mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
tests: Skip ap_wpa2_eap_psk_oom and ap_ft_oom in FIPS mode
omac1_aes_128() implementation within crypto_openssl.c is used in this case and that cannot fail the memory allocation similarly to the non-FIPS case and aes-omac1.c. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
06cdd1cd79
commit
38934ed100
@ -2142,6 +2142,7 @@ def test_ap_wpa2_eap_psk(dev, apdev):
|
||||
|
||||
def test_ap_wpa2_eap_psk_oom(dev, apdev):
|
||||
"""WPA2-Enterprise connection using EAP-PSK and OOM"""
|
||||
skip_with_fips(dev[0])
|
||||
params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
|
||||
hostapd.add_ap(apdev[0]['ifname'], params)
|
||||
tests = [ (1, "aes_128_ctr_encrypt;aes_128_eax_encrypt"),
|
||||
|
@ -13,7 +13,7 @@ logger = logging.getLogger()
|
||||
|
||||
import hwsim_utils
|
||||
import hostapd
|
||||
from utils import HwsimSkip, alloc_fail, fail_test
|
||||
from utils import HwsimSkip, alloc_fail, fail_test, skip_with_fips
|
||||
from wlantest import Wlantest
|
||||
from test_ap_psk import check_mib, find_wpas_process, read_process_memory, verify_not_present, get_key_locations
|
||||
|
||||
@ -748,6 +748,7 @@ def test_ap_ft_gcmp_256(dev, apdev):
|
||||
|
||||
def test_ap_ft_oom(dev, apdev):
|
||||
"""WPA2-PSK-FT and OOM"""
|
||||
skip_with_fips(dev[0])
|
||||
ssid = "test-ft"
|
||||
passphrase="12345678"
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user