Changes to TLS test scenarios and util
functions.

Change-Id: I76722e6ca1273fe60ac26fd0bf85e09853e7ca0c
diff --git a/src/test/utils/EapTLS.py b/src/test/utils/EapTLS.py
index c9cf599..58e9d8d 100644
--- a/src/test/utils/EapTLS.py
+++ b/src/test/utils/EapTLS.py
@@ -293,6 +293,7 @@
 	#if self.src_mac == 'mcast': self.setup(src_mac='mcast')
 	#if self.src_mac == 'zeros': self.setup(src_mac='zeros')
 	#if self.src_mac == 'default': self.setup(src_mac='default')
+	log.info('source mac is %s'%self.src_mac)
 	self.setup(src_mac=self.src_mac)
         self.nextEvent = self.tlsEventTable.EVT_EAP_START
 
@@ -307,7 +308,11 @@
                 log.info('Got EAPOL packet with type id and code request')
                 log.info('Packet code: %d, type: %d, id: %d', pkt[EAP].code, pkt[EAP].type, pkt[EAP].id)
                 log.info("<====== Send EAP Response with identity = %s ================>" % USER)
-                self.eapol_id_req(pkt[EAP].id, USER)
+		if self.id_mismatch_in_identifier_response_packet:
+		    log.info('\nSending invalid id field in EAP Identity Response packet')
+                    self.eapol_id_req(pkt[EAP].id+10, USER)
+		else:
+		    self.eapol_id_req(pkt[EAP].id, USER)
 
         r = self.eapol_scapy_recv(cb = eapol_cb,
                                   lfilter =