On Thu, Jan 31, 2013 at 06:18:40 -0800, Nicolas Cavallari wrote: > On 31/01/2013 14:34, Johannes Berg wrote: > > That seems reasonable. Actually there's no reason for wpa_s to "reset > > the [...] sta_info", all it really has to do is set it to unauthorized > > if it detects it was rebooted, and then start key negotiation again, I > > think? > > I'm not sure why Antonio resetted the sta_info. Not resetting it when a node reboot is > detected from userspace works for me anyway. I did that because wpa_s was ignoring the new EAPOL message sent by the rebooted station. If I am not mistaken wpa_s would not expect a new "unencrypted" key exchange. When I tried it wa snot working, that's why I came up with the sta_info reset. But of course, if we could avoid the in-kernel reset, it would be definitely better. -- Antonio Quartulli ..each of us alone is worth nothing.. Ernesto "Che" Guevara
Attachment:
pgp5aMsRjMUN5.pgp
Description: PGP signature