Clear next_scan_freqs on wpa_supplicant FLUSH command
It was possible for old scan state to remain from a previous test case when an operation like WNM neighbor scan or another-BSS-in-ESS was started, but stopped at the end of a test case. This could result in failures, e.g., when running wnm_bss_tm_req followed by scan_setband. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
f4637fe0fd
commit
b8db1dfc5c
1 changed files with 2 additions and 0 deletions
|
@ -6057,6 +6057,8 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
|
||||||
#endif /* CONFIG_TESTING_OPTIONS */
|
#endif /* CONFIG_TESTING_OPTIONS */
|
||||||
|
|
||||||
wpa_s->disconnected = 0;
|
wpa_s->disconnected = 0;
|
||||||
|
os_free(wpa_s->next_scan_freqs);
|
||||||
|
wpa_s->next_scan_freqs = NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue