP-pwd group"""