tests: Fix peerkey_sniffer_check with tshark 1.10.6
It looks like the previous mechanism for catching older tshark versions for EAPOL-Key key info field was not sufficient. Fix that to cover the version used in Ubuntu 14.04. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
7f2905e0da
commit
1e40cf22f4
1 changed files with 9 additions and 0 deletions
|
@ -79,6 +79,15 @@ def test_peerkey_sniffer_check(dev, apdev, params):
|
||||||
pass
|
pass
|
||||||
else:
|
else:
|
||||||
raise
|
raise
|
||||||
|
if not try_other:
|
||||||
|
found = False
|
||||||
|
for pkt in out.splitlines():
|
||||||
|
sa, da, key_info = pkt.split('\t')
|
||||||
|
if key_info != '':
|
||||||
|
found = True
|
||||||
|
break
|
||||||
|
if not found:
|
||||||
|
try_other = True
|
||||||
if try_other:
|
if try_other:
|
||||||
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
||||||
"eapol.type == 3",
|
"eapol.type == 3",
|
||||||
|
|
Loading…
Add table
Reference in a new issue