From 9353f07f3bb1dbcef48ecf78b307b658f9df4e6f Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Thu, 31 Dec 2015 00:53:20 +0200 Subject: [PATCH] tests: Clear BSS table at the end of rsn_ie_proto_eap_sta rsn_ie_proto_eap_sta followed by eap_ttls_mschapv2_session_resumption showed a failure case where the special RSNE from rsn_ie_proto_eap_sta ended up remaining in a wpa_supplicant BSS entry and the SELECT_NETWORK command used the previous scan results without checking for changed AP configuration. This resulted in test failure due to RSN IE being claimed to be different in EAPOL-Key msg 3/4. This is not really a real world issue, but try to avoid false failure reports by explicitly clearing the BSS table at the end of rsn_ie_proto_eap_sta. Signed-off-by: Jouni Malinen --- tests/hwsim/test_ap_eap.py | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tests/hwsim/test_ap_eap.py b/tests/hwsim/test_ap_eap.py index 20456e032..052f94885 100644 --- a/tests/hwsim/test_ap_eap.py +++ b/tests/hwsim/test_ap_eap.py @@ -4190,6 +4190,10 @@ def test_rsn_ie_proto_eap_sta(dev, apdev): dev[0].select_network(id, freq=2412) dev[0].wait_connected() + dev[0].request("DISCONNECT") + dev[0].wait_disconnected() + dev[0].flush_scan_cache() + def check_tls_session_resumption_capa(dev, hapd): tls = hapd.request("GET tls_library") if not tls.startswith("OpenSSL"):