[PATCH 4/5] test_ap_ciphers: reset the correct key's PN

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Johannes Berg <johannes.berg@xxxxxxxxx>

While adding support for IGTK and BIGTK here, I tested this
without protections (i.e. with protections removed from both
supplicant and driver), and while I got some bad resets on
the debugfs values, it should have failed with "unexpected
connectivity".

Fix this to be correct - we need to reset the GTK PN, not
the PTK PN in this test.

Signed-off-by: Johannes Berg <johannes.berg@xxxxxxxxx>
---
 tests/hwsim/test_ap_ciphers.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tests/hwsim/test_ap_ciphers.py b/tests/hwsim/test_ap_ciphers.py
index 6726e90d054a..741e3a5cba73 100644
--- a/tests/hwsim/test_ap_ciphers.py
+++ b/tests/hwsim/test_ap_ciphers.py
@@ -853,7 +853,7 @@ def run_ap_wpa2_delayed_group_m1_retransmission(dev, apdev):
     time.sleep(0.1)
     after = get_rx_spec(phy, keytype=KT_GTK).splitlines()
 
-    if "OK" not in hapd.request("RESET_PN " + addr):
+    if "OK" not in hapd.request("RESET_PN ff:ff:ff:ff:ff:ff"):
         raise Exception("RESET_PN failed")
     time.sleep(0.1)
     hwsim_utils.test_connectivity(dev[0], hapd, timeout=1,
-- 
2.25.1


_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux