mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-22 06:29:23 +01:00
auto-t: remove duplicate EAP tests
This removes any EAP test which was combined into testEAP as well as modifies any special EAP test to use the now global eap-users file.
This commit is contained in:
parent
c21dc9ed6f
commit
f0a890da8a
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* TLS
|
||||
# Phase 2
|
||||
"abc@example.com" MD5 "testpasswd" [2]
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* TTLS
|
||||
# Phase 2
|
||||
"user" MSCHAPV2 "testpasswd" [2]
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* TTLS
|
||||
# Phase 2
|
||||
"abc@example.com" MD5 "testpasswd" [2]
|
@ -1 +0,0 @@
|
||||
"domain\User" MSCHAPV2 "Password"
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* PEAP
|
||||
# Phase 2
|
||||
"domain\User" MSCHAPV2 "Password" [2]
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* PEAP
|
||||
# Phase 2
|
||||
"112345678@phonesim.org" SIM [2]
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* PEAP [ver=0]
|
||||
# Phase 2
|
||||
"secure@identity.com" MSCHAPV2 "testpasswd" [2]
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* PEAP [ver=0]
|
||||
# Phase 2
|
||||
"secure@identity.com" MD5 "testpasswd" [2]
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* PEAP [ver=1]
|
||||
# Phase 2
|
||||
"secure@identity.com" MD5 "testpasswd" [2]
|
@ -6,7 +6,7 @@ wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-ttls.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
@ -3,4 +3,4 @@ EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-Identity=abc@example.com
|
||||
EAP-Identity=tls@example.com
|
||||
|
@ -6,7 +6,7 @@ wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
@ -1,6 +1,6 @@
|
||||
[Security]
|
||||
EAP-Method=MSCHAPV2
|
||||
EAP-Identity=domain\\User
|
||||
EAP-Identity=mschapv2@example.com
|
||||
EAP-Password=Password
|
||||
|
||||
[Settings]
|
||||
|
@ -13,5 +13,5 @@ nas_identifier=ap.example.com
|
||||
radius_server_clients=/tmp/certs/radius-clients.text
|
||||
radius_server_auth_port=1812
|
||||
|
||||
eap_user_file=/tmp/secrets/eap-user-mschapv2.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
eap_server=1
|
||||
|
@ -1,59 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
from hlrauc import AuthCenter
|
||||
from ofono import Ofono
|
||||
from config import ctx
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
def test_connection_success(self):
|
||||
ofono = Ofono()
|
||||
ofono.enable_modem('/phonesim')
|
||||
ofono.wait_for_sim_auth()
|
||||
|
||||
wd = IWD()
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-AKA')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
if not ctx.is_process_running('ofonod'):
|
||||
cls.skipTest(cls, "ofono not running")
|
||||
|
||||
IWD.copy_to_storage('ssidEAP-AKA.8021x')
|
||||
|
||||
cls.auth = AuthCenter('/tmp/hlrauc.sock', '/tmp/sim.db')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
cls.auth.stop()
|
||||
cls.auth = None
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,6 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
sim_keys=ofono
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-AKA.conf
|
@ -1,3 +0,0 @@
|
||||
# IMSI K OPC AMF SQN
|
||||
|
||||
12345678:90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:61df:000000000021
|
@ -1 +0,0 @@
|
||||
"012345678@phonesim.org" AKA
|
@ -1,5 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=AKA
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,16 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
|
||||
driver=nl80211
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
ssid=ssidEAP-AKA
|
||||
eap_user_file=/tmp/sim.eap_user
|
||||
eap_sim_db=unix:/tmp/hlrauc.sock
|
||||
wpa=2
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
wpa_pairwise=TKIP CCMP
|
||||
rsn_pairwise=CCMP TKIP
|
||||
wpa_passphrase=secret123
|
||||
channel=1
|
||||
eap_sim_aka_result_ind=1
|
@ -1,58 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
from hlrauc import AuthCenter
|
||||
from ofono import Ofono
|
