]> git.ipfire.org Git - thirdparty/hostap.git/commit
Handle assoc reject events without wpa_supplicant SME
authorJouni Malinen <j@w1.fi>
Sat, 3 Nov 2012 11:50:17 +0000 (13:50 +0200)
committerJouni Malinen <j@w1.fi>
Sat, 3 Nov 2012 11:50:17 +0000 (13:50 +0200)
commit10737aba2235cbb03968997d991087e579ee828d
treed470e27707f3bd9c61dc349a0c449f2722f1cc29
parent5ff2c7faedd13dfd27659181b5b156171e875847
Handle assoc reject events without wpa_supplicant SME

If the driver indicates the association (or authentication) was
rejected, wpa_supplicant should handle this connection failure similarly
to other cases. Previously, this was only handled with drivers that use
wpa_supplicant SME.

In case of cfg80211-based drivers, a rejected association was actually
already handled since cfg80211 generates a deauthentication event after
indicating connection failure. However, rejected authentication resulted
in wpa_supplicant waiting for authentication timeout to expire which is
unnecessary long wait.

Fix this by calling wpas_connection_failed() to use the common mechanism
to reschedule a new connection attempt with the previously attempted
BSSID blacklisted.

Signed-hostap: Jouni Malinen <j@w1.fi>
wpa_supplicant/events.c