Message ID | 20240404181630.2431991-9-juliusz@wolfssl.com |
---|---|
State | New |
Headers | show
Return-Path: <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=fwZORd9u; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=wolfssl-com.20230601.gappssmtp.com header.i=@wolfssl-com.20230601.gappssmtp.com header.a=rsa-sha256 header.s=20230601 header.b=kn4HrYDg; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org; receiver=patchwork.ozlabs.org) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4V9VGQ4gysz1yYf for <incoming@patchwork.ozlabs.org>; Fri, 5 Apr 2024 05:17:50 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=GVKrEkxVdrsJNAoSyMog0vLFFapY+NwBcmhpjbuRKB4=; b=fwZORd9uOlBg7J CgUNz6f51Wr+nkxxsNAa3mP7H9aTpJcXWNC8AqxaFYPkJL9Pf+hYn46iblUPcLSqFoFuS5pYl4YJN b/P6CymJSsaLO3Kv3yqGfHvlKy6eU/lQSDASmpPCiS6W3XFdEv2uKaJX4+jSKkQAUcjhBLFgLx7w+ VWShCX4AgNievqtvaebnsEPGr8e9BAvtKiMSe1AqH3cMX1/jUF5KcUzA/ojbjnySdue3j+Bb8RVuq vKCO4YdS6guYBU04J659infH8rllrmjmGf8qjp7y7OAjZUf3qO6qYyRopE1/G8cUZExftToq9EZ80 PvSKjA9dT5SiHthvhs7A==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1rsReQ-00000003muv-3mwq; Thu, 04 Apr 2024 18:17:26 +0000 Received: from mail-ed1-x529.google.com ([2a00:1450:4864:20::529]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1rsRe6-00000003mhJ-18Sq for hostap@lists.infradead.org; Thu, 04 Apr 2024 18:17:08 +0000 Received: by mail-ed1-x529.google.com with SMTP id 4fb4d7f45d1cf-56c5d05128dso1670230a12.0 for <hostap@lists.infradead.org>; Thu, 04 Apr 2024 11:17:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wolfssl-com.20230601.gappssmtp.com; s=20230601; t=1712254624; x=1712859424; darn=lists.infradead.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=KYlQ3T3Xnbcu0e+I5HJZHObl8mPK00DtbN57GwJCbSI=; b=kn4HrYDgmonnA5A9Auu5f5eZCpEHjZ9fJ2z+bUTh3BShbN0jGkeUDWLdohYJkCYFpA M+DJ+eL7CGUNQuRW+uAn5bKfY5AwI08qhg5/vZgl4+ID64PCB6tFByLRoayX/03O/HbV vz/J5iR2k+TjGYyHtjX0T/7VT5NhIGMKfPgxv+RvB/ky6+yHIqombWa0XoZVFGgukxzi Tr3qQM4sJc6Aj3JIoSLBP7mu8i8Ws1/11Pp2lgwdaJDO8r9ah7FQW9DZo3qj2aPjRPcd NlXTojTNyqzGYRX7Cs4jIx1AW0lhdZUZdufA9srgBcLqfbN+MY6egNtgGTgQLsqAKq3u PEEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1712254624; x=1712859424; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KYlQ3T3Xnbcu0e+I5HJZHObl8mPK00DtbN57GwJCbSI=; b=eawJqeqxB3+AFeJ/7ifOtMv+peI5s6aJNN7zhpmr4ojjXDT7Ed9S+IL6Th47ghbp86 BktXf+Hz7h7jaMzIZ0+zzS3nr6XLGcI9MHAT9xvKwhS2QnDFYnxhezAV/3v7SG4ZnN6T /UPO3Wf/hBRlX5CU+/fMZ5LndDsXRvW4vZbGzJ1lPuoiJFWk0wh4VqbDRur7/MsBeZ7y h9wn9RF7WHh3l+J8gsq6eaF4y83VM5Eb/VQ/3eyT4oUW/X9XJnzmtGrTvknV6nBmBuw2 rFg1agUGhpi1RXA6/Qcv09Yhx6X1lNntGyAm7Z759LbcZqvnvcoqPG5j1StPoopH3pTX bLsQ== X-Gm-Message-State: AOJu0YyQl2bEfxtamjNZj8/02vHRAQyO6Ops8DkxMrTp3UCIvJ2W6NSy Nu5VOdwOMZkObONa3lTYnLmPTQVii6fTHJaLJlcs/kAPoSJWQqgJtqXBD1B84+U1dhdGRu4TnlP PSYA= X-Google-Smtp-Source: AGHT+IHkbYQB2tHnKlyLroe8XDSmK4NXKmhQPm+KWOHu0Sp11uAsSf1Kj6e/UqpacJcecAe11Nk+5g== X-Received: by 2002:a50:d001:0:b0:56d:c942:c790 with SMTP id j1-20020a50d001000000b0056dc942c790mr247690edf.34.1712254624544; Thu, 04 Apr 2024 11:17:04 -0700 (PDT) Received: from localhost.localdomain ([82.118.30.15]) by smtp.gmail.com with ESMTPSA id dh26-20020a0564021d3a00b0056e0b358e86sm1976349edb.97.2024.04.04.11.17.