]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Stop TKIP countermeasures on FLUSH command
authorJouni Malinen <jouni@qca.qualcomm.com>
Fri, 24 May 2013 13:02:58 +0000 (16:02 +0300)
committerJouni Malinen <j@w1.fi>
Fri, 24 May 2013 13:02:58 +0000 (16:02 +0300)
This is needed to get wpa_supplicant into clean state during testing if
a test case triggers countermeasures.

Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>

wpa_supplicant/ctrl_iface.c

index ae0bcbcc1ccad14f606f94d85639432da5d12551..49157bf98ace8fe6fc5039793e5ddce5e73d918a 100644 (file)
@@ -5064,6 +5064,9 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
        wpa_tdls_enable(wpa_s->wpa, 1);
 #endif /* CONFIG_TDLS */
 
+       eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
+       wpa_supplicant_stop_countermeasures(wpa_s, NULL);
+
        wpa_s->no_keep_alive = 0;
 
        os_free(wpa_s->disallow_aps_bssid);