Stop TKIP countermeasures on FLUSH command

This is needed to get wpa_supplicant into clean state during testing if
a test case triggers countermeasures.

Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
Jouni Malinen 2013-05-24 16:02:58 +03:00 committed by Jouni Malinen
parent 3cb953e4b6
commit e78aaca0da

View file

@ -5064,6 +5064,9 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
wpa_tdls_enable(wpa_s->wpa, 1); wpa_tdls_enable(wpa_s->wpa, 1);
#endif /* CONFIG_TDLS */ #endif /* CONFIG_TDLS */
eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
wpa_supplicant_stop_countermeasures(wpa_s, NULL);
wpa_s->no_keep_alive = 0; wpa_s->no_keep_alive = 0;
os_free(wpa_s->disallow_aps_bssid); os_free(wpa_s->disallow_aps_bssid);