Index: server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
diff --git a/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES b/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
index 3bb13ae69a61b76b222470e63c63bf71aeb1f5ae..5b28585c612588143c689ec316e997893134d7df 100644 |
--- a/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
+++ b/server/site_tests/network_WiFiSecMat/019CheckWPA_1x_AES |
@@ -14,30 +14,30 @@ |
[ "config", { "channel":"2412", "mode":"11g", |
"wpa":"1", "wpa_key_mgmt":"WPA-EAP", |
"wpa_pairwise":"CCMP", "ieee8021x":"1", |
- "eap-tls":"cert1" } ], |
- [ "connect", { "security":"802_1x", "eap-tls":"cert1" } ], |
+ "eap":"tls1" } ], |
+ [ "connect", { "security":"802_1x", "eap":"tls1" } ], |
[ "client_ping", { "count":"10" } ], |
[ "disconnect" ], |
[ "restart_supplicant" ], |
[ "config", { "ssid_suffix":"t1" } ], |
- [ "connect", { "security":"802_1x", "eap-tls":"cert1", |
- "server-auth":"cert1" } ], |
+ [ "connect", { "security":"802_1x", "eap":"tls1", |
+ "server-auth":"tls1" } ], |
[ "client_ping", { "count":"10" } ], |
[ "disconnect" ], |
# Ensure authentication fails if server's cert doesn't match our CA cert |
[ "restart_supplicant" ], |
[ "config", { "ssid_suffix":"t2" } ], |
- [ "!connect", { "security":"802_1x", "eap-tls":"cert1", |
- "server-auth":"cert2" }, |
+ [ "!connect", { "security":"802_1x", "eap":"tls1", |
+ "server-auth":"tls2" }, |
"TLS: Certificate verification failed"], |
# Try authenticating using the wrong client certiificate |
[ "restart_supplicant" ], |
[ "config", { "ssid_suffix":"t3" } ], |
- [ "!connect", { "security":"802_1x", "eap-tls":"cert2", |
- "server-auth":"cert1" }, |
+ [ "!connect", { "security":"802_1x", "eap":"tls2", |
+ "server-auth":"tls1" }, |
"SSL: SSL3 alert: read " |
"\(remote end reported an error\):fatal:unknown CA" ], |
[ "disconnect" ], |