]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Do not allow ap_scan=2 scan processing to stop AP mode operation
authorJouni Malinen <j@w1.fi>
Tue, 11 Aug 2015 18:46:38 +0000 (21:46 +0300)
committerJouni Malinen <j@w1.fi>
Tue, 11 Aug 2015 18:46:38 +0000 (21:46 +0300)
wpa_supplicant_assoc_try() would result in the currently operating AP to
get stopped if wpa_supplicant_scan() ends up getting triggered without
MANUAL_SCAN_REQ while operating an AP. With ap_scan=2, this could
resulted in unintentional stopping of AP mode operations, so check
explicitly for that case and skip the wpa_supplicant_assoc_try() call if
needed to avoid this.

Signed-off-by: Jouni Malinen <j@w1.fi>
wpa_supplicant/scan.c

index 8d0d1a56fbd49160517c91a406e09cf542ebb314..d7049a1a8164c439ee9c1a8930c46c6d4bf547fc 100644 (file)
@@ -808,6 +808,9 @@ static void wpa_supplicant_scan(void *eloop_ctx, void *timeout_ctx)
        }
 
        if (wpa_s->last_scan_req != MANUAL_SCAN_REQ &&
+#ifdef CONFIG_AP
+           !wpa_s->ap_iface &&
+#endif /* CONFIG_AP */
            wpa_s->conf->ap_scan == 2) {
                wpa_s->connect_without_scan = NULL;
                wpa_s->prev_scan_wildcard = 0;