mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
1733e356e4
This was supposed to wait for up to 3.0 seconds for the handover select, but the incorrect loop terminated ended up limiting this to a single iteration of 0.1 second wait. This was too fast for some cases like the AP mode operation where it may take significant time to enable the radio for listening to DPP authentication messages. Fix the loop to allow that full three second wait for the response to be used. In addition, report the amount of time it takes to receive the response. Signed-off-by: Jouni Malinen <jouni@codeaurora.org> |
||
---|---|---|
.. | ||
p2p | ||
60_wpa_supplicant | ||
dbus-listen-preq.py | ||
dpp-nfc.py | ||
dpp-qrcode.py | ||
ieee8021x.conf | ||
openCryptoki.conf | ||
p2p-action-udhcp.sh | ||
p2p-action.sh | ||
p2p-nfc.py | ||
plaintext.conf | ||
udhcpd-p2p.conf | ||
wep.conf | ||
wpa2-eap-ccmp.conf | ||
wpa-psk-tkip.conf | ||
wpas-dbus-new-getall.py | ||
wpas-dbus-new-signals.py | ||
wpas-dbus-new-wps.py | ||
wpas-dbus-new.py | ||
wps-ap-cli | ||
wps-nfc.py |