From: Ayala Beker Date: Tue, 23 Oct 2018 11:23:52 +0000 (+0300) Subject: tests: Fix ap_acl_deny test X-Git-Tag: hostap_2_7~79 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=fcc65290d420dc19c8905c6344329181c41a55c3;p=thirdparty%2Fhostap.git tests: Fix ap_acl_deny test In ap_acl_deny test, the AP doesn't send probe responses during scan due to ACL reject. As the result, dev[0] might miss the AP's Beacon frame because the dwell time is too short. Make the test more robust and trigger passive scan, and by that increase the probability of hearing the AP. Signed-off-by: Ayala Beker --- diff --git a/tests/hwsim/test_ap_params.py b/tests/hwsim/test_ap_params.py index 07088f823..cd6846956 100644 --- a/tests/hwsim/test_ap_params.py +++ b/tests/hwsim/test_ap_params.py @@ -150,7 +150,7 @@ def test_ap_acl_deny(dev, apdev): params['ssid'] = ssid params['deny_mac_file'] = "hostapd.macaddr" hapd = hostapd.add_ap(apdev[0], params) - dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412") + dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412", passive=True) dev[0].connect(ssid, key_mgmt="NONE", scan_freq="2412", wait_connect=False) dev[1].scan_for_bss(apdev[0]['bssid'], freq="2412") dev[1].connect(ssid, key_mgmt="NONE", scan_freq="2412")