mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-01-31 01:04:03 -05:00
970a23f665
It was possible for BSS entries on the scanned channel (2412 MHz) to be left behind after flush_scan_cache() call. Use a less likely channel 2417 MHz as the default channel to scan. This will hopefully get rid of most problematic BSS entries from previous test cases. For example, ap_hs20_oen followed by ap_hs20_random_mac could fail due to INTERWORKING_CONNECT seeing non-RSN scan result from the previous test case. Signed-off-by: Jouni Malinen <j@w1.fi> |
||
---|---|---|
.. | ||
hwsim | ||
.gitignore | ||
Makefile | ||
test_x509v3_nist2.sh | ||
test_x509v3_nist.sh | ||
test-aes.c | ||
test-asn1.c | ||
test-base64.c | ||
test-https.c | ||
test-list.c | ||
test-md4.c | ||
test-md5.c | ||
test-milenage.c | ||
test-ms_funcs.c | ||
test-rc4.c | ||
test-rsa-sig-ver.c | ||
test-sha1.c | ||
test-sha256.c | ||
test-x509.c | ||
test-x509v3.c |