tests: Fix ap_wpa2_eap_too_many_roundtrips with OpenSSL 1.1.0
authorJouni Malinen <j@w1.fi>
Fri, 15 Jul 2016 09:40:16 +0000 (12:40 +0300)
committerJouni Malinen <j@w1.fi>
Fri, 15 Jul 2016 10:30:57 +0000 (13:30 +0300)
Use a smaller fragment_size to force the roundtrip limit to be reached
with OpenSSL 1.1.0 which seemed to result in a bit shorter TLS messages
being used and being able to complete the authentication successfully
with the previously used fragment_size value.

Signed-off-by: Jouni Malinen <j@w1.fi>
tests/hwsim/test_ap_eap.py

index a0e25ef..3f10de2 100644 (file)
@@ -4451,9 +4451,10 @@ def test_ap_wpa2_eap_too_many_roundtrips(dev, apdev):
                    wait_connect=False, scan_freq="2412", ieee80211w="1",
                    anonymous_identity="ttls", password="password",
                    ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAP",
-                   fragment_size="10")
-    ev = dev[0].wait_event(["EAP: more than"], timeout=20)
-    if ev is None:
+                   fragment_size="8")
+    ev = dev[0].wait_event(["EAP: more than",
+                            "CTRL-EVENT-EAP-SUCCESS"], timeout=20)
+    if ev is None or "EAP: more than" not in ev:
         raise Exception("EAP roundtrip limit not reached")
 
 def test_ap_wpa2_eap_expanded_nak(dev, apdev):