return
arg = ["openssl", "ocsp",
"-index", "auth_serv/index%s.txt" % status,
- "-rsigner", "auth_serv/ca.pem",
- "-rkey", "auth_serv/ca-key.pem",
- "-CA", "auth_serv/ca.pem",
- "-ndays", "7",
- "-reqin", reqfile,
- "-resp_no_certs",
- "-respout", outfile]
+ "-rsigner", "auth_serv/ca.pem",
+ "-rkey", "auth_serv/ca-key.pem",
+ "-CA", "auth_serv/ca.pem",
+ "-ndays", "7",
+ "-reqin", reqfile,
+ "-resp_no_certs",
+ "-respout", outfile]
run_openssl(arg)
if not os.path.exists(outfile):
raise HwsimSkip("No OCSP response available")
return
arg = ["openssl", "ocsp",
"-index", "auth_serv/index.txt",
- "-rsigner", "auth_serv/server.pem",
- "-rkey", "auth_serv/server.key",
- "-CA", "auth_serv/ca.pem",
- "-ndays", "7",
- "-reqin", reqfile,
- "-respout", outfile]
+ "-rsigner", "auth_serv/server.pem",
+ "-rkey", "auth_serv/server.key",
+ "-CA", "auth_serv/ca.pem",
+ "-ndays", "7",
+ "-reqin", reqfile,
+ "-respout", outfile]
run_openssl(arg)
if not os.path.exists(outfile):
raise HwsimSkip("No OCSP response available")
hapd1 = hostapd.add_ap(apdev[1]['ifname'], params)
run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, conndev="brvlan1",
- force_initial_conn_to_first_ap=True)
+ force_initial_conn_to_first_ap=True)
if "[WPA2-FT/PSK-CCMP]" not in dev[0].request("SCAN_RESULTS"):
raise Exception("Scan results missing RSN element info")
"pkcs11_module_path", "openssl_ciphers", "pcsc_reader",
"pcsc_pin", "driver_param", "manufacturer", "model_name",
"model_number", "serial_number", "config_methods",
- "p2p_ssid_postfix", "autoscan", "ext_password_backend",
- "osu_dir", "wowlan_triggers", "fst_group_id",
- "sched_scan_plans", "non_pref_chan"]
+ "p2p_ssid_postfix", "autoscan", "ext_password_backend",
+ "osu_dir", "wowlan_triggers", "fst_group_id",
+ "sched_scan_plans", "non_pref_chan"]
for field in fields:
if "FAIL" not in wpas.request('SET %s hello\nmodel_name=foobar' % field):
raise Exception("Invalid %s value accepted" % field)