From: Jouni Malinen Date: Sat, 8 Dec 2018 11:14:11 +0000 (+0200) Subject: tests: Enable PMF in ap_hs20_unexpected configuration X-Git-Tag: hostap_2_8~809 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=f40f8860d2415f3d1ccfe2d1105c0b26294430ba;p=thirdparty%2Fhostap.git tests: Enable PMF in ap_hs20_unexpected configuration This is needed to meet the Hotspot 2.0 Release 2 requirement for the third station that is actually using RSN. Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_hs20.py b/tests/hwsim/test_ap_hs20.py index 51809c83c..a241a342e 100644 --- a/tests/hwsim/test_ap_hs20.py +++ b/tests/hwsim/test_ap_hs20.py @@ -5867,6 +5867,7 @@ def test_ap_hs20_unexpected(dev, apdev): params['wpa'] = "3" params['wpa_pairwise'] = "TKIP CCMP" params['rsn_pairwise'] = "CCMP" + params['ieee80211w'] = "1" #params['vendor_elements'] = 'dd07506f9a10140000' params['vendor_elements'] = 'dd04506f9a10' hostapd.add_ap(apdev[0], params) @@ -5890,6 +5891,7 @@ def test_ap_hs20_unexpected(dev, apdev): dev[2].hs20_enable() dev[2].scan_for_bss(bssid, freq="2412") dev[2].connect("test-hs20-fake", key_mgmt="WPA-EAP", eap="TTLS", + ieee80211w="1", proto="RSN", pairwise="CCMP", identity="hs20-test", password="password", ca_cert="auth_serv/ca.pem", phase2="auth=MSCHAPV2",