From 0d1d1f0d21952dbac4e23b0f5cedf5183564b85a Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Wed, 1 Jan 2020 12:03:42 +0200 Subject: [PATCH] Clear last Michael MIC error timer on FLUSH TKIP countermeasures were already terminated on FLUSH, but the timer for detecting two Michael MIC errors within 60 seconds was left behind. This resulted in test case failures with following test sequence: ap_cipher_tkip_countermeasures_sta ap_cipher_tkip_countermeasures_sta2 Signed-off-by: Jouni Malinen --- wpa_supplicant/ctrl_iface.c | 1 + 1 file changed, 1 insertion(+) diff --git a/wpa_supplicant/ctrl_iface.c b/wpa_supplicant/ctrl_iface.c index be5ea17bd..00580b9c0 100644 --- a/wpa_supplicant/ctrl_iface.c +++ b/wpa_supplicant/ctrl_iface.c @@ -8038,6 +8038,7 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s) eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL); wpa_supplicant_stop_countermeasures(wpa_s, NULL); + wpa_s->last_michael_mic_error.sec = 0; wpa_s->no_keep_alive = 0; wpa_s->own_disconnect_req = 0;