]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Enable SAE Pw Id on AP in sae_proto_hostapd_valid_commit_after_fail
authorJouni Malinen <quic_jouni@quicinc.com>
Thu, 31 Oct 2024 09:11:46 +0000 (11:11 +0200)
committerJouni Malinen <j@w1.fi>
Thu, 31 Oct 2024 09:12:55 +0000 (11:12 +0200)
This is in preparation to implementation changes that use knowledge of
whether SAE Password Identifiers have been enabled to reject unexpected
commit messages.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
tests/hwsim/test_sae.py

index 04f43352a3e48f7bc244c4a97f586cfef96db6da..c119271c4460c1a491089b178bc279b90694246e 100644 (file)
@@ -1256,7 +1256,8 @@ def test_sae_proto_hostapd_status_127(dev, apdev):
 
 def test_sae_proto_hostapd_valid_commit_after_fail(dev, apdev):
     """SAE protocol testing with hostapd and valid commit after failed one"""
-    params = hostapd.wpa2_params(ssid="test-sae", passphrase="foofoofoo")
+    params = hostapd.wpa2_params(ssid="test-sae")
+    params['sae_password'] = ["foofoofoo", "another|id=pw id"]
     params['wpa_key_mgmt'] = 'SAE'
     params['sae_groups'] = "19"
     hapd = hostapd.add_ap(apdev[0], params)