From: Jouni Malinen Date: Wed, 1 Jan 2020 10:03:42 +0000 (+0200) Subject: Clear last Michael MIC error timer on FLUSH X-Git-Tag: hostap_2_10~2031 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0d1d1f0d21952dbac4e23b0f5cedf5183564b85a;p=thirdparty%2Fhostap.git Clear last Michael MIC error timer on FLUSH TKIP countermeasures were already terminated on FLUSH, but the timer for detecting two Michael MIC errors within 60 seconds was left behind. This resulted in test case failures with following test sequence: ap_cipher_tkip_countermeasures_sta ap_cipher_tkip_countermeasures_sta2 Signed-off-by: Jouni Malinen --- diff --git a/wpa_supplicant/ctrl_iface.c b/wpa_supplicant/ctrl_iface.c index be5ea17bd..00580b9c0 100644 --- a/wpa_supplicant/ctrl_iface.c +++ b/wpa_supplicant/ctrl_iface.c @@ -8038,6 +8038,7 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s) eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL); wpa_supplicant_stop_countermeasures(wpa_s, NULL); + wpa_s->last_michael_mic_error.sec = 0; wpa_s->no_keep_alive = 0; wpa_s->own_disconnect_req = 0;