From: Jouni Malinen Date: Sat, 24 Aug 2019 16:20:40 +0000 (+0300) Subject: tests: Fix ap_ft_reassoc_replay for case where wlantest has the PSK X-Git-Tag: hostap_2_10~2407 X-Git-Url: http://git.ipfire.org/?p=thirdparty%2Fhostap.git;a=commitdiff_plain;h=12de14907133a9cc710a8bfd9329a6aa321a604c;ds=sidebyside tests: Fix ap_ft_reassoc_replay for case where wlantest has the PSK This test case was failing if wlantest was able to decrypt the CCMP protected frames. Fix the tshark filter string to include only the actually encrypted frames for PN comparison. Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_ft.py b/tests/hwsim/test_ap_ft.py index 49741f4e3..155615829 100644 --- a/tests/hwsim/test_ap_ft.py +++ b/tests/hwsim/test_ap_ft.py @@ -2738,7 +2738,8 @@ def test_ap_ft_reassoc_replay(dev, apdev, params): sta = dev[0].own_addr() filt = "wlan.fc.type == 2 && " + \ "wlan.da == " + sta + " && " + \ - "wlan.sa == " + ap + "wlan.sa == " + ap + " && " + \ + "wlan.fc.protected == 1" fields = ["wlan.ccmp.extiv"] res = run_tshark(capfile, filt, fields) vals = res.splitlines()