tests: Extend wpas_ctrl_bssid_filter for remote testing
When this test case is ran in remote test environment, there could be additional APs in scan results after bssid_filter has been disabled. That breaks the check on SCAN_RESULTS output. Extend this to cover the remote testing case by using bssid_filter with both known APs listed instead of full wildcard. Signed-off-by: Janusz Dziedzic <janusz.dziedzic@gmail.com>
This commit is contained in:
parent
e206c93f31
commit
bdff1be152
1 changed files with 3 additions and 1 deletions
|
@ -802,6 +802,7 @@ def test_wpas_ctrl_level(dev):
|
||||||
finally:
|
finally:
|
||||||
dev[2].mon.request("LEVEL 3")
|
dev[2].mon.request("LEVEL 3")
|
||||||
|
|
||||||
|
@remote_compatible
|
||||||
def test_wpas_ctrl_bssid_filter(dev, apdev):
|
def test_wpas_ctrl_bssid_filter(dev, apdev):
|
||||||
"""wpa_supplicant bssid_filter"""
|
"""wpa_supplicant bssid_filter"""
|
||||||
try:
|
try:
|
||||||
|
@ -818,7 +819,8 @@ def test_wpas_ctrl_bssid_filter(dev, apdev):
|
||||||
bss = dev[2].get_bss(apdev[1]['bssid'])
|
bss = dev[2].get_bss(apdev[1]['bssid'])
|
||||||
if bss and len(bss) != 0:
|
if bss and len(bss) != 0:
|
||||||
raise Exception("Unexpected BSS data")
|
raise Exception("Unexpected BSS data")
|
||||||
dev[2].request("SET bssid_filter ")
|
dev[2].request("SET bssid_filter " + apdev[0]['bssid'] + " " + \
|
||||||
|
apdev[1]['bssid'])
|
||||||
dev[2].scan(freq="2412")
|
dev[2].scan(freq="2412")
|
||||||
bss = dev[2].get_bss(apdev[0]['bssid'])
|
bss = dev[2].get_bss(apdev[0]['bssid'])
|
||||||
if bss is None or len(bss) == 0:
|
if bss is None or len(bss) == 0:
|
||||||
|
|
Loading…
Reference in a new issue