From 95325f0969010598defd447e3e6b09e4ed1e3961 Mon Sep 17 00:00:00 2001 From: Johannes Berg Date: Mon, 25 Sep 2023 09:20:54 +0200 Subject: [PATCH] tests: ap_pmf: Wait for STA appropriately With PMF, we cannot do even deauth unless we wait for the STA to have fully connected on the AP side, the STA thinking it has isn't sufficient since it immediately says so after M4. Add wait_sta() before disconnect, and also before SA_QUERY. Signed-off-by: Johannes Berg --- tests/hwsim/test_ap_pmf.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tests/hwsim/test_ap_pmf.py b/tests/hwsim/test_ap_pmf.py index 78d225477..5e1c3ea9c 100644 --- a/tests/hwsim/test_ap_pmf.py +++ b/tests/hwsim/test_ap_pmf.py @@ -87,7 +87,7 @@ def test_ocv_sa_query(dev, apdev): dev[0].connect(ssid, psk="12345678", ieee80211w="1", ocv="1", key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") - + hapd.wait_sta() # wait so we can actually request SA_QUERY # Test that client can handle SA Query with OCI element if "OK" not in hapd.request("SA_QUERY " + dev[0].own_addr()): raise Exception("SA_QUERY failed") @@ -144,7 +144,7 @@ def test_ocv_sa_query_csa_missing(dev, apdev): dev[0].connect(ssid, psk="12345678", ieee80211w="1", ocv="1", key_mgmt="WPA-PSK WPA-PSK-SHA256", proto="WPA2", scan_freq="2412") - + hapd.wait_sta() # wait so kernel won't drop deauth frame (MFP) hapd.set("ext_mgmt_frame_handling", "1") dev[0].request("DISCONNECT") dev[0].wait_disconnected()