||||
from config import ctx
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
def test_connection_success(self):
|
||||
ofono = Ofono()
|
||||
ofono.enable_modem('/phonesim')
|
||||
ofono.wait_for_sim_auth()
|
||||
|
||||
wd = IWD()
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-AKA')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
if not ctx.is_process_running('ofonod'):
|
||||
cls.skipTest(cls, "ofono not running")
|
||||
|
||||
IWD.copy_to_storage('ssidEAP-AKA.8021x')
|
||||
|
||||
cls.auth = AuthCenter('/tmp/hlrauc.sock', '/tmp/sim.db')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
cls.auth.stop()
|
||||
cls.auth = None
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,6 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
sim_keys=ofono
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-AKA.conf
|
@ -1,3 +0,0 @@
|
||||
# IMSI K OPC AMF SQN
|
||||
|
||||
12345678:90dca4eda45b53cf0f12d7c9c3bc6a89:cb9cccc4b9258e6dca4760379fb82581:61df:000000000021
|
@ -1 +0,0 @@
|
||||
"612345678@phonesim.org" AKA'
|
@ -1,5 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=AKA'
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,16 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
|
||||
driver=nl80211
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
ssid=ssidEAP-AKA
|
||||
eap_user_file=/tmp/sim.eap_user
|
||||
eap_sim_db=unix:/tmp/hlrauc.sock
|
||||
wpa=2
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
wpa_pairwise=TKIP CCMP
|
||||
rsn_pairwise=CCMP TKIP
|
||||
wpa_passphrase=secret123
|
||||
channel=1
|
||||
eap_sim_aka_result_ind=1
|
@ -1,76 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def run_connection_test(self, *secrets):
|
||||
wd = IWD()
|
||||
|
||||
psk_agent = iwd.PSKAgent(*secrets)
|
||||
wd.register_psk_agent(psk_agent)
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
device = devices[0]
|
||||
|
||||
condition = 'not obj.scanning'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
if not device.get_ordered_networks():
|
||||
device.scan()
|
||||
condition = 'obj.scanning'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
condition = 'not obj.scanning'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
ordered_network = device.get_ordered_network("ssidEAP-MSCHAPV2")
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
wd.unregister_psk_agent(psk_agent)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_agent_none(self):
|
||||
IWD.copy_to_storage('ssidEAP-MSCHAPV2-1.8021x', name='ssidEAP-MSCHAPV2.8021x')
|
||||
self.run_connection_test()
|
||||
|
||||
def test_agent_none_hash(self):
|
||||
IWD.copy_to_storage('ssidEAP-MSCHAPV2-2.8021x', name='ssidEAP-MSCHAPV2.8021x')
|
||||
self.run_connection_test()
|
||||
|
||||
def test_agent_passwd(self):
|
||||
IWD.copy_to_storage('ssidEAP-MSCHAPV2-3.8021x', name='ssidEAP-MSCHAPV2.8021x')
|
||||
self.run_connection_test([], ('domain\\User', 'Password'))
|
||||
|
||||
def test_agent_username_and_passwd(self):
|
||||
IWD.copy_to_storage('ssidEAP-MSCHAPV2-4.8021x', name='ssidEAP-MSCHAPV2.8021x')
|
||||
self.run_connection_test([], ('domain\\User', 'Password'))
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
pass
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,5 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-MSCHAPV2.conf
|
@ -1,7 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=MSCHAPV2
|
||||
EAP-Identity=domain\\User
|
||||
EAP-Password=Password
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,7 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=MSCHAPV2
|
||||
EAP-Identity=domain\\User
|
||||
EAP-Password-Hash=a4f49c406510bdcab6824ee7c30fd852
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,6 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=MSCHAPV2
|
||||
EAP-Identity=domain\\User
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,5 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=MSCHAPV2
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,9 +0,0 @@
|
||||
ssid=ssidEAP-MSCHAPV2
|
||||
