Remove CTS test on bad enterprise config
There is an overlay that allows the wifi module to accept bad enterprise
configs. Therefore remove a CTS test that enforces adding a bad
enterprise must fail.
Bug: 195442487
Test: None
Change-Id: I06b4717e58c0e956a288e59b34aab5b098cdd740
Merged-In: I06b4717e58c0e956a288e59b34aab5b098cdd740
(cherry picked from commit 7c5d2bc90886f36f7941698d2a4c766af1f07792)
diff --git a/tests/tests/wifi/src/android/net/wifi/cts/WifiManagerTest.java b/tests/tests/wifi/src/android/net/wifi/cts/WifiManagerTest.java
index e0e4f3b..96f18be 100644
--- a/tests/tests/wifi/src/android/net/wifi/cts/WifiManagerTest.java
+++ b/tests/tests/wifi/src/android/net/wifi/cts/WifiManagerTest.java
@@ -1213,36 +1213,6 @@
}
/**
- * Verify {@link WifiManager#addNetworkPrivileged(WifiConfiguration)} returns the proper
- * failure status code when adding an enterprise config with mandatory fields not filled in.
- */
- public void testAddNetworkPrivilegedFailureBadEnterpriseConfig() {
- if (!WifiFeature.isWifiSupported(getContext())) {
- // skip the test if WiFi is not supported
- return;
- }
- if (!WifiBuildCompat.isPlatformOrWifiModuleAtLeastS(mContext)) {
- // Skip the test if wifi module version is older than S.
- return;
- }
- UiAutomation uiAutomation = InstrumentationRegistry.getInstrumentation().getUiAutomation();
- try {
- uiAutomation.adoptShellPermissionIdentity();
- WifiConfiguration wifiConfiguration = new WifiConfiguration();
- wifiConfiguration.SSID = SSID1;
- wifiConfiguration.setSecurityParams(WifiConfiguration.SECURITY_TYPE_EAP_WPA3_ENTERPRISE);
- wifiConfiguration.enterpriseConfig.setEapMethod(WifiEnterpriseConfig.Eap.TTLS);
- WifiManager.AddNetworkResult result =
- mWifiManager.addNetworkPrivileged(wifiConfiguration);
- assertEquals(WifiManager.AddNetworkResult.STATUS_INVALID_CONFIGURATION_ENTERPRISE,
- result.statusCode);
- assertEquals(-1, result.networkId);
- } finally {
- uiAutomation.dropShellPermissionIdentity();
- }
- }
-
- /**
* Verify {@link WifiManager#addNetworkPrivileged(WifiConfiguration)} works properly when the
* calling app has permissions.
*/