tests: ap_wpa2_eap_ttls_server_cert_hash with internal TLS client
Since the internal TLS client implementation in wpa_supplicant now has sufficient support for this functionality, allow the test case to be executed. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
f2a6ad01a9
commit
0fc1b583e2
1 changed files with 1 additions and 1 deletions
|
@ -47,7 +47,7 @@ def check_domain_match_full(dev):
|
||||||
|
|
||||||
def check_cert_probe_support(dev):
|
def check_cert_probe_support(dev):
|
||||||
tls = dev.request("GET tls_library")
|
tls = dev.request("GET tls_library")
|
||||||
if not tls.startswith("OpenSSL"):
|
if not tls.startswith("OpenSSL") and not tls.startswith("internal"):
|
||||||
raise HwsimSkip("Certificate probing not supported with this TLS library: " + tls)
|
raise HwsimSkip("Certificate probing not supported with this TLS library: " + tls)
|
||||||
|
|
||||||
def check_ocsp_support(dev):
|
def check_ocsp_support(dev):
|
||||||
|
|
Loading…
Reference in a new issue