interface=wln0
|
||||
hw_mode=g
|
||||
channel=1
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-mschapv2.text
|
@ -1,4 +0,0 @@
|
||||
# Phase 1 users
|
||||
* PEAP [ver=1]
|
||||
# Phase 2
|
||||
"secure@identity.com" GTC "testpasswd" [2]
|
@ -1,7 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=3
|
||||
start_iwd=0
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-PEAPv1-GTC.conf
|
||||
rad1=ssidEAP-PEAPv1-GTC-nosecret.conf
|
@ -1,59 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
from iwd import PSKAgent
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAPv1-GTC-nosecret')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
psk_agent = PSKAgent('secure@identity.com',
|
||||
('secure@identity.com', 'testpasswd'))
|
||||
wd.register_psk_agent(psk_agent)
|
||||
|
||||
try:
|
||||
self.validate_connection(wd)
|
||||
finally:
|
||||
wd.unregister_psk_agent(psk_agent)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PEAPv1-GTC-nosecret.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,51 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAPv1-GTC')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PEAPv1-GTC.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,11 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=GTC
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,12 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAPv1-GTC-nosecret
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/eap-user-peap-gtc.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,12 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=GTC
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
EAP-PEAP-Phase2-Password=testpasswd
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,12 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAPv1-GTC
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/eap-user-peap-gtc.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,52 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
from hlrauc import AuthCenter
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAP-MSCHAPv2')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PEAP-MSCHAPv2.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,6 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
start_iwd=0
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-PEAP-MSCHAPv2.conf
|
@ -1,12 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=MSCHAPV2
|
||||
EAP-PEAP-Phase2-Identity=domain\\User
|
||||
EAP-PEAP-Phase2-Password=Password
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,12 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAP-MSCHAPv2
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-mschapv2.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,65 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
from hlrauc import AuthCenter
|
||||
from ofono import Ofono
|
||||
from config import ctx
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAP-SIM')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
|
||||
def test_connection_success(self):
|
||||
ofono = Ofono()
|
||||
ofono.enable_modem('/phonesim')
|
||||
ofono.wait_for_sim_auth()
|
||||
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
if not ctx.is_process_running('ofonod'):
|
||||
cls.skipTest(cls, "ofono not running")
|
||||
|
||||
cls.auth = AuthCenter('/tmp/hlrauc.sock', '/tmp/sim.db')
|
||||
|
||||
IWD.copy_to_storage('ssidEAP-PEAP-SIM.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
cls.auth.stop()
|
||||
cls.auth = None
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,7 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
start_iwd=0
|
||||
sim_keys=ofono
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-PEAP-SIM.conf
|
@ -1 +0,0 @@
|
||||
12345678:673fb8cd35f98800:1fb1e3b5:DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
@ -1 +0,0 @@
|
||||
"112345678@phonesim.org" SIM
|
@ -1,10 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@example.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=SIM
