Stop TKIP countermeasures on FLUSH command
This is needed to get wpa_supplicant into clean state during testing if a test case triggers countermeasures. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
3cb953e4b6
commit
e78aaca0da
1 changed files with 3 additions and 0 deletions
|
@ -5064,6 +5064,9 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
|
||||||
wpa_tdls_enable(wpa_s->wpa, 1);
|
wpa_tdls_enable(wpa_s->wpa, 1);
|
||||||
#endif /* CONFIG_TDLS */
|
#endif /* CONFIG_TDLS */
|
||||||
|
|
||||||
|
eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
|
||||||
|
wpa_supplicant_stop_countermeasures(wpa_s, NULL);
|
||||||
|
|
||||||
wpa_s->no_keep_alive = 0;
|
wpa_s->no_keep_alive = 0;
|
||||||
|
|
||||||
os_free(wpa_s->disallow_aps_bssid);
|
os_free(wpa_s->disallow_aps_bssid);
|
||||||
|
|
Loading…
Reference in a new issue