Skip to content

Commit 53e3521

Browse files
Merge pull request #10058 from julek-wolfssl/hostap-ec-generate.sh
Re-enable hostap tests and remove some flaky tests
2 parents 5277556 + a0e1fce commit 53e3521

5 files changed

Lines changed: 21 additions & 50 deletions

File tree

.github/workflows/hostap-files/configs/07c9f183ea744ac04585fb6dd10220c75a5e2e74/tests

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -248,9 +248,6 @@ ap_wpa2_eap_tls_check_cert_subject_neg
248248
ap_wpa2_eap_tls_diff_ca_trust2
249249
ap_wpa2_eap_tls_domain_mismatch_cn
250250
ap_wpa2_eap_tls_domain_suffix_mismatch_cn
251-
ap_wpa2_eap_tls_intermediate_ca_ocsp_multi_missing_resp
252-
ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked_sha1
253-
ap_wpa2_eap_tls_intermediate_ca_ocsp_sha1
254251
ap_wpa2_eap_tls_neg_incorrect_trust_root
255252
ap_wpa2_eap_tls_ocsp_multi
256253
ap_wpa2_eap_tls_ocsp_multi_revoked
@@ -649,9 +646,6 @@ dpp_config_dpp_gen_secp521r1
649646
dpp_config_dpp_gen_secp521r1_prime256v1
650647
dpp_config_dpp_gen_secp521r1_secp384r1
651648
dpp_config_dpp_gen_secp521r1_secp521r1
652-
dpp_config_dpp_override_prime256v1
653-
dpp_config_dpp_override_secp384r1
654-
dpp_config_dpp_override_secp521r1
655649
dpp_config_error_legacy_invalid_psk
656650
dpp_config_error_legacy_no_pass
657651
dpp_config_error_legacy_no_pass_for_sae
@@ -691,7 +685,6 @@ dpp_config_no_discovery
691685
dpp_config_no_discovery_ssid
692686
dpp_config_no_signed_connector
693687
dpp_config_no_wi_fi_tech
694-
dpp_config_override_objects
695688
dpp_config_root_not_an_object
696689
dpp_config_save
697690
dpp_config_save2
@@ -748,12 +741,6 @@ dpp_hostapd_configurator_enrollee_v1
748741
dpp_hostapd_configurator_fragmentation
749742
dpp_hostapd_configurator_override_objects
750743
dpp_hostapd_configurator_responder
751-
dpp_hostapd_enrollee_fragmentation
752-
dpp_hostapd_enrollee_gas_errors
753-
dpp_hostapd_enrollee_gas_proto
754-
dpp_hostapd_enrollee_gas_timeout
755-
dpp_hostapd_enrollee_gas_timeout_comeback
756-
dpp_hostapd_enrollee_gas_tx_status_errors
757744
dpp_intro_mismatch
758745
dpp_invalid_configurator_key
759746
dpp_invalid_legacy_params
@@ -906,10 +893,6 @@ dpp_qr_code_auth_incompatible_roles2
906893
dpp_qr_code_auth_incompatible_roles_failure
907894
dpp_qr_code_auth_incompatible_roles_failure2
908895
dpp_qr_code_auth_incompatible_roles_failure3
909-
dpp_qr_code_auth_initiator_either_1
910-
dpp_qr_code_auth_initiator_either_2
911-
dpp_qr_code_auth_initiator_either_3
912-
dpp_qr_code_auth_initiator_enrollee
913896
dpp_qr_code_auth_mutual
914897
dpp_qr_code_auth_mutual2
915898
dpp_qr_code_auth_mutual_bp_256

.github/workflows/hostap-files/configs/b607d2723e927a3446d89aed813f1aa6068186bb/tests

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -347,7 +347,6 @@ ap_wpa2_eap_tls_ocsp_server_signed
347347
ap_wpa2_eap_tls_ocsp_invalid_data
348348
ap_wpa2_eap_tls_ocsp_invalid
349349
ap_wpa2_eap_tls_ocsp_unknown_sign
350-
ap_wpa2_eap_tls_intermediate_ca
351350
ap_wpa2_eap_tls_ocsp_multi_revoked
352351
ap_wpa2_eap_tls_domain_suffix_match_cn_full
353352
ap_wpa2_eap_tls_domain_match_cn
@@ -461,9 +460,6 @@ dpp_qr_code_auth_mutual_not_used
461460
dpp_qr_code_auth_mutual_curve_mismatch
462461
dpp_qr_code_auth_hostapd_mutual2
463462
dpp_qr_code_listen_continue
464-
dpp_qr_code_auth_initiator_enrollee
465-
dpp_qr_code_auth_initiator_either_2
466-
dpp_qr_code_auth_initiator_either_3
467463
dpp_config_legacy
468464
dpp_config_legacy_psk_hex
469465
dpp_config_fragmentation
@@ -475,9 +471,6 @@ dpp_config_dpp_gen_secp521r1
475471
dpp_config_dpp_gen_expiry
476472
dpp_config_dpp_gen_expired_key
477473
dpp_config_dpp_gen_3rd_party
478-
dpp_config_dpp_override_prime256v1
479-
dpp_config_dpp_override_secp384r1
480-
dpp_config_override_objects
481474
dpp_config_signed_connector_error_no_dot_1
482475
dpp_config_signed_connector_error_no_dot_2
483476
dpp_config_signed_connector_error_unexpected_signature_len
@@ -579,12 +572,6 @@ dpp_pkex_nak_curve_change2
579572
dpp_hostapd_configurator
580573
dpp_hostapd_configurator_responder
581574
dpp_hostapd_configurator_fragmentation
582-
dpp_hostapd_enrollee_fragmentation
583-
dpp_hostapd_enrollee_gas_timeout
584-
dpp_hostapd_enrollee_gas_timeout_comeback
585-
dpp_hostapd_enrollee_gas_errors
586-
dpp_hostapd_enrollee_gas_proto
587-
dpp_hostapd_enrollee_gas_tx_status_errors
588575
dpp_hostapd_configurator_override_objects
589576
dpp_own_config
590577
dpp_own_config_group_id

.github/workflows/hostap-vm.yml

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,10 @@ name: hostap and wpa-supplicant Tests
22

33
# START OF COMMON SECTION
44
on:
5-
workflow_dispatch: # Allows people to run it manually if they want but
6-
# disables it from running automatically when broken
7-
# To restore this to an auto test delete the above workflow_dispatch line and
8-
# comments and uncomment the below lines for push and pull_request
9-
# push:
10-
# branches: [ 'master', 'main', 'release/**' ]
11-
# pull_request:
12-
# branches: [ '*' ]
5+
push:
6+
branches: [ 'master', 'main', 'release/**' ]
7+
pull_request:
8+
branches: [ '*' ]
139

1410
concurrency:
1511
group: ${{ github.workflow }}-${{ github.ref }}
@@ -230,16 +226,6 @@ jobs:
230226
working-directory: hostap
231227
run: git checkout ${{ matrix.config.hostap_ref }}
232228

233-
- name: Update certs
234-
working-directory: hostap/tests/hwsim/auth_serv
235-
run: |
236-
./update.sh
237-
./sha512-generate.sh
238-
# Force regeneration of rsa3072-ca.key to get rsa3072-generate.sh to
239-
# correctly update all the certs
240-
rm rsa3072-ca.key
241-
./rsa3072-generate.sh
242-
243229
- if: ${{ matrix.config.osp_ref }}
244230
name: Checkout OSP
245231
uses: actions/checkout@v4
@@ -258,6 +244,20 @@ jobs:
258244
patch -p1 < $f
259245
done
260246
247+
- name: Update certs
248+
working-directory: hostap/tests/hwsim/auth_serv
249+
run: |
250+
mkdir -p rootCA/newcerts
251+
./update.sh
252+
./ec-generate.sh
253+
./ec2-generate.sh
254+
./sha512-generate.sh
255+
# Force regeneration of rsa3072-ca.key to get rsa3072-generate.sh to
256+
# correctly update all the certs
257+
rm rsa3072-ca.key
258+
./rsa3072-generate.sh
259+
./ica-generate.sh
260+
261261
- name: Apply extra patches
262262
working-directory: hostap
263263
run: |

scripts/openssl.test

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -270,9 +270,9 @@ start_wolfssl_server() {
270270
echo -e "\n# Trying to start $wolfssl_suite wolfSSL server on port $server_port..."
271271

272272
echo "#"
273-
echo "# $WOLFSSL_SERVER -p $server_port -g -v d -x -i $psk $crl -l ALL \"$wolfssl_cert\" \"$wolfssl_key\" \"$wolfssl_caCert\""
273+
echo "# $WOLFSSL_SERVER -p $server_port -g -v d -x -i $psk $crl -l ALL:eNULL \"$wolfssl_cert\" \"$wolfssl_key\" \"$wolfssl_caCert\""
274274
# shellcheck disable=SC2086
275-
$WOLFSSL_SERVER -p "$server_port" -g -v d -x -i $psk $crl -l ALL "$wolfssl_cert" "$wolfssl_key" "$wolfssl_caCert" &
275+
$WOLFSSL_SERVER -p "$server_port" -g -v d -x -i $psk $crl -l ALL:eNULL "$wolfssl_cert" "$wolfssl_key" "$wolfssl_caCert" &
276276
server_pid=$!
277277
# wait to see if server successfully starts before continuing
278278
sleep 0.1

src/internal.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28866,6 +28866,7 @@ static int ParseCipherList(Suites* suites,
2886628866
haveRSA, 1, 1, !haveRSA, 1, haveRSA, !haveRSA, 0, 0, 1,
2886728867
1, 1, side
2886828868
);
28869+
suites->setSuites = 1;
2886928870
return 1; /* wolfSSL default */
2887028871
}
2887128872

0 commit comments

Comments
 (0)