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,15 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAP-SIM
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-sim.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
||||
eap_sim_db=unix:/tmp/hlrauc.sock
|
||||
eap_sim_aka_result_ind=1
|
@ -1,2 +0,0 @@
|
||||
[EAP]
|
||||
MTU=100
|
@ -1,8 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=4
|
||||
start_iwd=0
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-PEAPv1.conf
|
||||
rad1=ssidEAP-PEAPv0.conf
|
||||
rad2=ssidEAP-PEAP-frag.conf
|
@ -1,50 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAP-frag')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True, '/tmp/IWD-Frag')
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PEAP-frag.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,50 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAPv0')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PEAPv0.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,50 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
import time
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PEAPv1')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PEAPv1.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,12 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=MD5
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
EAP-PEAP-Phase2-Password=testpasswd
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,14 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAP-frag
|
||||
|
||||
fragment_size=256
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-v1.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,12 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=MD5
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
EAP-PEAP-Phase2-Password=testpasswd
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,12 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAPv0
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-v0.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,12 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=MD5
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
EAP-PEAP-Phase2-Password=testpasswd
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,12 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-PEAPv1
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-v1.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,12 +1,12 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-Identity=peapv0@example.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=MSCHAPV2
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
EAP-PEAP-Phase2-Password=testpasswd
|
||||
EAP-PEAP-Phase2-Identity=mschapv2-phase2@example.com
|
||||
EAP-PEAP-Phase2-Password=Password
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
||||
|
@ -6,7 +6,7 @@ wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-v0-mschapv2.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
@ -1,12 +1,12 @@
|
||||
[Security]
|
||||
EAP-Method=PEAP
|
||||
EAP-Identity=open@identity.com
|
||||
EAP-Identity=peapv0@example.com
|
||||
EAP-PEAP-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-PEAP-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-PEAP-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-PEAP-Phase2-Method=MD5
|
||||
EAP-PEAP-Phase2-Identity=secure@identity.com
|
||||
EAP-PEAP-Phase2-Password=testpasswd
|
||||
EAP-PEAP-Phase2-Identity=md5-phase2@example.com
|
||||
EAP-PEAP-Phase2-Password=Password
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
||||
|
@ -6,7 +6,7 @@ wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/secrets/eap-user-peap-v0.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
@ -1,2 +0,0 @@
|
||||
[EAP]
|
||||
MTU=40
|
@ -1,70 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import PSKAgent
|
||||
from iwd import NetworkType
|
||||
|
||||
from hostapd import HostapdCLI
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
hostapd = HostapdCLI(config='ssidEAP-PWD.conf')
|
||||
|
||||
self.assertIsNotNone(hostapd)
|
||||
|
||||
psk_agent = PSKAgent('eap-pwd-identity', ('eap-pwd-identity',
|
||||
'secret123'))
|
||||
wd.register_psk_agent(psk_agent)
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PWD')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
hostapd.eapol_reauth(device.address)
|
||||
|
||||
hostapd.wait_for_event('CTRL-EVENT-EAP-STARTED')
|
||||
hostapd.wait_for_event('CTRL-EVENT-EAP-SUCCESS')
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
wd.unregister_psk_agent(psk_agent)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PWD.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,49 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def validate_connection(self, wd):
|
||||
devices = wd.list_devices(1)
|
||||
self.assertIsNotNone(devices)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-PWD-frag')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
def test_connection_success(self):
|
||||
wd = IWD(True)
|
||||
|
||||
self.validate_connection(wd)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-PWD-frag.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,7 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=3
|
||||
start_iwd=0
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-PWD.conf
|
||||
rad1=ssidEAP-PWD-frag.conf
|
@ -1 +0,0 @@
|
||||
"eap-pwd-identity" PWD "secret123"
|
@ -1,7 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PWD
|
||||
EAP-Identity=eap-pwd-identity
|
||||
EAP-Password=secret123
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,16 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
|
||||
driver=nl80211
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
ssid=ssidEAP-PWD-frag
|
||||
eap_user_file=/tmp/pwd.eap_user
|
||||
wpa=2
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
wpa_pairwise=TKIP CCMP
|
||||
rsn_pairwise=CCMP TKIP
|
||||
wpa_passphrase=secret123
|
||||
channel=1
|
||||
pwd_group=19
|
||||
fragment_size=80
|
@ -1,6 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=PWD
|
||||
EAP-Identity=eap-pwd-identity
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,15 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
|
||||
driver=nl80211
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
ssid=ssidEAP-PWD
|
||||
eap_user_file=/tmp/pwd.eap_user
|
||||
wpa=2
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
wpa_pairwise=TKIP CCMP
|
||||
rsn_pairwise=CCMP TKIP
|
||||
wpa_passphrase=secret123
|
||||
|
||||
pwd_group=20
|
@ -1,60 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import NetworkType
|
||||
from hlrauc import AuthCenter
|
||||
from ofono import Ofono
|
||||
from config import ctx
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def test_connection_success(self):
|
||||
ofono = Ofono()
|
||||
ofono.enable_modem('/phonesim')
|
||||
ofono.wait_for_sim_auth()
|
||||
|
||||
wd = IWD()
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network('ssidEAP-SIM')
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
if not ctx.is_process_running('ofonod'):
|
||||
cls.skipTest(cls, "ofono not running")
|
||||
|
||||
IWD.copy_to_storage('ssidEAP-SIM.8021x')
|
||||
|
||||
cls.auth = AuthCenter('/tmp/hlrauc.sock', '/tmp/sim.db')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
cls.auth.stop()
|
||||
cls.auth = None
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,6 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
sim_keys=ofono
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-SIM.conf
|
@ -1 +0,0 @@
|
||||
12345678:673fb8cd35f98800:1fb1e3b5:DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
@ -1 +0,0 @@
|
||||
"112345678@phonesim.org" SIM
|
@ -1,5 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=SIM
|
||||
|
||||
[Settings]
|
||||
AutoConnect=false
|
@ -1,16 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
|
||||
driver=nl80211
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
ssid=ssidEAP-SIM
|
||||
eap_user_file=/tmp/sim.eap_user
|
||||
eap_sim_db=unix:/tmp/hlrauc.sock
|
||||
wpa=2
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
wpa_pairwise=TKIP CCMP
|
||||
rsn_pairwise=CCMP TKIP
|
||||
wpa_passphrase=secret123
|
||||
channel=1
|
||||
eap_sim_aka_result_ind=1
|
@ -3,7 +3,7 @@ EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-Identity=abc@example.com
|
||||
EAP-Identity=tls@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
||||
|
@ -8,7 +8,7 @@ wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
@ -1,62 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import PSKAgent
|
||||
from iwd import NetworkType
|
||||
import testutil
|
||||
from hostapd import HostapdCLI
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def do_test_connection_success(self, ssid, passphrase=None):
|
||||
hostapd = HostapdCLI(config=ssid + '.conf')
|
||||
wd = IWD()
|
||||
|
||||
if passphrase:
|
||||
psk_agent = PSKAgent(passphrase)
|
||||
wd.register_psk_agent(psk_agent)
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network(ssid)
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
testutil.test_iface_operstate()
|
||||
testutil.test_ifaces_connected(hostapd.ifname, device.name)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
if passphrase:
|
||||
wd.unregister_psk_agent(psk_agent)
|
||||
|
||||
def test_eap_tls(self):
|
||||
self.do_test_connection_success('ssidEAP-TLS')
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-TLS.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,5 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=2
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-TLS.conf
|
@ -1,94 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=TLS
|
||||
EAP-TLS-CACert=embed:cert_ca
|
||||
EAP-TLS-ClientCert=embed:cert_client
|
||||
EAP-TLS-ClientKey=embed:cert_client_key
|
||||
EAP-Identity=abc@example.com
|
||||
|
||||
[@pem@cert_ca]
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEVDCCAzygAwIBAgIJAJmt2W7CutHvMA0GCSqGSIb3DQEBCwUAMHgxNTAzBgNV
|
||||
BAoMLEludGVybmF0aW9uYWwgVW5pb24gb2YgRXhhbXBsZSBPcmdhbml6YXRpb25z
|
||||
MR8wHQYDVQQDDBZDZXJ0aWZpY2F0ZSBpc3N1ZXIgZ3V5MR4wHAYJKoZIhvcNAQkB
|
||||
Fg9jYUBtYWlsLmV4YW1wbGUwHhcNMTYwNTE3MjEyMDQ2WhcNNDMxMDAzMjEyMDQ2
|
||||
WjB4MTUwMwYDVQQKDCxJbnRlcm5hdGlvbmFsIFVuaW9uIG9mIEV4YW1wbGUgT3Jn
|
||||
YW5pemF0aW9uczEfMB0GA1UEAwwWQ2VydGlmaWNhdGUgaXNzdWVyIGd1eTEeMBwG
|
||||
CSqGSIb3DQEJARYPY2FAbWFpbC5leGFtcGxlMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||
AQ8AMIIBCgKCAQEAo3GrGqW49h8kY2Wx/1kd5dIkYGazuWrX93ma9904hHBJNsvu
|
||||
V34QfHVln6wDpMZMwuvkfct09kl0rQpztJzA9YL4GMdmV6+6J6LiX1kMqLkNaJa+
|
||||
Ov+ECG5ypBRbSTYKpqFsc5wPOQf/N8brBiZS1v67va3fCwO6dgLeAf7dZ3Q70oUr
|
||||
mghbK8UnlC+wLShxCBAW8TUKg7B7M5Gea794CO9wH7NsFyAr963WVcLxrdL3xMHZ
|
||||
9hcscrljh35nCAc6sum1cTtWI651OGehr0Bhp2o2Exgr2mbo5TobqEW+fe4gc4ik
|
||||
0nzHGWiOVaszUcvpeeduGV3y6om93atffeKuxQIDAQABo4HgMIHdMA8GA1UdEwQI
|
||||
MAYBAf8CAQAwHQYDVR0OBBYEFO+M3tJAELTnseUqZyP4vl5X7SmUMIGqBgNVHSME
|
||||
gaIwgZ+AFO+M3tJAELTnseUqZyP4vl5X7SmUoXykejB4MTUwMwYDVQQKDCxJbnRl
|
||||
cm5hdGlvbmFsIFVuaW9uIG9mIEV4YW1wbGUgT3JnYW5pemF0aW9uczEfMB0GA1UE
|
||||
AwwWQ2VydGlmaWNhdGUgaXNzdWVyIGd1eTEeMBwGCSqGSIb3DQEJARYPY2FAbWFp
|
||||
bC5leGFtcGxlggkAma3ZbsK60e8wDQYJKoZIhvcNAQELBQADggEBAA/Yb9jB94OF
|
||||
swbyCrA6Qe53YGC4dfqrKGRThtGKTrH0XcM2x2qLIIbiNDogwhRqlUW8iNY6Dm2k
|
||||
43mJzNsYhy7Nt3IJFCguTJFilfGzQnBtK8wCr/C9qsj//BESOIlo/TDZ2Ho4ixcJ
|
||||
n+FTnN34F6JJ0DIvA6tNBe1kUFSrbubL8ygNWJ9BKMebEzokGNGCGFNr70DlQj2o
|
||||
1EOMMOkj0gWO0WegAYFLojzag3l+uvU59YE+/fbZ2iclyvbF7IutQ5M9g5TnQE6F
|
||||
f+qFKR5+bhlJwry6vLl/6ulihkvF3y1bm7zae62zbFaZRU6PJUl1DtXiA23ZTm9T
|
||||
VDivqs07R84=
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
[@pem@cert_client]
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIEPTCCAyWgAwIBAgIJAPk7rut4SWQCMA0GCSqGSIb3DQEBCwUAMHgxNTAzBgNV
|
||||
BAoMLEludGVybmF0aW9uYWwgVW5pb24gb2YgRXhhbXBsZSBPcmdhbml6YXRpb25z
|
||||
MR8wHQYDVQQDDBZDZXJ0aWZpY2F0ZSBpc3N1ZXIgZ3V5MR4wHAYJKoZIhvcNAQkB
|
||||
Fg9jYUBtYWlsLmV4YW1wbGUwHhcNMTYwNTE3MjEyMDQ3WhcNNDMxMDAzMjEyMDQ3
|
||||
WjBnMSEwHwYDVQQKDBhCYXIgRXhhbXBsZSBPcmdhbml6YXRpb24xITAfBgNVBAMM
|
||||
GEJhciBFeGFtcGxlIE9yZ2FuaXphdGlvbjEfMB0GCSqGSIb3DQEJARYQYmFyQG1h
|
||||
aWwuZXhhbXBsZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOE5D/lU
|
||||
haTC3xL281ttZPRURXlKJqLwcHGXQSuQm6wwYWtAhLyMLEHrryE0oChKdw3eV7Nn
|
||||
/IODxvk1S8uIuKfHWuNd5qX/yu7CjCWvyim2CSJHF24rQFmb9ePoddOZnDMMAIz7
|
||||
PC325JVhbr/LSBLbqhZ0smHy1HKyrzzHHzKU4YcTH/3+3H4MHZwnNZfbfG5qhRZG
|
||||
Nuu/8t+AWVcEocPRGYZpzWJNq6AAzojAHSSOxxiscBMiuQ+BdofPw9XhwpS+Fstk
|
||||
rvF8J9FfZj5U3FOm/EgOQn8efnrUL231PqB1R9PIKYv/938p3iDMIi0ETiKi5ced
|
||||
WV8m2PcykPdNOKMCAwEAAaOB2jCB1zAJBgNVHRMEAjAAMB0GA1UdDgQWBBTs9eey
|
||||
OkMw3uiPpDOa3b9KErbEfzCBqgYDVR0jBIGiMIGfgBTvjN7SQBC057HlKmcj+L5e
|
||||
V+0plKF8pHoweDE1MDMGA1UECgwsSW50ZXJuYXRpb25hbCBVbmlvbiBvZiBFeGFt
|
||||
cGxlIE9yZ2FuaXphdGlvbnMxHzAdBgNVBAMMFkNlcnRpZmljYXRlIGlzc3VlciBn
|
||||
dXkxHjAcBgkqhkiG9w0BCQEWD2NhQG1haWwuZXhhbXBsZYIJAJmt2W7CutHvMA0G
|
||||
CSqGSIb3DQEBCwUAA4IBAQA8MxPjU2h5gwntQeSs8eeaEUILMkoU6JSDS4s5Hex5
|
||||
xYMLfcSoPPI0E6ahvKtWkSM0UZThyWsulSDTI1EgAiebjms06m1Ogh9V+0VbcOlQ
|
||||
D/k3+fSRIiyY+v3J/h8ArUby+m5O2g1TgECr/nZl4avoAI0RpBi3lH6tC8GQYdbc
|
||||
SA6hpNCM/dY3LWtAo2W6mdE8+RlCuTj4VZiQ1g6GE77t6XwDFL6vQBzLLXrinvXK
|
||||
Ha+IssV5sGdpH9bVFWIJV2q3OZuv3HLhQfGmeUrGyWVcokQQ8d6kRwg65Zb1+KT2
|
||||
bNlVKhPAMBk4ayEocpqFIfqfCKDjGdPUruIh8IVDc684
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
[@pem@cert_client_key]
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MIIEvwIBADANBgkqhkiG9w0BAQEFAASCBKkwggSlAgEAAoIBAQDhOQ/5VIWkwt8S
|
||||
9vNbbWT0VEV5Siai8HBxl0ErkJusMGFrQIS8jCxB668hNKAoSncN3lezZ/yDg8b5
|
||||
NUvLiLinx1rjXeal/8ruwowlr8optgkiRxduK0BZm/Xj6HXTmZwzDACM+zwt9uSV
|
||||
YW6/y0gS26oWdLJh8tRysq88xx8ylOGHEx/9/tx+DB2cJzWX23xuaoUWRjbrv/Lf
|
||||
gFlXBKHD0RmGac1iTaugAM6IwB0kjscYrHATIrkPgXaHz8PV4cKUvhbLZK7xfCfR
|
||||
X2Y+VNxTpvxIDkJ/Hn561C9t9T6gdUfTyCmL//d/Kd4gzCItBE4iouXHnVlfJtj3
|
||||
MpD3TTijAgMBAAECggEBAIbg9YAL7j1NtupUmkkWqm7oSPLqRVkvRSfBvXWplJD6
|
||||
KF1itht0lsyjqK3qJj/62HGlxj/a9o6MTIzSLiImLu/Lo9KmWYrwNUfnmqa3MArq
|
||||
yW2NxapknJUNoaRrgqTGSZUIiwvjKZcdVKdhQkH6K5+fja0FFg8yrahC+k8bsMNI
|
||||
5mw8NwRdR3SvHJWHCLfKCQ31tju7On/4C6jr0siUCc2//W+SO5c+FHDY1bma02cp
|
||||
jXTEiFpw91YcyKxiADIaH9/qfxWdefxqYg1WlUeXF3jYt5xYnYr34qKW1gOZ3jy1
|
||||
QJ3esn382ZTml3TFZWy+g9tkYyOSgmDwQZbLk/ppBAECgYEA8RzLBFwP018ieMBv
|
||||
khDtwcKk6ZihkWZxEPQPuUljWzzAHn/f3dXOcrfmflAKeoDEeYDimDYDizTLDPC4
|
||||
zmWkMJHNadcM5H065BbGVFQWXo47ltccfIlB/1vzG8aywfJ/yNfHvH87wbH2eg6N
|
||||
yOr+96ZjLJszQ+Rv189BbXDzTcMCgYEA7yEbUL/A1J0l2kLoYyS0vfVa7AyBVOFW
|
||||
vPgfkF7HdNpIiFWlukMr+DWOolaoZp5iHqQXFwJsL8qCcrbZuHbaNHAI/5vDE9xG
|
||||
fh8KzrfBrjIPIyNm6EWpsBo5unXK+wTeqIAGKdzDo5Q3zEE6G5DkkHItKA7yjPOM
|
||||
gz/b/MR3W6ECgYBBv3dA3hXWrreIs/j4nLMoxfoQVPWh34xvcg4jmXaFd6Bv8LDM
|
||||
HjRopestgIgK9bgd5d5kYT5AJIpGIhJS/fZy5B9egCzc1aVMc0Vr024yJJjtPgVf
|
||||
lFIx3xIA/gLazlS4INcveIaEABJVIEjbg/E4+N9MV5n4Jn+1GqgdvtIp3wKBgQC0
|
||||
C3lFkxrc+nVFoJrYCwsK+3E5yTCXeBKWtTsOuE307WUvQU1GsMyqVajPEfA5U4cN
|
||||
Cv9Xk7thQFh3hrTm7pXcZX5g9iYrDe8FhtncSv7I6Wf8TOtudwUMUrKkcYwi88ex
|
||||
lrMNUer7ft2ELJhTqQRuvYjCYH6/IaDqMWqxJju4AQKBgQDPjOh75ykQc93SsYpt
|
||||
Tb4gQKLeqOb57pofT8D44DccatfEgk31D4fBIIQu6XKopQmCtQyX9DUDjOWFTxuo
|
||||
IMPysN6Fh1quCbC6Xt5xfKoaJG5yQYKeKtLhknwEW9SUifU2xVrOcPikLs7Iwmmp
|
||||
BkDLsu/YKwRFSfrbYZXbTlU8tQ==
|
||||
-----END PRIVATE KEY-----
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
@ -1,12 +0,0 @@
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-TLS
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,74 +0,0 @@
|
||||
#!/usr/bin/python3
|
||||
|
||||
import unittest
|
||||
import sys
|
||||
|
||||
sys.path.append('../util')
|
||||
import iwd
|
||||
from iwd import IWD
|
||||
from iwd import PSKAgent
|
||||
from iwd import NetworkType
|
||||
import testutil
|
||||
from hostapd import HostapdCLI
|
||||
|
||||
class Test(unittest.TestCase):
|
||||
|
||||
def do_test_connection_success(self, ssid, passphrase=None):
|
||||
hapd = HostapdCLI(config=ssid + '.conf')
|
||||
wd = IWD()
|
||||
|
||||
if passphrase:
|
||||
psk_agent = PSKAgent(passphrase)
|
||||
wd.register_psk_agent(psk_agent)
|
||||
|
||||
devices = wd.list_devices(1)
|
||||
device = devices[0]
|
||||
|
||||
ordered_network = device.get_ordered_network(ssid)
|
||||
|
||||
self.assertEqual(ordered_network.type, NetworkType.eap)
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
ordered_network.network_object.connect()
|
||||
|
||||
condition = 'obj.state == DeviceState.connected'
|
||||
wd.wait_for_object_condition(device, condition)
|
||||
|
||||
testutil.test_iface_operstate()
|
||||
testutil.test_ifaces_connected(hapd.ifname, device.name)
|
||||
|
||||
device.disconnect()
|
||||
|
||||
condition = 'not obj.connected'
|
||||
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
||||
|
||||
if passphrase:
|
||||
wd.unregister_psk_agent(psk_agent)
|
||||
|
||||
def test_eap_tls(self):
|
||||
self.do_test_connection_success('ssidEAP-TLS')
|
||||
|
||||
def test_eap_tls2(self):
|
||||
self.do_test_connection_success('ssidEAP-TLS2')
|
||||
|
||||
def test_eap_tls3(self):
|
||||
self.do_test_connection_success('ssidEAP-TLS3', 'abc')
|
||||
|
||||
def test_eap_tls4(self):
|
||||
self.do_test_connection_success('ssidEAP-TLS4')
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
IWD.copy_to_storage('ssidEAP-TLS.8021x')
|
||||
IWD.copy_to_storage('ssidEAP-TLS2.8021x')
|
||||
IWD.copy_to_storage('ssidEAP-TLS3.8021x')
|
||||
IWD.copy_to_storage('ssidEAP-TLS4.8021x')
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
IWD.clear_storage()
|
||||
|
||||
if __name__ == '__main__':
|
||||
unittest.main(exit=True)
|
@ -1,8 +0,0 @@
|
||||
[SETUP]
|
||||
num_radios=5
|
||||
|
||||
[HOSTAPD]
|
||||
rad0=ssidEAP-TLS.conf
|
||||
rad1=ssidEAP-TLS2.conf
|
||||
rad2=ssidEAP-TLS3.conf
|
||||
rad3=ssidEAP-TLS4.conf
|
@ -1,9 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-Identity=abc@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
@ -1,13 +0,0 @@
|
||||
ctrl_interface=/var/run/hostapd
|
||||
hw_mode=g
|
||||
channel=1
|
||||
ssid=ssidEAP-TLS
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,10 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-md5-des.pem
|
||||
EAP-TLS-ClientKeyPassphrase=abc
|
||||
EAP-Identity=abc@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
@ -1,13 +0,0 @@
|
||||
ctrl_interface=/var/run/hostapd
|
||||
hw_mode=g
|
||||
channel=2
|
||||
ssid=ssidEAP-TLS2
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,9 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.crt
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-v2-des-ede3.pem
|
||||
EAP-Identity=abc@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
@ -1,13 +0,0 @@
|
||||
ctrl_interface=/var/run/hostapd
|
||||
hw_mode=g
|
||||
channel=3
|
||||
ssid=ssidEAP-TLS3
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -1,9 +0,0 @@
|
||||
[Security]
|
||||
EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientKeyBundle=/tmp/certs/cert-client.p12
|
||||
EAP-TLS-ClientKeyPassphrase=abc
|
||||
EAP-Identity=abc@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
@ -1,13 +0,0 @@
|
||||
ctrl_interface=/var/run/hostapd
|
||||
hw_mode=g
|
||||
channel=4
|
||||
ssid=ssidEAP-TLS4
|
||||
|
||||
wpa=3
|
||||
wpa_key_mgmt=WPA-EAP
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
@ -3,7 +3,7 @@ EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-Identity=abc@example.com
|
||||
EAP-Identity=tls@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
||||
|
@ -5,7 +5,7 @@ ssid=ssidEAP-TLS
|
||||
wpa=2
|
||||
ieee8021x=1
|
||||
eap_server=1
|
||||
eap_user_file=/tmp/certs/eap-user-tls.text
|
||||
eap_user_file=/tmp/secrets/eap-user.text
|
||||
ca_cert=/tmp/certs/cert-ca.pem
|
||||
server_cert=/tmp/certs/cert-server.pem
|
||||
private_key=/tmp/certs/cert-server-key.pem
|
||||
|
@ -3,7 +3,7 @@ EAP-Method=TLS
|
||||
EAP-TLS-CACert=/tmp/certs/cert-ca.pem
|
||||
EAP-TLS-ClientCert=/tmp/certs/cert-client.pem
|
||||
EAP-TLS-ClientKey=/tmp/certs/cert-client-key-pkcs8.pem
|
||||
EAP-Identity=abc@example.com
|
||||
EAP-Identity=tls@example.com
|
||||
|
||||
[Settings]
|
||||
AutoConnect=False
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user