]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Clear BSS table at the end of rsn_ie_proto_eap_sta
authorJouni Malinen <jouni@qca.qualcomm.com>
Wed, 30 Dec 2015 22:53:20 +0000 (00:53 +0200)
committerJouni Malinen <j@w1.fi>
Wed, 30 Dec 2015 22:53:20 +0000 (00:53 +0200)
rsn_ie_proto_eap_sta followed by eap_ttls_mschapv2_session_resumption
showed a failure case where the special RSNE from rsn_ie_proto_eap_sta
ended up remaining in a wpa_supplicant BSS entry and the SELECT_NETWORK
command used the previous scan results without checking for changed AP
configuration. This resulted in test failure due to RSN IE being claimed
to be different in EAPOL-Key msg 3/4. This is not really a real world
issue, but try to avoid false failure reports by explicitly clearing the
BSS table at the end of rsn_ie_proto_eap_sta.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
tests/hwsim/test_ap_eap.py

index 20456e0328475d1d3c89f1d3749962c3bef51024..052f9488536a36e8f5714eb59b25b0f06b120f38 100644 (file)
@@ -4190,6 +4190,10 @@ def test_rsn_ie_proto_eap_sta(dev, apdev):
         dev[0].select_network(id, freq=2412)
         dev[0].wait_connected()
 
+    dev[0].request("DISCONNECT")
+    dev[0].wait_disconnected()
+    dev[0].flush_scan_cache()
+
 def check_tls_session_resumption_capa(dev, hapd):
     tls = hapd.request("GET tls_library")
     if not tls.startswith("OpenSSL"):