tests: ap_wpa_ie_parsing to allow EAPOL-Key msg 2/4 rejection
Once mac80211 starts reporting the used Association Request frame IEs in the association event, wpa_supplicant will update RSN supplicant IE information based on that and that will make the AP reject EAPOL-Key msg 2/4 in this particular test scenario due to the hack of including two RSN IEs in the Association Request frame. Accept this sequence as a valid test execution in addition to the previously expected connection to avoid reporting incorrect failures. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
b4788908ca
commit
dd12e58e5f
1 changed files with 4 additions and 1 deletions
|
@ -2712,7 +2712,10 @@ def test_ap_wpa_ie_parsing(dev, apdev):
|
||||||
if "OK" not in dev[0].request("VENDOR_ELEM_ADD 13 " + t):
|
if "OK" not in dev[0].request("VENDOR_ELEM_ADD 13 " + t):
|
||||||
raise Exception("VENDOR_ELEM_ADD failed")
|
raise Exception("VENDOR_ELEM_ADD failed")
|
||||||
dev[0].select_network(id)
|
dev[0].select_network(id)
|
||||||
dev[0].wait_connected()
|
ev = dev[0].wait_event(['CTRL-EVENT-CONNECTED',
|
||||||
|
'WPA: 4-Way Handshake failed'], timeout=10)
|
||||||
|
if ev is None:
|
||||||
|
raise Exception("Association failed unexpectedly")
|
||||||
dev[0].request("DISCONNECT")
|
dev[0].request("DISCONNECT")
|
||||||
dev[0].dump_monitor()
|
dev[0].dump_monitor()
|
||||||
finally:
|
finally:
|
||||||
|
|
Loading…
Reference in a new issue