]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Make ap_reconnect_auth_timeout test more robust
authorAndrei Otcheretianski <andrei.otcheretianski@intel.com>
Wed, 22 Aug 2018 17:31:45 +0000 (20:31 +0300)
committerJouni Malinen <j@w1.fi>
Tue, 16 Oct 2018 09:49:11 +0000 (12:49 +0300)
This test starts two identical APs and assumes a connection to the first
one, though it is not necessary true. Fix that by starting the second AP
only after the connection is established.

Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
tests/hwsim/test_ap_roam.py

index 6f8b8d9ce267779a40a2159e59781b7e5ad19573..63a0b2c202801648cdc5fa795e070245a7d8ad10 100644 (file)
@@ -74,13 +74,14 @@ def test_ap_reconnect_auth_timeout(dev, apdev, params):
     params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
     hapd0 = hostapd.add_ap(apdev[0], params)
     bssid0 = hapd0.own_addr()
-    hapd1 = hostapd.add_ap(apdev[1], params)
-    bssid1 = hapd1.own_addr()
 
     wpas.scan_for_bss(bssid0, freq=2412)
     id = wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
     hwsim_utils.test_connectivity(wpas, hapd0)
 
+    hapd1 = hostapd.add_ap(apdev[1], params)
+    bssid1 = hapd1.own_addr()
+
     wpas.request("BLACKLIST " + bssid0)
 
     wpas.scan_for_bss(bssid1, freq=2412)