params['wpa_key_mgmt'] = 'SAE PASN'
hapd = start_pasn_ap(apdev[0], params)
- dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412",
- only_add_network=True)
+ dev[0].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
+ scan_freq="2412", only_add_network=True)
# first test with a valid PSK
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", nid="0")
params['pasn_comeback_after'] = '0'
hapd = start_pasn_ap(apdev[0], params)
- dev[0].connect("test-sae", psk="12345678", key_mgmt="SAE", scan_freq="2412",
- only_add_network=True)
+ dev[0].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
+ scan_freq="2412", only_add_network=True)
# first test with a valid PSK
check_pasn_akmp_cipher(dev[0], hapd, "SAE", "CCMP", nid="0")
for i in range(0, 2):
dev[i].flush_scan_cache()
dev[i].scan(type="ONLY", freq=2412)
- id[i] = dev[i].connect("test-sae", psk="12345678", key_mgmt="SAE",
+ id[i] = dev[i].connect("test-pasn-sae", psk="12345678", key_mgmt="SAE",
scan_freq="2412", only_add_network=True)
for i in range(0, 2):