From 78d2233f011760d48ad4f870f3adc0fbdd887340 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Fri, 15 Jul 2016 12:40:16 +0300 Subject: [PATCH] tests: Fix ap_wpa2_eap_too_many_roundtrips with OpenSSL 1.1.0 Use a smaller fragment_size to force the roundtrip limit to be reached with OpenSSL 1.1.0 which seemed to result in a bit shorter TLS messages being used and being able to complete the authentication successfully with the previously used fragment_size value. Signed-off-by: Jouni Malinen --- tests/hwsim/test_ap_eap.py | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index a0e25ef77..3f10de263 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -4451,9 +4451,10 @@ def test_ap_wpa2_eap_too_many_roundtrips(dev, apdev): wait_connect=False, scan_freq="2412", ieee80211w="1", anonymous_identity="ttls", password="password", ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAP", - fragment_size="10") - ev = dev[0].wait_event(["EAP: more than"], timeout=20) - if ev is None: + fragment_size="8") + ev = dev[0].wait_event(["EAP: more than", + "CTRL-EVENT-EAP-SUCCESS"], timeout=20) + if ev is None or "EAP: more than" not in ev: raise Exception("EAP roundtrip limit not reached") def test_ap_wpa2_eap_expanded_nak(dev, apdev):