]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Enable PMF in ap_hs20_unexpected configuration
authorJouni Malinen <jouni@codeaurora.org>
Sat, 8 Dec 2018 11:14:11 +0000 (13:14 +0200)
committerJouni Malinen <j@w1.fi>
Sat, 8 Dec 2018 12:06:58 +0000 (14:06 +0200)
This is needed to meet the Hotspot 2.0 Release 2 requirement for the
third station that is actually using RSN.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
tests/hwsim/test_ap_hs20.py

index 51809c83c3d1baed7f8be4b0232009b52def96c4..a241a342e0c78537ccf2b5990d239e50be59d659 100644 (file)
@@ -5867,6 +5867,7 @@ def test_ap_hs20_unexpected(dev, apdev):
     params['wpa'] = "3"
     params['wpa_pairwise'] = "TKIP CCMP"
     params['rsn_pairwise'] = "CCMP"
+    params['ieee80211w'] = "1"
     #params['vendor_elements'] = 'dd07506f9a10140000'
     params['vendor_elements'] = 'dd04506f9a10'
     hostapd.add_ap(apdev[0], params)
@@ -5890,6 +5891,7 @@ def test_ap_hs20_unexpected(dev, apdev):
     dev[2].hs20_enable()
     dev[2].scan_for_bss(bssid, freq="2412")
     dev[2].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS",
+                   ieee80211w="1",
                    proto="RSN", pairwise="CCMP",
                    identity="hs20-test", password="password",
                    ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",