From: Jouni Malinen Date: Sat, 24 Aug 2019 16:20:40 +0000 (+0300) Subject: tests: Fix ap_ft_reassoc_replay for case where wlantest has the PSK X-Git-Tag: hostap_2_10~2407 X-Git-Url: http://git.ipfire.org/?p=thirdparty%2Fhostap.git;a=commitdiff_plain;h=12de14907133a9cc710a8bfd9329a6aa321a604c tests: Fix ap_ft_reassoc_replay for case where wlantest has the PSK This test case was failing if wlantest was able to decrypt the CCMP protected frames. Fix the tshark filter string to include only the actually encrypted frames for PN comparison. Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_ft.py b/tests/hwsim/test_ap_ft.py index 49741f4e3..155615829 100644 --- a/tests/hwsim/test_ap_ft.py +++ b/tests/hwsim/test_ap_ft.py @@ -2738,7 +2738,8 @@ def test_ap_ft_reassoc_replay(dev, apdev, params): sta = dev[0].own_addr() filt = "wlan.fc.type == 2 && " + \ "wlan.da == " + sta + " && " + \ - "wlan.sa == " + ap + "wlan.sa == " + ap + " && " + \ + "wlan.fc.protected == 1" fields = ["wlan.ccmp.extiv"] res = run_tshark(capfile, filt, fields) vals = res.splitlines()