|
@@ -13,35 +13,35 @@ def test_ap_config_errors(dev, apdev):
|
|
|
|
|
|
# IEEE 802.11d without country code
|
|
|
params = { "ssid": "foo", "ieee80211d": "1" }
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (ieee80211d without country_code)")
|
|
|
hapd_global.remove(ifname)
|
|
|
|
|
|
# IEEE 802.11h without IEEE 802.11d
|
|
|
params = { "ssid": "foo", "ieee80211h": "1" }
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (ieee80211h without ieee80211d")
|
|
|
hapd_global.remove(ifname)
|
|
|
|
|
|
# Power Constraint without IEEE 802.11d
|
|
|
params = { "ssid": "foo", "local_pwr_constraint": "1" }
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (local_pwr_constraint without ieee80211d)")
|
|
|
hapd_global.remove(ifname)
|
|
|
|
|
|
# Spectrum management without Power Constraint
|
|
|
params = { "ssid": "foo", "spectrum_mgmt_required": "1" }
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (spectrum_mgmt_required without local_pwr_constraint)")
|
|
|
hapd_global.remove(ifname)
|
|
|
|
|
|
# IEEE 802.1X without authentication server
|
|
|
params = { "ssid": "foo", "ieee8021x": "1" }
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (ieee8021x)")
|
|
|
hapd_global.remove(ifname)
|
|
@@ -49,7 +49,7 @@ def test_ap_config_errors(dev, apdev):
|
|
|
# RADIUS-PSK without macaddr_acl=2
|
|
|
params = hostapd.wpa2_params(ssid="foo", passphrase="12345678")
|
|
|
params["wpa_psk_radius"] = "1"
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (wpa_psk_radius)")
|
|
|
hapd_global.remove(ifname)
|
|
@@ -59,7 +59,7 @@ def test_ap_config_errors(dev, apdev):
|
|
|
"wpa_key_mgmt": "FT-PSK",
|
|
|
"rsn_pairwise": "CCMP",
|
|
|
"wpa_passphrase": "12345678" }
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (FT without nas_identifier)")
|
|
|
hapd_global.remove(ifname)
|
|
@@ -74,7 +74,7 @@ def test_ap_config_errors(dev, apdev):
|
|
|
params['interworking'] = "1"
|
|
|
params['hs20'] = "1"
|
|
|
params['wpa'] = "1"
|
|
|
- hapd = hostapd.add_ap(ifname, params, no_enable=True)
|
|
|
+ hapd = hostapd.add_ap(apdev[0], params, no_enable=True)
|
|
|
if "FAIL" not in hapd.request("ENABLE"):
|
|
|
raise Exception("Unexpected ENABLE success (HS 2.0 without WPA2/CCMP)")
|
|
|
hapd_global.remove(ifname)
|