tests: Skip ap_wpa2_eap_psk_oom and ap_ft_oom in FIPS mode

omac1_aes_128() implementation within crypto_openssl.c is used in this
case and that cannot fail the memory allocation similarly to the
non-FIPS case and aes-omac1.c.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2015-08-01 21:37:24 +03:00
parent 06cdd1cd79
commit 38934ed100
2 changed files with 3 additions and 1 deletions

View file

@ -2142,6 +2142,7 @@ def test_ap_wpa2_eap_psk(dev, apdev):
def test_ap_wpa2_eap_psk_oom(dev, apdev):
"""WPA2-Enterprise connection using EAP-PSK and OOM"""
skip_with_fips(dev[0])
params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
hostapd.add_ap(apdev[0]['ifname'], params)
tests = [ (1, "aes_128_ctr_encrypt;aes_128_eax_encrypt"),

View file

@ -13,7 +13,7 @@ logger = logging.getLogger()
import hwsim_utils
import hostapd
from utils import HwsimSkip, alloc_fail, fail_test
from utils import HwsimSkip, alloc_fail, fail_test, skip_with_fips
from wlantest import Wlantest
from test_ap_psk import check_mib, find_wpas_process, read_process_memory, verify_not_present, get_key_locations
@ -748,6 +748,7 @@ def test_ap_ft_gcmp_256(dev, apdev):
def test_ap_ft_oom(dev, apdev):
"""WPA2-PSK-FT and OOM"""
skip_with_fips(dev[0])
ssid = "test-ft"
passphrase="12345678"