b3c43c3c24
If a sniffer capture does not include FCS for each frame, but may included frames with invalid FCS, it would be possible for wlantest to try to decrypt the first received frame and fail (e.g., due to CCMP MIC mismatch) because that particular frame was corrupted and then ignore the following retry of that frame as a duplicate even if that retry has different payload (e.g., if its reception did not show corruption). Work around this by skipping duplicate frame detection immediately following a decryption failure. Signed-off-by: Jouni Malinen <jouni@codeaurora.org> |
||
---|---|---|
.. | ||
bip.c | ||
bss.c | ||
ccmp.c | ||
ctrl.c | ||
gcmp.c | ||
inject.c | ||
Makefile | ||
monitor.c | ||
process.c | ||
readpcap.c | ||
rx_data.c | ||
rx_eapol.c | ||
rx_ip.c | ||
rx_mgmt.c | ||
rx_tdls.c | ||
sta.c | ||
test_vectors.c | ||
tkip.c | ||
wep.c | ||
wired.c | ||
wlantest.c | ||
wlantest.h | ||
wlantest_cli.c | ||
wlantest_ctrl.h | ||
writepcap.c |