Clear last Michael MIC error timer on FLUSH
TKIP countermeasures were already terminated on FLUSH, but the timer for detecting two Michael MIC errors within 60 seconds was left behind. This resulted in test case failures with following test sequence: ap_cipher_tkip_countermeasures_sta ap_cipher_tkip_countermeasures_sta2 Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
19d4a5de11
commit
0d1d1f0d21
1 changed files with 1 additions and 0 deletions
|
@ -8038,6 +8038,7 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
|
||||||
|
|
||||||
eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
|
eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
|
||||||
wpa_supplicant_stop_countermeasures(wpa_s, NULL);
|
wpa_supplicant_stop_countermeasures(wpa_s, NULL);
|
||||||
|
wpa_s->last_michael_mic_error.sec = 0;
|
||||||
|
|
||||||
wpa_s->no_keep_alive = 0;
|
wpa_s->no_keep_alive = 0;
|
||||||
wpa_s->own_disconnect_req = 0;
|
wpa_s->own_disconnect_req = 0;
|
||||||
|
|
Loading…
Reference in a new issue