From f5dd150aac79738bb52572d5f5d56d1facbdc730 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Tue, 31 Jul 2018 00:33:08 +0300 Subject: [PATCH] tests: OSEN with two group ciphers allowed on client side This verifies the new default behavior for OSEN in Single SSID capable devices. Signed-off-by: Jouni Malinen --- tests/hwsim/test_ap_hs20.py | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/tests/hwsim/test_ap_hs20.py b/tests/hwsim/test_ap_hs20.py index 8d494c026..00e696e34 100644 --- a/tests/hwsim/test_ap_hs20.py +++ b/tests/hwsim/test_ap_hs20.py @@ -2651,7 +2651,7 @@ def test_ap_hs20_osen(dev, apdev): wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") wpas.connect("osen", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP", - group="GTK_NOT_USED", + group="GTK_NOT_USED CCMP", eap="WFA-UNAUTH-TLS", identity="osen@example.com", ca_cert="auth_serv/ca.pem", scan_freq="2412") @@ -2667,6 +2667,7 @@ def test_ap_hs20_osen_single_ssid(dev, apdev): # RSN-OSEN (for OSU) dev[0].connect("test-hs20", proto="OSEN", key_mgmt="OSEN", pairwise="CCMP", + group="CCMP GTK_NOT_USED", eap="WFA-UNAUTH-TLS", identity="osen@example.com", ca_cert="auth_serv/ca.pem", ieee80211w='2', scan_freq="2412") @@ -2674,6 +2675,7 @@ def test_ap_hs20_osen_single_ssid(dev, apdev): dev[1].connect("test-hs20", key_mgmt="WPA-EAP", eap="TTLS", identity="hs20-test", password="password", ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2", + pairwise="CCMP", group="CCMP", ieee80211w='2', scan_freq="2412") res = dev[0].get_bss(apdev[0]['bssid'])['flags']