tests: Fix peerkey_sniffer_check with tshark 1.10.6

It looks like the previous mechanism for catching older tshark versions
for EAPOL-Key key info field was not sufficient. Fix that to cover the
version used in Ubuntu 14.04.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
Jouni Malinen 2017-01-14 00:05:47 +02:00 committed by Jouni Malinen
parent 7f2905e0da
commit 1e40cf22f4

View file

@ -79,6 +79,15 @@ def test_peerkey_sniffer_check(dev, apdev, params):
pass
else:
raise
if not try_other:
found = False
for pkt in out.splitlines():
sa, da, key_info = pkt.split('\t')
if key_info != '':
found = True
break
if not found:
try_other = True
if try_other:
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
"eapol.type == 3",