]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Fix ap_ft_reassoc_replay for case where wlantest has the PSK
authorJouni Malinen <j@w1.fi>
Sat, 24 Aug 2019 16:20:40 +0000 (19:20 +0300)
committerJouni Malinen <j@w1.fi>
Sat, 24 Aug 2019 16:20:40 +0000 (19:20 +0300)
This test case was failing if wlantest was able to decrypt the CCMP
protected frames. Fix the tshark filter string to include only the
actually encrypted frames for PN comparison.

Signed-off-by: Jouni Malinen <j@w1.fi>
tests/hwsim/test_ap_ft.py

index 49741f4e3c4676c442f2bede1f1efa9eb1af8790..1556158292e1b47e4b5ba6f4afdd2c5eefe41fd8 100644 (file)
@@ -2738,7 +2738,8 @@ def test_ap_ft_reassoc_replay(dev, apdev, params):
     sta = dev[0].own_addr()
     filt = "wlan.fc.type == 2 && " + \
            "wlan.da == " + sta + " && " + \
-           "wlan.sa == " + ap
+           "wlan.sa == " + ap + " && " + \
+           "wlan.fc.protected == 1"
     fields = ["wlan.ccmp.extiv"]
     res = run_tshark(capfile, filt, fields)
     vals = res.splitlines()