From: Johannes Berg Date: Mon, 25 Sep 2023 07:20:54 +0000 (+0200) Subject: tests: ap_pmf: Wait for STA appropriately X-Git-Tag: hostap_2_11~927 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=95325f0969010598defd447e3e6b09e4ed1e3961;p=thirdparty%2Fhostap.git tests: ap_pmf: Wait for STA appropriately With PMF, we cannot do even deauth unless we wait for the STA to have fully connected on the AP side, the STA thinking it has isn't sufficient since it immediately says so after M4. Add wait_sta() before disconnect, and also before SA_QUERY. Signed-off-by: Johannes Berg --- diff --git a/tests/hwsim/test_ap_pmf.py b/tests/hwsim/test_ap_pmf.py index 78d225477..5e1c3ea9c 100644 --- a/tests/hwsim/test_ap_pmf.py +++ b/tests/hwsim/test_ap_pmf.py @@ -87,7 +87,7 @@ def test_ocv_sa_query(dev, apdev): dev[0].connect(ssid, psk="12345678", ieee80211w="1", ocv="1", key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") - + hapd.wait_sta() # wait so we can actually request SA_QUERY # Test that client can handle SA Query with OCI element if "OK" not in hapd.request("SA_QUERY " + dev[0].own_addr()): raise Exception("SA_QUERY failed") @@ -144,7 +144,7 @@ def test_ocv_sa_query_csa_missing(dev, apdev): dev[0].connect(ssid, psk="12345678", ieee80211w="1", ocv="1", key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") - + hapd.wait_sta() # wait so kernel won't drop deauth frame (MFP) hapd.set("ext_mgmt_frame_handling", "1") dev[0].request("DISCONNECT") dev[0].wait_disconnected()