From f40f8860d2415f3d1ccfe2d1105c0b26294430ba Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sat, 8 Dec 2018 13:14:11 +0200 Subject: [PATCH] tests: Enable PMF in ap_hs20_unexpected configuration This is needed to meet the Hotspot 2.0 Release 2 requirement for the third station that is actually using RSN. Signed-off-by: Jouni Malinen --- tests/hwsim/test_ap_hs20.py | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tests/hwsim/test_ap_hs20.py b/tests/hwsim/test_ap_hs20.py index 51809c83c..a241a342e 100644 --- a/tests/hwsim/test_ap_hs20.py +++ b/tests/hwsim/test_ap_hs20.py @@ -5867,6 +5867,7 @@ def test_ap_hs20_unexpected(dev, apdev): params['wpa'] = "3" params['wpa_pairwise'] = "TKIP CCMP" params['rsn_pairwise'] = "CCMP" + params['ieee80211w'] = "1" #params['vendor_elements'] = 'dd07506f9a10140000' params['vendor_elements'] = 'dd04506f9a10' hostapd.add_ap(apdev[0], params) @@ -5890,6 +5891,7 @@ def test_ap_hs20_unexpected(dev, apdev): dev[2].hs20_enable() dev[2].scan_for_bss(bssid, freq="2412") dev[2].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS", + ieee80211w="1", proto="RSN", pairwise="CCMP", identity="hs20-test", password="password", ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",