diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 64acae9d0..913132275 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -4187,13 +4187,13 @@ def ocsp_resp_ca_signed(reqfile, outfile, status): return arg = ["openssl", "ocsp", "-index", "auth_serv/index%s.txt" % status, - "-rsigner", "auth_serv/ca.pem", - "-rkey", "auth_serv/ca-key.pem", - "-CA", "auth_serv/ca.pem", - "-ndays", "7", - "-reqin", reqfile, - "-resp_no_certs", - "-respout", outfile] + "-rsigner", "auth_serv/ca.pem", + "-rkey", "auth_serv/ca-key.pem", + "-CA", "auth_serv/ca.pem", + "-ndays", "7", + "-reqin", reqfile, + "-resp_no_certs", + "-respout", outfile] run_openssl(arg) if not os.path.exists(outfile): raise HwsimSkip("No OCSP response available") @@ -4204,12 +4204,12 @@ def ocsp_resp_server_signed(reqfile, outfile): return arg = ["openssl", "ocsp", "-index", "auth_serv/index.txt", - "-rsigner", "auth_serv/server.pem", - "-rkey", "auth_serv/server.key", - "-CA", "auth_serv/ca.pem", - "-ndays", "7", - "-reqin", reqfile, - "-respout", outfile] + "-rsigner", "auth_serv/server.pem", + "-rkey", "auth_serv/server.key", + "-CA", "auth_serv/ca.pem", + "-ndays", "7", + "-reqin", reqfile, + "-respout", outfile] run_openssl(arg) if not os.path.exists(outfile): raise HwsimSkip("No OCSP response available") diff --git a/tests/hwsim/test_ap_ft.py b/tests/hwsim/test_ap_ft.py index e3cd4bee0..93497a460 100644 --- a/tests/hwsim/test_ap_ft.py +++ b/tests/hwsim/test_ap_ft.py @@ -387,7 +387,7 @@ def test_ap_ft_vlan_2(dev, apdev): hapd1 = hostapd.add_ap(apdev[1]['ifname'], params) run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, conndev="brvlan1", - force_initial_conn_to_first_ap=True) + force_initial_conn_to_first_ap=True) if "[WPA2-FT/PSK-CCMP]" not in dev[0].request("SCAN_RESULTS"): raise Exception("Scan results missing RSN element info") diff --git a/tests/hwsim/test_wpas_config.py b/tests/hwsim/test_wpas_config.py index 7688c20d1..ba408252a 100644 --- a/tests/hwsim/test_wpas_config.py +++ b/tests/hwsim/test_wpas_config.py @@ -494,9 +494,9 @@ def test_wpas_config_file_set_global(dev): "pkcs11_module_path", "openssl_ciphers", "pcsc_reader", "pcsc_pin", "driver_param", "manufacturer", "model_name", "model_number", "serial_number", "config_methods", - "p2p_ssid_postfix", "autoscan", "ext_password_backend", - "osu_dir", "wowlan_triggers", "fst_group_id", - "sched_scan_plans", "non_pref_chan"] + "p2p_ssid_postfix", "autoscan", "ext_password_backend", + "osu_dir", "wowlan_triggers", "fst_group_id", + "sched_scan_plans", "non_pref_chan"] for field in fields: if "FAIL" not in wpas.request('SET %s hello\nmodel_name=foobar' % field): raise Exception("Invalid %s value accepted" % field)