]> git.ipfire.org Git - thirdparty/hostap.git/commit
Reject authentication start during explicit roam requests
authorMatthew Wang <matthewmwang@chromium.org>
Sat, 6 Mar 2021 01:43:44 +0000 (17:43 -0800)
committerJouni Malinen <j@w1.fi>
Sat, 6 Mar 2021 08:59:05 +0000 (10:59 +0200)
commit5ac977758d3535e91160ff210f3e8a578031029d
treeb253f1fcd418697ef02a6a9e634daf0a0b750601
parent800fb6997088b6b73ea9e8c2fbb11d3da882c67b
Reject authentication start during explicit roam requests

The roam D-Bus and ROAM control itnerface commands flip the reassociate
bit before calling wpa_supplicant_connect(). wpa_supplicant connect
eventually aborts ongoing scans (if any), which causes scan results to
be reported. Since the reassociate bit is set, this will trigger a
connection attempt based on the aborted scan's scan results and cancel
the initial connetion request. This often causes wpa_supplicant to
reassociate to the same AP it is currently associated to instead of the
explicitly requested roaming target.

Add a roam_in_progress flag to indicate that we're currently attempting
to roam via an explicitly request to a specific BSS so that we don't
initiate another connection attempt based on the possibly received scan
results from a scan that was in progress at the time the roam command
was received.

Signed-off-by: Matthew Wang <matthewmwang@chromium.org>
wpa_supplicant/ctrl_iface.c
wpa_supplicant/dbus/dbus_new_handlers.c
wpa_supplicant/sme.c
wpa_supplicant/wpa_supplicant_i.h