From patchwork Thu Apr 4 18:16:30 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juliusz Sosinowicz X-Patchwork-Id: 1919912 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=tc/0ouuD; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=wolfssl-com.20230601.gappssmtp.com header.i=@wolfssl-com.20230601.gappssmtp.com header.a=rsa-sha256 header.s=20230601 header.b=fD84uJwP; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=patchwork.ozlabs.org) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4V9VHn286Lz1yYf for ; Fri, 5 Apr 2024 05:19:01 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=Ff27jsq7DLoN6V5IexesT1qb6usxXzsGPRJ0701xBDM=; b=tc/0ouuDUVFMgR LS2u6xb1tfA45dt60Hz3vqwfw2WEQ3tREorLd0rfIWauQHXJo8/dgFaSDzHU7XD0bOrqjpCQ5UKAo NXbLrW0R2LzKGaimSlCDa4EtwNm/kW9KooFHUVFhi0yl22CMZAxJiJBP1QU4KMH8FpFm391l/6p5j tu2csfAfAKonqSKlbUDhA3asIXiI+NS9VyVanyjFFRQNUenIkhv1LXcDBWAvY8V/wn4DgtKwuA7sg 3FjXw+TMAQFv/3qCAVqHQrhPSenV/744GVPwiiNG0B8mvaXi2maLY5Gj+tcFRcRG3v794wOtJc7OW IbbXbEeuP1RPcMiuVd2Q==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1rsRfZ-00000003nqR-2RGY; Thu, 04 Apr 2024 18:18:37 +0000 Received: from mail-ed1-x529.google.com ([2a00:1450:4864:20::529]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1rsReM-00000003mrn-1MnC for hostap@lists.infradead.org; Thu, 04 Apr 2024 18:17:26 +0000 Received: by mail-ed1-x529.google.com with SMTP id 4fb4d7f45d1cf-56dc9955091so1490494a12.1 for ; Thu, 04 Apr 2024 11:17:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wolfssl-com.20230601.gappssmtp.com; s=20230601; t=1712254640; x=1712859440; darn=lists.infradead.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=NgHwYbryam0D79tGpRmyKtKOSumMCZ/Qjqawd6PEK38=; b=fD84uJwP0xvN2bbKdgNCfLxUw/sWLJTU3FAQHEYD67jFhAEe60k2+sXArMuxwR7bfr saQpIZCmnC28qlrsby6I4pPHzgOzo7fwz64818H3JstOmiJ/scAZchVoHZ3yOdHjY0Ga 14kFV5CIl7T34aN3JBkbT8Aj6Sz1raJUE0vY5Q+AOBcKqBUmKE0oKD6nDuL9W6uxvRfO bdbs2i3ZS+VvdKyXklp8uSCegiTHW86UXFGLYFY3CaTcWZWBqd2OdGnabQ9QhsRhLvEH OKbeWzexUGnK14AOz+NuLUS8rGAE04YKjxIf2jjL4Zdeu4bjxG77wCdO2wQuZ1dD34Vn 26gw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712254640; x=1712859440; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=NgHwYbryam0D79tGpRmyKtKOSumMCZ/Qjqawd6PEK38=; b=m2hrmLJYbz85aauXT3g4DFsIXmKb9AhQtNYuDaGMFojI2Wlyla56IpKact+oCt9Iy8 IXFLvxlzyuxM8kZLLJxbsa8vGe1TYH/O1OGU4Vsykq3iQeYsVB+Euh6qmhHjc50EuNpz 0FmkOM+t/w+5I6BMVI+CpYuKut6aVhHffVyjPg7+A8TCfyL91ofSh3FsbD52u1WmtuAT x/IwAwDbMo0uvA7YvpJvHihrFd/yBB4TfDVQndtHA+MbpvAYBFHjBAz1qIGAplHWDu1u qFkwp0FtuDh/jdSeVg17P0Ea+CTrqO0GOIq/uooNGsNic/g/YdAsF0o8qyPNFHyhtXUO l3EQ== X-Gm-Message-State: AOJu0YybcqPPwS4Nk0Kg4A7w3DHe8oQhC17JUi21yEen5XJd0WqmrLRM hGu1GxO4jnbMKgRuGY2hOd67erlX+h9j7VZnVDKFzkSiznegTxWjBfuF834Trak4pOKtSMzboWe +ouU= X-Google-Smtp-Source: AGHT+IExtcOmg8LoKGbHYDJQH1IG3mdH+n3hvER/eOtW90O5eaRLRP+EJD95SLp4iZW2pyNc8W7VoA== X-Received: by 2002:a50:99db:0:b0:56b:9f82:4a40 with SMTP id n27-20020a5099db000000b0056b9f824a40mr2512680edb.11.1712254640331; Thu, 04 Apr 2024 11:17:20 -0700 (PDT) Received: from localhost.localdomain ([82.118.30.15]) by smtp.gmail.com with ESMTPSA id dh26-20020a0564021d3a00b0056e0b358e86sm1976349edb.97.2024.04.04.11.17.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Apr 2024 11:17:19 -0700 (PDT) From: Juliusz Sosinowicz To: hostap@lists.infradead.org Cc: Juliusz Sosinowicz Subject: [PATCH 24/24] wolfSSL: test_ap_wpa2_eap_fast_server_oom Date: Thu, 4 Apr 2024 20:16:30 +0200 Message-Id: <20240404181630.2431991-24-juliusz@wolfssl.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240404181630.2431991-1-juliusz@wolfssl.com> References: <20240404181630.2431991-1-juliusz@wolfssl.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240404_111723_625363_B2CDCA43 X-CRM114-Status: GOOD ( 10.93 ) X-Spam-Score: 0.0 (/) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: wolfSSL sends the session ticket extension on the first TLS handshake. This causes the malloc error to be triggered on the first connection instead of the second and the failure event is not registere [...] Content analysis details: (0.0 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2a00:1450:4864:20:0:0:0:529 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid X-BeenThere: hostap@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "Hostap" Errors-To: hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org wolfSSL sends the session ticket extension on the first TLS handshake. This causes the malloc error to be triggered on the first connection instead of the second and the failure event is not registered in the python test. Signed-off-by: Juliusz Sosinowicz --- tests/hwsim/test_ap_eap.py | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 580660e592..9b1ca119b7 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -4277,6 +4277,9 @@ def test_ap_wpa2_eap_fast_prf_oom(dev, apdev): def test_ap_wpa2_eap_fast_server_oom(dev, apdev): """EAP-FAST/MSCHAPv2 and server OOM""" check_eap_capa(dev[0], "FAST") + tls = dev[0].request("GET tls_library") + if not tls.startswith("OpenSSL"): + raise HwsimSkip("TLS library is not OpenSSL: " + tls) params = int_eap_server_params() params['dh_file'] = 'auth_serv/dh.conf'