Browse Source

Stop TKIP countermeasures on FLUSH command

This is needed to get wpa_supplicant into clean state during testing if
a test case triggers countermeasures.

Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
Jouni Malinen 12 years ago
parent
commit
e78aaca0da
1 changed files with 3 additions and 0 deletions
  1. 3 0
      wpa_supplicant/ctrl_iface.c

+ 3 - 0
wpa_supplicant/ctrl_iface.c

@@ -5064,6 +5064,9 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
 	wpa_tdls_enable(wpa_s->wpa, 1);
 #endif /* CONFIG_TDLS */
 
+	eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
+	wpa_supplicant_stop_countermeasures(wpa_s, NULL);
+
 	wpa_s->no_keep_alive = 0;
 
 	os_free(wpa_s->disallow_aps_bssid);