tests: Wait hostapd processing to complete in ap_wpa2_eap_in_bridge
This avoids race conditions with REAUTHENTICATE commands and hostapd completing previous 4-way handshake. Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
This commit is contained in:
parent
40410c04f4
commit
b283de094b
1 changed files with 4 additions and 0 deletions
|
@ -5960,15 +5960,19 @@ def _test_ap_wpa2_eap_in_bridge(dev, apdev):
|
|||
password_hex="0123456789abcdef0123456789abcdef")
|
||||
wpas.dump_monitor()
|
||||
eap_reauth(wpas, "PAX")
|
||||
hapd.wait_4way_hs()
|
||||
wpas.dump_monitor()
|
||||
# Try again as a regression test for packet socket workaround
|
||||
eap_reauth(wpas, "PAX")
|
||||
hapd.wait_4way_hs()
|
||||
wpas.dump_monitor()
|
||||
wpas.request("DISCONNECT")
|
||||
wpas.wait_disconnected()
|
||||
hapd.wait_sta_disconnect()
|
||||
wpas.dump_monitor()
|
||||
wpas.request("RECONNECT")
|
||||
wpas.wait_connected()
|
||||
hapd.wait_sta()
|
||||
wpas.dump_monitor()
|
||||
|
||||
def test_ap_wpa2_eap_session_ticket(dev, apdev):
|
||||
|
|
Loading…
Reference in a new issue