|
@@ -2840,3 +2840,29 @@ def _test_ap_wpa2_eap_in_bridge(dev, apdev):
|
|
|
wpas.wait_disconnected()
|
|
|
wpas.request("RECONNECT")
|
|
|
wpas.wait_connected()
|
|
|
+
|
|
|
+def test_ap_wpa2_eap_session_ticket(dev, apdev):
|
|
|
+ """WPA2-Enterprise connection using EAP-TTLS and TLS session ticket enabled"""
|
|
|
+ params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
|
|
|
+ hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
+ key_mgmt = hapd.get_config()['key_mgmt']
|
|
|
+ if key_mgmt.split(' ')[0] != "WPA-EAP":
|
|
|
+ raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
|
|
|
+ eap_connect(dev[0], apdev[0], "TTLS", "pap user",
|
|
|
+ anonymous_identity="ttls", password="password",
|
|
|
+ ca_cert="auth_serv/ca.pem",
|
|
|
+ phase1="tls_disable_session_ticket=0", phase2="auth=PAP")
|
|
|
+ eap_reauth(dev[0], "TTLS")
|
|
|
+
|
|
|
+def test_ap_wpa2_eap_no_workaround(dev, apdev):
|
|
|
+ """WPA2-Enterprise connection using EAP-TTLS and eap_workaround=0"""
|
|
|
+ params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap")
|
|
|
+ hapd = hostapd.add_ap(apdev[0]['ifname'], params)
|
|
|
+ key_mgmt = hapd.get_config()['key_mgmt']
|
|
|
+ if key_mgmt.split(' ')[0] != "WPA-EAP":
|
|
|
+ raise Exception("Unexpected GET_CONFIG(key_mgmt): " + key_mgmt)
|
|
|
+ eap_connect(dev[0], apdev[0], "TTLS", "pap user",
|
|
|
+ anonymous_identity="ttls", password="password",
|
|
|
+ ca_cert="auth_serv/ca.pem", eap_workaround='0',
|
|
|
+ phase2="auth=PAP")
|
|
|
+ eap_reauth(dev[0], "TTLS")
|