tests: UNAUTH-TLS
authorJouni Malinen <j@w1.fi>
Sun, 11 May 2014 17:59:07 +0000 (20:59 +0300)
committerJouni Malinen <j@w1.fi>
Sun, 11 May 2014 19:47:25 +0000 (22:47 +0300)
Signed-off-by: Jouni Malinen <j@w1.fi>
tests/hwsim/auth_serv/eap_user.conf
tests/hwsim/test_ap_eap.py

index 215f779..0f836fe 100644 (file)
@@ -8,6 +8,7 @@
 "psk.user@example.com" PSK     0123456789abcdef0123456789abcdef
 "vendor-test"  VENDOR-TEST     "foo"
 "osen@example.com"     WFA-UNAUTH-TLS
+"unauth-tls"   UNAUTH-TLS
 
 "vlan1"        PAX     0123456789abcdef0123456789abcdef
 radius_accept_attr=64:d:13
index af5b68e..1d4860c 100644 (file)
@@ -841,6 +841,14 @@ def test_ap_wpa2_eap_tls_neg_altsubject_match(dev, apdev):
     if ev is None:
         raise Exception("Network block disabling not reported")
 
+def test_ap_wpa2_eap_unauth_tls(dev, apdev):
+    """WPA2-Enterprise connection using UNAUTH-TLS"""
+    params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
+    hostapd.add_ap(apdev[0]['ifname'], params)
+    eap_connect(dev[0], apdev[0], "UNAUTH-TLS", "unauth-tls",
+                ca_cert="auth_serv/ca.pem")
+    eap_reauth(dev[0], "UNAUTH-TLS")
+
 def test_ap_wpa2_eap_ttls_server_cert_hash(dev, apdev):
     """WPA2-Enterprise connection using EAP-TTLS and server certificate hash"""
     srv_cert_hash = "0a3f81f63569226657a069855bb13f3b922670437a2b87585a4734f70ac7315b"