[PATCH 2/2] nl80211: allow to authenticate to access point that we already authenticated
Maxim Levitsky
maximlevitsky
Sat Oct 31 02:36:29 PDT 2009
On Sat, 2009-10-31 at 06:44 +0100, Johannes Berg wrote:
> On Fri, 2009-10-30 at 23:54 +0200, Maxim Levitsky wrote:
> > >From 02be2525b95ec3c57323dda1a9e0c6da3a9817e6 Mon Sep 17 00:00:00 2001
> > From: Maxim Levitsky <maximlevitsky at gmail.com>
> > Date: Fri, 30 Oct 2009 23:50:27 +0200
> > Subject: [PATCH 2/2] nl80211: allow to authenticate to access point that we already authenticated
> >
> > This is permitted by standards, and used by driver_nl80211 of wpa_supplicant
> > Just start new authentication as if we weren't authenticated before
>
> NACK. This leaks the auth request here and in mac80211, so we cannot do
> it this simply. Again though, the case you're running into should be
> fixed by that wpa_supplicant patch.
I was afraid of that... oh well thanks.
Best regards,
Maxim Levitsky
>
> johannes
>
> > ---
> > net/wireless/mlme.c | 2 +-
> > 1 files changed, 1 insertions(+), 1 deletions(-)
> >
> > diff --git a/net/wireless/mlme.c b/net/wireless/mlme.c
> > index 83c2a28..3d91b4e 100644
> > --- a/net/wireless/mlme.c
> > +++ b/net/wireless/mlme.c
> > @@ -372,7 +372,7 @@ int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev,
> > if (wdev->auth_bsses[i] &&
> > memcmp(bssid, wdev->auth_bsses[i]->pub.bssid,
> > ETH_ALEN) == 0)
> > - return -EALREADY;
> > + wdev->auth_bsses[i] = NULL;
> > }
> >
> > memset(&req, 0, sizeof(req));
>
More information about the Hostap
mailing list