Browse Source

tests: Increas EAP-pwd fragmentation coverage

Verify fragmentation of additional message types.

Signed-off-by: Jouni Malinen <j@w1.fi>
Jouni Malinen 11 years ago
parent
commit
0403fa0a93
2 changed files with 11 additions and 4 deletions
  1. 1 0
      tests/hwsim/auth_serv/eap_user.conf
  2. 10 4
      tests/hwsim/test_ap_eap.py

+ 1 - 0
tests/hwsim/auth_serv/eap_user.conf

@@ -1,4 +1,5 @@
 "pwd user"	PWD	"secret password"
+"pwd.user@test123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.example.com"	PWD	"secret password"
 "gpsk user"	GPSK	"abcdefghijklmnop0123456789abcdef"
 "sake user"	SAKE	0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
 "eke user"	EKE	"hello"

+ 10 - 4
tests/hwsim/test_ap_eap.py

@@ -704,16 +704,22 @@ def test_ap_wpa2_eap_pwd(dev, apdev):
     hostapd.add_ap(apdev[0]['ifname'], params)
     eap_connect(dev[0], apdev[0], "PWD", "pwd user", password="secret password")
     eap_reauth(dev[0], "PWD")
-
     dev[0].request("REMOVE_NETWORK all")
-    eap_connect(dev[0], apdev[0], "PWD", "pwd user", password="secret password",
+
+    eap_connect(dev[1], apdev[0], "PWD",
+                "pwd.user@test123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.example.com",
+                password="secret password",
                 fragment_size="90")
 
     logger.info("Negative test with incorrect password")
-    dev[0].request("REMOVE_NETWORK all")
-    eap_connect(dev[0], apdev[0], "PWD", "pwd user", password="secret-password",
+    eap_connect(dev[2], apdev[0], "PWD", "pwd user", password="secret-password",
                 expect_failure=True, local_error_report=True)
 
+    eap_connect(dev[0], apdev[0], "PWD",
+                "pwd.user@test123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.example.com",
+                password="secret password",
+                fragment_size="31")
+
 def test_ap_wpa2_eap_pwd_groups(dev, apdev):
     """WPA2-Enterprise connection using various EAP-pwd groups"""
     params = { "ssid": "test-wpa2-eap", "wpa": "2", "wpa_key_mgmt": "WPA-EAP",