diff --git a/tests/hwsim/auth_serv/eap_user.conf b/tests/hwsim/auth_serv/eap_user.conf index 215f77956..0f836fe63 100644 --- a/tests/hwsim/auth_serv/eap_user.conf +++ b/tests/hwsim/auth_serv/eap_user.conf @@ -8,6 +8,7 @@ "psk.user@example.com" PSK 0123456789abcdef0123456789abcdef "vendor-test" VENDOR-TEST "foo" "osen@example.com" WFA-UNAUTH-TLS +"unauth-tls" UNAUTH-TLS "vlan1" PAX 0123456789abcdef0123456789abcdef radius_accept_attr=64:d:13 diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index af5b68e63..1d4860c94 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -841,6 +841,14 @@ def test_ap_wpa2_eap_tls_neg_altsubject_match(dev, apdev): if ev is None: raise Exception("Network block disabling not reported") +def test_ap_wpa2_eap_unauth_tls(dev, apdev): + """WPA2-Enterprise connection using UNAUTH-TLS""" + params = hostapd.wpa2_eap_params(ssid="test-wpa2-eap") + hostapd.add_ap(apdev[0]['ifname'], params) + eap_connect(dev[0], apdev[0], "UNAUTH-TLS", "unauth-tls", + ca_cert="auth_serv/ca.pem") + eap_reauth(dev[0], "UNAUTH-TLS") + def test_ap_wpa2_eap_ttls_server_cert_hash(dev, apdev): """WPA2-Enterprise connection using EAP-TTLS and server certificate hash""" srv_cert_hash = "0a3f81f63569226657a069855bb13f3b922670437a2b87585a4734f70ac7315b"