tests: Make ap_cipher_mixed_wpa_wpa2 more robust
Explicitly clear cfg80211 scan cache to avoid issues with old BSS entries from previous test cases. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
a383db0646
commit
ece9aa627a
1 changed files with 1 additions and 0 deletions
|
@ -374,6 +374,7 @@ def test_ap_cipher_mixed_wpa_wpa2(dev, apdev):
|
||||||
"rsn_pairwise": "CCMP",
|
"rsn_pairwise": "CCMP",
|
||||||
"wpa_pairwise": "TKIP"}
|
"wpa_pairwise": "TKIP"}
|
||||||
hapd = hostapd.add_ap(apdev[0], params)
|
hapd = hostapd.add_ap(apdev[0], params)
|
||||||
|
dev[0].flush_scan_cache()
|
||||||
dev[0].connect(ssid, psk=passphrase, proto="WPA2",
|
dev[0].connect(ssid, psk=passphrase, proto="WPA2",
|
||||||
pairwise="CCMP", group="TKIP", scan_freq="2412")
|
pairwise="CCMP", group="TKIP", scan_freq="2412")
|
||||||
status = dev[0].get_status()
|
status = dev[0].get_status()
|
||||||
|
|
Loading…
Reference in a new issue