mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
tests: Make ap_reconnect_auth_timeout test more robust
This test starts two identical APs and assumes a connection to the first one, though it is not necessary true. Fix that by starting the second AP only after the connection is established. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>
This commit is contained in:
parent
ad369d77ba
commit
16b5413f2b
@ -74,13 +74,14 @@ def test_ap_reconnect_auth_timeout(dev, apdev, params):
|
||||
params = hostapd.wpa2_params(ssid="test-wpa2-psk", passphrase="12345678")
|
||||
hapd0 = hostapd.add_ap(apdev[0], params)
|
||||
bssid0 = hapd0.own_addr()
|
||||
hapd1 = hostapd.add_ap(apdev[1], params)
|
||||
bssid1 = hapd1.own_addr()
|
||||
|
||||
wpas.scan_for_bss(bssid0, freq=2412)
|
||||
id = wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2412")
|
||||
hwsim_utils.test_connectivity(wpas, hapd0)
|
||||
|
||||
hapd1 = hostapd.add_ap(apdev[1], params)
|
||||
bssid1 = hapd1.own_addr()
|
||||
|
||||
wpas.request("BLACKLIST " + bssid0)
|
||||
|
||||
wpas.scan_for_bss(bssid1, freq=2412)
|
||||
|
Loading…
Reference in New Issue
Block a user