]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Use os_reltime_initialized() for Michael MIC failure event
authorJouni Malinen <quic_jouni@quicinc.com>
Fri, 3 Nov 2023 20:02:18 +0000 (22:02 +0200)
committerJouni Malinen <j@w1.fi>
Fri, 3 Nov 2023 20:02:18 +0000 (22:02 +0200)
The first event could have theoretically been received with reltime
sec=0, so use the helper function to check whether the reltime value is
actually set so that the usec part is checked as well. This is not going
to have a difference in practice, but it was possible to hit this corner
case with mac80211_hwsim testing (ap_cipher_tkip_countermeasures_sta)
using UML and time travel.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
wpa_supplicant/events.c

index fbafe4bc387c80ca5337123a3dec9eea778dbdc9..1f186eb677db814660f1f2d72d7c894f85d40e27 100644 (file)
@@ -4293,7 +4293,7 @@ wpa_supplicant_event_michael_mic_failure(struct wpa_supplicant *wpa_s,
        wpa_msg(wpa_s, MSG_WARNING, "Michael MIC failure detected");
        pairwise = (data && data->michael_mic_failure.unicast);
        os_get_reltime(&t);
-       if ((wpa_s->last_michael_mic_error.sec &&
+       if ((os_reltime_initialized(&wpa_s->last_michael_mic_error) &&
             !os_reltime_expired(&t, &wpa_s->last_michael_mic_error, 60)) ||
            wpa_s->pending_mic_error_report) {
                if (wpa_s->pending_mic_error_report) {