tests: Make pmksa_cache_preauth_auto more robust

It is fine for the station to associate with either AP in this test
case, so do not force AP side connection check with apdev[0].

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2019-05-28 17:14:33 +03:00
parent a9b4e558af
commit 73dbcd7951
2 changed files with 5 additions and 4 deletions

View file

@ -149,9 +149,10 @@ def eap_connect(dev, hapd, method, identity,
expect_cert_error=expect_cert_error) expect_cert_error=expect_cert_error)
if expect_failure: if expect_failure:
return id return id
ev = hapd.wait_event(["AP-STA-CONNECTED"], timeout=5) if hapd:
if ev is None: ev = hapd.wait_event(["AP-STA-CONNECTED"], timeout=5)
raise Exception("No connection event received from hostapd") if ev is None:
raise Exception("No connection event received from hostapd")
return id return id
def eap_check_auth(dev, method, initial, rsn=True, sha256=False, def eap_check_auth(dev, method, initial, rsn=True, sha256=False,

View file

@ -455,7 +455,7 @@ def run_pmksa_cache_preauth_auto(dev, apdev):
hapd.cmd_execute(['ip', 'link', 'set', 'dev', 'ap-br0', 'up']) hapd.cmd_execute(['ip', 'link', 'set', 'dev', 'ap-br0', 'up'])
hapd2 = hostapd.add_ap(apdev[1], params) hapd2 = hostapd.add_ap(apdev[1], params)
eap_connect(dev[0], hapd, "PAX", "pax.user@example.com", eap_connect(dev[0], None, "PAX", "pax.user@example.com",
password_hex="0123456789abcdef0123456789abcdef") password_hex="0123456789abcdef0123456789abcdef")
found = False found = False