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 04 Apr 2024 11:17:03 -0700 (PDT) From: Juliusz Sosinowicz <juliusz@wolfssl.com> To: hostap@lists.infradead.org Cc: Juliusz Sosinowicz <juliusz@wolfssl.com> Subject: [PATCH 09/24] wolfssl: tune test_ap_wpa2_eap_fast_prf_oom for wolfssl Date: Thu, 4 Apr 2024 20:16:15 +0200 Message-Id: <20240404181630.2431991-9-juliusz@wolfssl.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240404181630.2431991-1-juliusz@wolfssl.com> References: <20240404181630.2431991-1-juliusz@wolfssl.com> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240404_111706_384033_AED6F555 X-CRM114-Status: GOOD ( 11.48 ) X-Spam-Score: 0.0 (/) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: The wolfSSL backend only does one malloc in tls_connection_get_eap_fast_key. Failing on the second one skips the only malloc and fails the test. Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com> --- tests/hwsim/test_ap_eap.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) Content analysis details: (0.0 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2a00:1450:4864:20:0:0:0:529 listed in] [list.dnswl.org] X-BeenThere: hostap@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: <hostap.lists.infradead.org> List-Unsubscribe: <http://lists.infradead.org/mailman/options/hostap>, <mailto:hostap-request@lists.infradead.org?subject=unsubscribe> List-Archive: <http://lists.infradead.org/pipermail/hostap/> List-Post: <mailto:hostap@lists.infradead.org> List-Help: <mailto:hostap-request@lists.infradead.org?subject=help> List-Subscribe: <http://lists.infradead.org/mailman/listinfo/hostap>, <mailto:hostap-request@lists.infradead.org?subject=subscribe> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "Hostap" <hostap-bounces@lists.infradead.org> Errors-To: hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org |
Series |
[01/24] wolfssl: simplify tls_get_cipher
|
expand
|
diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index a201403163..5fe2cbc711 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -4248,9 +4248,12 @@ def test_ap_wpa2_eap_fast_prf_oom(dev, apdev): """WPA2-Enterprise connection using EAP-FAST and OOM in PRF""" check_eap_capa(dev[0], "FAST") tls = dev[0].request("GET tls_library") - if tls.startswith("OpenSSL") or tls.startswith("wolfSSL"): + if tls.startswith("OpenSSL"): func = "tls_connection_get_eap_fast_key" count = 2 + elif tls.startswith("wolfSSL"): + func = "tls_connection_get_eap_fast_key" + count = 1 elif tls.startswith("internal"): func = "tls_connection_prf" count = 1
The wolfSSL backend only does one malloc in tls_connection_get_eap_fast_key. Failing on the second one skips the only malloc and fails the test. Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com> --- tests/hwsim/test_ap_eap.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-)