]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Clear last Michael MIC error timer on FLUSH
authorJouni Malinen <j@w1.fi>
Wed, 1 Jan 2020 10:03:42 +0000 (12:03 +0200)
committerJouni Malinen <j@w1.fi>
Wed, 1 Jan 2020 10:23:25 +0000 (12:23 +0200)
TKIP countermeasures were already terminated on FLUSH, but the timer for
detecting two Michael MIC errors within 60 seconds was left behind. This
resulted in test case failures with following test sequence:
ap_cipher_tkip_countermeasures_sta ap_cipher_tkip_countermeasures_sta2

Signed-off-by: Jouni Malinen <j@w1.fi>
wpa_supplicant/ctrl_iface.c

index be5ea17bd30a54fcf0ffa8f395a6ca9943b64932..00580b9c060e5690516d538fd13e051b4b6e1730 100644 (file)
@@ -8038,6 +8038,7 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
 
        eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
        wpa_supplicant_stop_countermeasures(wpa_s, NULL);
+       wpa_s->last_michael_mic_error.sec = 0;
 
        wpa_s->no_keep_alive = 0;
        wpa_s->own_disconnect_req = 0;