mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 00:38:24 -05:00
tests: Flush scan results before checking alloc failure
When run after other tests, It was likely that the target bss was already present in scan_fail, so the scan_for_bss() wouldn't trip the allocation failure in wpa_bss_add(). Flush the scan results before the scan to ensure wpa_bss_add() is called and consistently pass scan_fail. Signed-off-by: Thomas Pedersen <thomas@adapt-ip.com>
This commit is contained in:
parent
0218bf05d6
commit
692bbd25b4
@ -1166,6 +1166,7 @@ def test_scan_fail(dev, apdev):
|
||||
|
||||
hapd = hostapd.add_ap(apdev[0], {"ssid": "open"})
|
||||
with alloc_fail(dev[0], 1, "wpa_bss_add"):
|
||||
dev[0].flush_scan_cache()
|
||||
dev[0].scan_for_bss(apdev[0]['bssid'], freq="2412")
|
||||
|
||||
def test_scan_fail_type_only(dev, apdev):
|
||||
|
Loading…
Reference in New Issue
Block a user