From: Janusz Dziedzic Date: Sun, 12 Jan 2020 22:02:26 +0000 (+0100) Subject: tests: Extend wpas_ctrl_bssid_filter for remote testing X-Git-Tag: hostap_2_10~1761 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=bdff1be152f039f5833586191498f2f10bffeda0;p=thirdparty%2Fhostap.git tests: Extend wpas_ctrl_bssid_filter for remote testing When this test case is ran in remote test environment, there could be additional APs in scan results after bssid_filter has been disabled. That breaks the check on SCAN_RESULTS output. Extend this to cover the remote testing case by using bssid_filter with both known APs listed instead of full wildcard. Signed-off-by: Janusz Dziedzic --- diff --git a/tests/hwsim/test_wpas_ctrl.py b/tests/hwsim/test_wpas_ctrl.py index bac373f2f..91f440191 100644 --- a/tests/hwsim/test_wpas_ctrl.py +++ b/tests/hwsim/test_wpas_ctrl.py @@ -802,6 +802,7 @@ def test_wpas_ctrl_level(dev): finally: dev[2].mon.request("LEVEL 3") +@remote_compatible def test_wpas_ctrl_bssid_filter(dev, apdev): """wpa_supplicant bssid_filter""" try: @@ -818,7 +819,8 @@ def test_wpas_ctrl_bssid_filter(dev, apdev): bss = dev[2].get_bss(apdev[1]['bssid']) if bss and len(bss) != 0: raise Exception("Unexpected BSS data") - dev[2].request("SET bssid_filter ") + dev[2].request("SET bssid_filter " + apdev[0]['bssid'] + " " + \ + apdev[1]['bssid']) dev[2].scan(freq="2412") bss = dev[2].get_bss(apdev[0]['bssid']) if bss is None or len(bss) == 0: