Currently, doing so leads to connectivity loss when WDS station reconnects without sending deauthentication request first (for example, on power cycle). Signed-off-by: Dmitry Ivanov <dima@xxxxxxxx> --- src/ap/ieee802_11.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/src/ap/ieee802_11.c b/src/ap/ieee802_11.c index b36e68d..eecb894 100644 --- a/src/ap/ieee802_11.c +++ b/src/ap/ieee802_11.c @@ -2758,9 +2758,7 @@ static void handle_assoc_cb(struct hostapd_data *hapd, sta->aid, 1); if (!ret) hostapd_set_wds_encryption(hapd, sta, ifname_wds); - } - - if (sta->eapol_sm == NULL) { + } else if (sta->eapol_sm == NULL) { /* * This STA does not use RADIUS server for EAP authentication, * so bind it to the selected VLAN interface now, since the -- 2.1.4 _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap