Index: server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
diff --git a/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES b/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
index 3bb13ae69a61b76b222470e63c63bf71aeb1f5ae..35865db34a835f44c2917d438b9e36c723f682e9 100644 |
--- a/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
+++ b/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
@@ -14,30 +14,47 @@ |
[ "config", { "channel":"2412", "mode":"11g", |
"wpa":"1", "wpa_key_mgmt":"WPA-EAP", |
"wpa_pairwise":"CCMP", "ieee8021x":"1", |
- "eap-tls":"cert1" } ], |
- [ "connect", { "security":"802_1x", "eap-tls":"cert1" } ], |
+ "eap_server" : "1", |
+ "ca_cert" : ca_cert_1, |
Paul Stewart
2011/01/13 01:56:06
If you're using a "files" parameter below in the c
|
+ "server_cert" : server_cert_1, |
+ "private_key" : server_private_key_1, |
+ "eap_user_file" : "* TLS"} ], |
+ [ "connect", { "security":"802_1x", |
+ "files" : {"/tmp/pkg-client.pem" : client_cert_1 + |
+ "\n" + client_private_key_1}, |
+ "psk" : "EAP-TLS:chromeos:/tmp/pkg-client.pem"} ], |
+ |
[ "client_ping", { "count":"10" } ], |
[ "disconnect" ], |
[ "restart_supplicant" ], |
[ "config", { "ssid_suffix":"t1" } ], |
- [ "connect", { "security":"802_1x", "eap-tls":"cert1", |
- "server-auth":"cert1" } ], |
+ [ "connect", { "security":"802_1x", |
+ "files" : {"/tmp/pkg-client.pem" : client_cert_1 + |
+ "\n" + client_private_key_1, |
+ "/tmp/ca-cert.pem" : ca_cert_1}, |
+ "psk" : "EAP-TLS:chromeos:/tmp/pkg-client.pem:/tmp/ca-cert.pem"} ], |
Paul Stewart
2011/01/13 01:56:06
80 cols here and below.
|
[ "client_ping", { "count":"10" } ], |
[ "disconnect" ], |
# Ensure authentication fails if server's cert doesn't match our CA cert |
[ "restart_supplicant" ], |
[ "config", { "ssid_suffix":"t2" } ], |
- [ "!connect", { "security":"802_1x", "eap-tls":"cert1", |
- "server-auth":"cert2" }, |
+ [ "!connect", { "security":"802_1x", |
+ "files" : {"/tmp/pkg-client.pem" : client_cert_1 + |
+ "\n" + client_private_key_1, |
+ "/tmp/ca-cert.pem" : ca_cert_2}, |
+ "psk" : "EAP-TLS:chromeos:/tmp/pkg-client.pem:/tmp/ca-cert.pem"}, |
"TLS: Certificate verification failed"], |
# Try authenticating using the wrong client certiificate |
[ "restart_supplicant" ], |
[ "config", { "ssid_suffix":"t3" } ], |
- [ "!connect", { "security":"802_1x", "eap-tls":"cert2", |
- "server-auth":"cert1" }, |
+ [ "!connect", { "security":"802_1x", |
+ "files" : {"/tmp/pkg-client.pem" : client_cert_2 + |
+ "\n" + client_private_key_2, |
+ "/tmp/ca-cert.pem" : ca_cert_1}, |
+ "psk" : "EAP-TLS:chromeos:/tmp/pkg-client.pem:/tmp/ca-cert.pem"}, |
"SSL: SSL3 alert: read " |
"\(remote end reported an error\):fatal:unknown CA" ], |
[ "disconnect" ], |