From 969e5250914e627ffb704966f93d2e7cc986ea20 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Wed, 21 Dec 2016 12:31:20 +0200 Subject: [PATCH] tests: Skip eap_tls_pkcs8_pkcs5_v15 with BoringSSL It does not look like BoringSSL allows pbeWithMD5AndDES-CBC to be used to protect the local private key, so skip this test case. Signed-off-by: Jouni Malinen --- tests/hwsim/test_ap_eap.py | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 9c5260c8d..a82ea088e 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -80,6 +80,11 @@ def check_ocsp_support(dev): #if "BoringSSL" in tls: # raise HwsimSkip("OCSP not supported with this TLS library: " + tls) +def check_pkcs5_v15_support(dev): + tls = dev.request("GET tls_library") + if "BoringSSL" in tls: + raise HwsimSkip("PKCS#5 v1.5 not supported with this TLS library: " + tls) + def check_ocsp_multi_support(dev): tls = dev.request("GET tls_library") if not tls.startswith("internal"): @@ -1848,6 +1853,7 @@ def test_eap_tls_pkcs8_pkcs5_v2_des3(dev, apdev): def test_eap_tls_pkcs8_pkcs5_v15(dev, apdev): """WPA2-Enterprise connection using EAP-TLS and PKCS #8, PKCS #5 v1.5 key""" + check_pkcs5_v15_support(dev[0]) params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") hapd = hostapd.add_ap(apdev[0], params) eap_connect(dev[0], hapd, "TLS", "tls user", ca_cert="auth_serv/ca.pem",