From: Jouni Malinen Date: Fri, 15 Apr 2022 20:41:14 +0000 (+0300) Subject: tests: Remove test cases for wpa_supplicant dh_file parameter X-Git-Tag: hostap_2_11~2062 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=b08d100de6076f88f4b4f89a20f4980a77a5845f;p=thirdparty%2Fhostap.git tests: Remove test cases for wpa_supplicant dh_file parameter This parameter has no impact to TLS client functionality, so these is not really any point to maintain these test cases. Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 02916b183..4cbb4957e 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -5043,69 +5043,6 @@ def test_ap_wpa2_eap_ttls_server_pkcs12_extra(dev, apdev): ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAP", scan_freq="2412") -def test_ap_wpa2_eap_ttls_dh_params(dev, apdev): - """WPA2-Enterprise connection using EAP-TTLS/CHAP and setting DH params""" - params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") - hapd = hostapd.add_ap(apdev[0], params) - eap_connect(dev[0], hapd, "TTLS", "pap user", - anonymous_identity="ttls", password="password", - ca_cert="auth_serv/ca.der", phase2="auth=PAP", - dh_file="auth_serv/dh.conf") - -def test_ap_wpa2_eap_ttls_dh_params_dsa(dev, apdev): - """WPA2-Enterprise connection using EAP-TTLS and setting DH params (DSA)""" - check_dh_dsa_support(dev[0]) - params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") - hapd = hostapd.add_ap(apdev[0], params) - eap_connect(dev[0], hapd, "TTLS", "pap user", - anonymous_identity="ttls", password="password", - ca_cert="auth_serv/ca.der", phase2="auth=PAP", - dh_file="auth_serv/dsaparam.pem") - -def test_ap_wpa2_eap_ttls_dh_params_not_found(dev, apdev): - """EAP-TTLS and DH params file not found""" - skip_with_fips(dev[0]) - params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") - hostapd.add_ap(apdev[0], params) - dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TTLS", - identity="mschap user", password="password", - ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAP", - dh_file="auth_serv/dh-no-such-file.conf", - scan_freq="2412", wait_connect=False) - ev = dev[0].wait_event(["CTRL-EVENT-EAP-FAILURE"]) - if ev is None: - raise Exception("EAP failure timed out") - dev[0].request("REMOVE_NETWORK all") - dev[0].wait_disconnected() - -def test_ap_wpa2_eap_ttls_dh_params_invalid(dev, apdev): - """EAP-TTLS and invalid DH params file""" - skip_with_fips(dev[0]) - params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") - hostapd.add_ap(apdev[0], params) - dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TTLS", - identity="mschap user", password="password", - ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAP", - dh_file="auth_serv/ca.pem", - scan_freq="2412", wait_connect=False) - ev = dev[0].wait_event(["CTRL-EVENT-EAP-FAILURE"]) - if ev is None: - raise Exception("EAP failure timed out") - dev[0].request("REMOVE_NETWORK all") - dev[0].wait_disconnected() - -def test_ap_wpa2_eap_ttls_dh_params_blob(dev, apdev): - """WPA2-Enterprise connection using EAP-TTLS/CHAP and setting DH params from blob""" - params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") - hapd = hostapd.add_ap(apdev[0], params) - dh = read_pem("auth_serv/dh2.conf") - if "OK" not in dev[0].request("SET blob dhparams " + binascii.hexlify(dh).decode()): - raise Exception("Could not set dhparams blob") - eap_connect(dev[0], hapd, "TTLS", "pap user", - anonymous_identity="ttls", password="password", - ca_cert="auth_serv/ca.der", phase2="auth=PAP", - dh_file="blob://dhparams") - def test_ap_wpa2_eap_ttls_dh_params_server(dev, apdev): """WPA2-Enterprise using EAP-TTLS and alternative server dhparams""" params = int_eap_server_params() diff --git a/tests/hwsim/wpasupplicant.py b/tests/hwsim/wpasupplicant.py index 1c173349f..e663e9f11 100644 --- a/tests/hwsim/wpasupplicant.py +++ b/tests/hwsim/wpasupplicant.py @@ -1077,7 +1077,7 @@ class WpaSupplicant: "ca_cert", "client_cert", "private_key", "private_key_passwd", "ca_cert2", "client_cert2", "private_key2", "phase1", "phase2", "domain_suffix_match", - "altsubject_match", "subject_match", "pac_file", "dh_file", + "altsubject_match", "subject_match", "pac_file", "bgscan", "ht_mcs", "id_str", "openssl_ciphers", "domain_match", "dpp_connector", "sae_password", "sae_password_id", "check_cert_subject",