The test pasn_sae_driver triggers PASN for the same peers twice. In the
current implementation, when PASN succeeds, the keys generated are
stored in the PTKSA cache.
The function wpas_pasn_configure_next_peer() shows an issue where it
does not reuse keys from a previous PASN exchange, even when those keys
are available in the cache. Instead, it initiates a new PASN exchange
unnecessarily.
Fix the test case by deleting the keys from the cache after the first
PASN attempt. This ensures a full PASN exchange can occur again. A
subsequent commit will address the API behavior to reuse keys from the
cache when available.
Signed-off-by: Peddolla Harshavardhan Reddy <peddolla@qti.qualcomm.com>
time.sleep(1)
dev[0].dump_monitor()
+ cmd2 = f"PASN_DRIVER del {bssid} {bssid2}"
+ if "OK" not in dev[0].request(cmd2):
+ raise Exception("PASN_DRIVER failed")
+
if "OK" not in dev[0].request(cmd):
raise Exception("PASN_DRIVER failed")