On Fri, May 01, 2020 at 02:02:11PM -0700, Thomas Pedersen wrote: > When run after other tests, It was likely that the target > bss was already present in scan_fail, so the > scan_for_bss() wouldn't trip the allocation failure in > wpa_bss_add(). Flush the scan results before the scan to > ensure wpa_bss_add() is called and consistently pass > scan_fail. Thanks, applied. -- Jouni Malinen PGP id EFC895FA _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap