diff --git a/wifi/supplicant/aidl/vts/functional/supplicant_sta_network_aidl_test.cpp b/wifi/supplicant/aidl/vts/functional/supplicant_sta_network_aidl_test.cpp index 0aebe6d716..0e2b72c285 100644 --- a/wifi/supplicant/aidl/vts/functional/supplicant_sta_network_aidl_test.cpp +++ b/wifi/supplicant/aidl/vts/functional/supplicant_sta_network_aidl_test.cpp @@ -806,7 +806,15 @@ TEST_P(SupplicantStaNetworkAidlTest, SetRoamingConsortiumSelection) { * SetMinimumTlsVersionEapPhase1Param */ TEST_P(SupplicantStaNetworkAidlTest, SetMinimumTlsVersionEapPhase1Param) { - EXPECT_TRUE(sta_network_->setMinimumTlsVersionEapPhase1Param(TlsVersion::TLS_V1_3).isOk()); + WpaDriverCapabilitiesMask caps; + EXPECT_TRUE(sta_iface_->getWpaDriverCapabilities(&caps).isOk()); + const bool tlsV13Supported = !!(static_cast(caps) & + static_cast(WpaDriverCapabilitiesMask::TLS_V1_3)); + LOG(INFO) << "TLS_V1_3 Supported: " << tlsV13Supported; + + // Operation will succeed if TLS_V1_3 is supported, or fail otherwise. + EXPECT_EQ(sta_network_->setMinimumTlsVersionEapPhase1Param(TlsVersion::TLS_V1_3).isOk(), + tlsV13Supported); } GTEST_ALLOW_UNINSTANTIATED_PARAMETERIZED_TEST(SupplicantStaNetworkAidlTest);