[PATCH RFC] wpa_s: use proper channel to send SAE AUTH frames

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



SAE connection fails if CSA occured during any previous connection
since the start of current wpa_supplicant runtime.

The root cause is as follows. If STA channel changes due to CSA,
then bss->freq is updated in mlme_event_ch_switch. However this
value is not cleared between connections. So later it will be
used during SAE AUTH frame exchange.

Signed-off-by: Sergey Matyukevich <sergey.matyukevich.os@xxxxxxxxxxxxx>
---

By the way, it looks like cleaning up bss->freq field would be a better
option. But so far I could not figure out a good place for this kind of
cleanup. Any suggestions are welcome.

 src/drivers/driver_nl80211.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/src/drivers/driver_nl80211.c b/src/drivers/driver_nl80211.c
index 661e34e66..0ce76086d 100644
--- a/src/drivers/driver_nl80211.c
+++ b/src/drivers/driver_nl80211.c
@@ -5809,6 +5809,7 @@ static int wpa_driver_nl80211_associate(
 		if (params->auth_alg & WPA_AUTH_ALG_SAE) {
 			nl_connect = bss->nl_connect;
 			bss->use_nl_connect = 1;
+			bss->freq = params->freq.freq;
 		} else {
 			bss->use_nl_connect = 0;
 		}
-- 
2.11.0

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux