mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-01-17 18:34:03 -05:00
tests: Allow RC4-SHA failure in ap_wpa2_eap_fast_cipher_suites
This needs to be allowed with OpenSSL 1.1.0 since the RC4-based cipher has been disabled by default. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
d4944fad72
commit
71666dc33a
@ -3437,11 +3437,23 @@ def test_ap_wpa2_eap_fast_cipher_suites(dev, apdev):
|
|||||||
"AES256-SHA",
|
"AES256-SHA",
|
||||||
"DHE-RSA-AES256-SHA" ]
|
"DHE-RSA-AES256-SHA" ]
|
||||||
for cipher in tests:
|
for cipher in tests:
|
||||||
eap_connect(dev[0], apdev[0], "FAST", "user",
|
dev[0].dump_monitor()
|
||||||
openssl_ciphers=cipher,
|
logger.info("Testing " + cipher)
|
||||||
anonymous_identity="FAST", password="password",
|
try:
|
||||||
ca_cert="auth_serv/ca.pem", phase2="auth=GTC",
|
eap_connect(dev[0], apdev[0], "FAST", "user",
|
||||||
pac_file="blob://fast_pac_ciphers")
|
openssl_ciphers=cipher,
|
||||||
|
anonymous_identity="FAST", password="password",
|
||||||
|
ca_cert="auth_serv/ca.pem", phase2="auth=GTC",
|
||||||
|
pac_file="blob://fast_pac_ciphers")
|
||||||
|
except Exception, e:
|
||||||
|
if "Could not select EAP method" in str(e) and cipher == "RC4-SHA":
|
||||||
|
tls = dev[0].request("GET tls_library")
|
||||||
|
if "run=OpenSSL 1.1" in tls:
|
||||||
|
logger.info("Allow failure due to missing TLS library support")
|
||||||
|
dev[0].request("REMOVE_NETWORK all")
|
||||||
|
dev[0].wait_disconnected()
|
||||||
|
continue
|
||||||
|
raise
|
||||||
res = dev[0].get_status_field('EAP TLS cipher')
|
res = dev[0].get_status_field('EAP TLS cipher')
|
||||||
dev[0].request("REMOVE_NETWORK all")
|
dev[0].request("REMOVE_NETWORK all")
|
||||||
dev[0].wait_disconnected()
|
dev[0].wait_disconnected()
|
||||||
|
Loading…
Reference in New Issue
Block a user