hostap/wlantest
Jouni Malinen b3c43c3c24 wlantest: Allow duplicate frame processing after decryption failure
If a sniffer capture does not include FCS for each frame, but may
included frames with invalid FCS, it would be possible for wlantest to
try to decrypt the first received frame and fail (e.g., due to CCMP MIC
mismatch) because that particular frame was corrupted and then ignore
the following retry of that frame as a duplicate even if that retry has
different payload (e.g., if its reception did not show corruption).

Work around this by skipping duplicate frame detection immediately
following a decryption failure.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
2019-06-12 22:27:34 +03:00
..
bip.c
bss.c
ccmp.c
ctrl.c
gcmp.c
inject.c
Makefile tests: Remove CONFIG_PEERKEY 2019-02-25 19:48:49 +02:00
monitor.c
process.c wlantest: Allow duplicate frame processing after decryption failure 2019-06-12 22:27:34 +03:00
readpcap.c
rx_data.c wlantest: Allow duplicate frame processing after decryption failure 2019-06-12 22:27:34 +03:00
rx_eapol.c DPP2: Extend wpa_pmk_to_ptk() to support extra Z.x component in context 2019-03-18 01:31:31 +02:00
rx_ip.c
rx_mgmt.c wlantest: Allow duplicate frame processing after decryption failure 2019-06-12 22:27:34 +03:00
rx_tdls.c
sta.c
test_vectors.c
tkip.c
wep.c
wired.c
wlantest.c
wlantest.h wlantest: Allow duplicate frame processing after decryption failure 2019-06-12 22:27:34 +03:00
wlantest_cli.c
wlantest_ctrl.h
writepcap.c