tests: OSEN with two group ciphers allowed on client side

This verifies the new default behavior for OSEN in Single SSID capable
devices.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
Jouni Malinen 2018-07-31 00:33:08 +03:00 committed by Jouni Malinen
parent c1721f05a0
commit f5dd150aac

View file

@ -2651,7 +2651,7 @@ def test_ap_hs20_osen(dev, apdev):
wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.interface_add("wlan5", drv_params="force_connect_cmd=1")
wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP", wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
group="GTK_NOT_USED", group="GTK_NOT_USED CCMP",
eap="WFA-UNAUTH-TLS", identity="osen@example.com", eap="WFA-UNAUTH-TLS", identity="osen@example.com",
ca_cert="auth_serv/ca.pem", ca_cert="auth_serv/ca.pem",
scan_freq="2412") scan_freq="2412")
@ -2667,6 +2667,7 @@ def test_ap_hs20_osen_single_ssid(dev, apdev):
# RSN-OSEN (for OSU) # RSN-OSEN (for OSU)
dev[0].connect("test-hs20", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP", dev[0].connect("test-hs20", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP",
group="CCMP GTK_NOT_USED",
eap="WFA-UNAUTH-TLS", identity="osen@example.com", eap="WFA-UNAUTH-TLS", identity="osen@example.com",
ca_cert="auth_serv/ca.pem", ieee80211w='2', ca_cert="auth_serv/ca.pem", ieee80211w='2',
scan_freq="2412") scan_freq="2412")
@ -2674,6 +2675,7 @@ def test_ap_hs20_osen_single_ssid(dev, apdev):
dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS", dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS",
identity="hs20-test", password="password", identity="hs20-test", password="password",
ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2", ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",
pairwise="CCMP", group="CCMP",
ieee80211w='2', scan_freq="2412") ieee80211w='2', scan_freq="2412")
res = dev[0].get_bss(apdev[0]['bssid'])['flags'] res = dev[0].get_bss(apdev[0]['bssid'])['flags']