]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
tests: Modify tests in test_ap_pmf to use own_addr()
authorBen <ben.rosenfeld@intel.com>
Wed, 4 Feb 2015 09:30:32 +0000 (04:30 -0500)
committerJouni Malinen <j@w1.fi>
Thu, 5 Feb 2015 11:48:40 +0000 (13:48 +0200)
Some of the tests used p2p_dev_addr() that can be different from
own_addr() if a dedicated P2P Device interface is used.

Signed-off-by: Ben Rosenfeld <ben.rosenfeld@intel.com>
tests/hwsim/test_ap_pmf.py

index 6a83e3d95c8b670d2d1e124af40f30f7ed92ce9a..00ca2298a6aa3d9eb659e02fce0465d74d0cbfb7 100644 (file)
@@ -168,7 +168,7 @@ def test_ap_pmf_assoc_comeback2(dev, apdev):
 def test_ap_pmf_sta_sa_query(dev, apdev):
     """WPA2-PSK AP with station using SA Query"""
     ssid = "assoc-comeback"
-    addr = dev[0].p2p_dev_addr()
+    addr = dev[0].own_addr()
     wt = Wlantest()
     wt.flush()
     wt.add_passphrase("12345678")
@@ -186,7 +186,7 @@ def test_ap_pmf_sta_sa_query(dev, apdev):
     wpas.set_network(id, "group", "CCMP")
     wpas.set_network(id, "frequency", "2412")
     wpas.connect_network(id)
-    bssid = wpas.p2p_dev_addr()
+    bssid = wpas.own_addr()
 
     dev[0].connect(ssid, psk="12345678", ieee80211w="1",
                    key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
@@ -225,7 +225,7 @@ def test_ap_pmf_sta_sa_query_no_response(dev, apdev):
     wpas.set_network(id, "group", "CCMP")
     wpas.set_network(id, "frequency", "2412")
     wpas.connect_network(id)
-    bssid = wpas.p2p_dev_addr()
+    bssid = wpas.own_addr()
 
     dev[0].connect(ssid, psk="12345678", ieee80211w="1",
                    key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2",
@@ -246,7 +246,7 @@ def test_ap_pmf_sta_sa_query_no_response(dev, apdev):
 def test_ap_pmf_sta_unprot_deauth_burst(dev, apdev):
     """WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames"""
     ssid = "deauth-attack"
-    addr = dev[0].p2p_dev_addr()
+    addr = dev[0].own_addr()
     wt = Wlantest()
     wt.flush()
     wt.add_passphrase("12345678")