|
@@ -848,15 +848,19 @@ def test_ap_wpa2_eap_tls_ocsp(dev, apdev):
|
|
|
private_key="auth_serv/user.pkcs12",
|
|
|
private_key_passwd="whatever", ocsp=2)
|
|
|
|
|
|
-def test_ap_wpa2_eap_tls_ocsp_invalid(dev, apdev):
|
|
|
- """WPA2-Enterprise connection using EAP-TLS and invalid OCSP response"""
|
|
|
+def int_eap_server_params():
|
|
|
params = { "ssid": "test-wpa2-eap", "wpa": "2", "wpa_key_mgmt": "WPA-EAP",
|
|
|
"rsn_pairwise": "CCMP", "ieee8021x": "1",
|
|
|
"eap_server": "1", "eap_user_file": "auth_serv/eap_user.conf",
|
|
|
"ca_cert": "auth_serv/ca.pem",
|
|
|
"server_cert": "auth_serv/server.pem",
|
|
|
- "private_key": "auth_serv/server.key",
|
|
|
- "ocsp_stapling_response": "auth_serv/ocsp-server-cache.der-invalid" }
|
|
|
+ "private_key": "auth_serv/server.key" }
|
|
|
+ return params
|
|
|
+
|
|
|
+def test_ap_wpa2_eap_tls_ocsp_invalid(dev, apdev):
|
|
|
+ """WPA2-Enterprise connection using EAP-TLS and invalid OCSP response"""
|
|
|
+ params = int_eap_server_params()
|
|
|
+ params["ocsp_stapling_response"] = "auth_serv/ocsp-server-cache.der-invalid"
|
|
|
hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TLS",
|
|
|
identity="tls user", ca_cert="auth_serv/ca.pem",
|
|
@@ -877,3 +881,39 @@ def test_ap_wpa2_eap_tls_ocsp_invalid(dev, apdev):
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-FAILURE"])
|
|
|
if ev is None:
|
|
|
raise Exception("Timeout on EAP failure report")
|
|
|
+
|
|
|
+def test_ap_wpa2_eap_tls_domain_suffix_match_cn(dev, apdev):
|
|
|
+ """WPA2-Enterprise using EAP-TLS and domain suffix match (CN)"""
|
|
|
+ params = int_eap_server_params()
|
|
|
+ params["server_cert"] = "auth_serv/server-no-dnsname.pem"
|
|
|
+ params["private_key"] = "auth_serv/server-no-dnsname.key"
|
|
|
+ hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
+ dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TLS",
|
|
|
+ identity="tls user", ca_cert="auth_serv/ca.pem",
|
|
|
+ private_key="auth_serv/user.pkcs12",
|
|
|
+ private_key_passwd="whatever",
|
|
|
+ domain_suffix_match="server3.w1.fi",
|
|
|
+ scan_freq="2412")
|
|
|
+ dev[1].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TLS",
|
|
|
+ identity="tls user", ca_cert="auth_serv/ca.pem",
|
|
|
+ private_key="auth_serv/user.pkcs12",
|
|
|
+ private_key_passwd="whatever",
|
|
|
+ domain_suffix_match="w1.fi",
|
|
|
+ scan_freq="2412")
|
|
|
+
|
|
|
+def test_ap_wpa2_eap_tls_domain_suffix_mismatch_cn(dev, apdev):
|
|
|
+ """WPA2-Enterprise using EAP-TLS and domain suffix mismatch (CN)"""
|
|
|
+ params = int_eap_server_params()
|
|
|
+ params["server_cert"] = "auth_serv/server-no-dnsname.pem"
|
|
|
+ params["private_key"] = "auth_serv/server-no-dnsname.key"
|
|
|
+ hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
+ dev[0].connect("test-wpa2-eap", key_mgmt="WPA-EAP", eap="TLS",
|
|
|
+ identity="tls user", ca_cert="auth_serv/ca.pem",
|
|
|
+ private_key="auth_serv/user.pkcs12",
|
|
|
+ private_key_passwd="whatever",
|
|
|
+ domain_suffix_match="example.com",
|
|
|
+ wait_connect=False,
|
|
|
+ scan_freq="2412")
|
|
|
+ ev = dev[0].wait_event(["CTRL-EVENT-EAP-FAILURE"])
|
|
|
+ if ev is None:
|
|
|
+ raise Exception("Timeout on EAP failure report")
|