]> git.ipfire.org Git - thirdparty/hostap.git/commit
tests: Work around tshark bug in wpas_mesh_max_peering
authorJouni Malinen <jouni@codeaurora.org>
Wed, 17 Oct 2018 09:33:11 +0000 (12:33 +0300)
committerJouni Malinen <j@w1.fi>
Wed, 17 Oct 2018 09:33:11 +0000 (12:33 +0300)
commit2cbaf0de223baaeed47ec9beb59337415c007d4d
treea318fc2733e939d715eee27adeed3e197f1f62ae
parente384b156dc17d43fd627c934e2112e3f3e85d641
tests: Work around tshark bug in wpas_mesh_max_peering

It looks like tshark parser was broken at some point for
wlan.mesh.config.cap which is now (tshark 2.6.3) pointing to incorrect
field (same as wlan.mesh.config.ps_protocol). This used to work with
tshark 2.2.6.

For now, assume the capability field ends up being the last octet of the
frame.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
tests/hwsim/test_wpas_mesh.py
tests/hwsim/tshark.py