From: Jouni Malinen Date: Fri, 12 Jul 2024 10:15:57 +0000 (+0300) Subject: tests: Make SSID verification through beacon protection more robust X-Git-Tag: hostap_2_11~19 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=3137a4124716f06e16814d26685e5ffd8470195b;p=thirdparty%2Fhostap.git tests: Make SSID verification through beacon protection more robust Clear scan results at the beginning of the test case to avoid incorrect behavior if there are multiple entries for the same BSS. In addition, use a bit longer wait for receiving an updated Beacon frame in scan results. Signed-off-by: Jouni Malinen --- diff --git a/tests/hwsim/test_ap_pmf.py b/tests/hwsim/test_ap_pmf.py index f82ac1915..331ac393b 100644 --- a/tests/hwsim/test_ap_pmf.py +++ b/tests/hwsim/test_ap_pmf.py @@ -1423,6 +1423,8 @@ def run_ap_pmf_beacon_protection(dev, apdev, cipher): wt.flush() wt.add_passphrase("12345678") + dev[0].flush_scan_cache() + # STA with Beacon protection enabled dev[0].connect(ssid, psk="12345678", ieee80211w="2", beacon_prot="1", key_mgmt="WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") @@ -1445,7 +1447,7 @@ def run_ap_pmf_beacon_protection(dev, apdev, cipher): if valid_bip < 0 or invalid_bip > 0 or missing_bip > 0: raise Exception("Unexpected wlantest BIP counters: valid=%d invalid=%d missing=%d" % (valid_bip, invalid_bip, missing_bip)) - ev = dev[0].wait_event(["CTRL-EVENT-BEACON-LOSS"], timeout=5) + ev = dev[0].wait_event(["CTRL-EVENT-BEACON-LOSS"], timeout=10) if ev is not None: raise Exception("Beacon loss detected")