On Fri, 2009-10-30 at 23:54 +0200, Maxim Levitsky wrote: > >From 02be2525b95ec3c57323dda1a9e0c6da3a9817e6 Mon Sep 17 00:00:00 2001 > From: Maxim Levitsky <maximlevitsky@xxxxxxxxx> > Date: Fri, 30 Oct 2009 23:50:27 +0200 > Subject: [PATCH 2/2] nl80211: allow to authenticate to access point that we already authenticated > > This is permitted by standards, and used by driver_nl80211 of wpa_supplicant > Just start new authentication as if we weren't authenticated before NACK. This leaks the auth request here and in mac80211, so we cannot do it this simply. Again though, the case you're running into should be fixed by that wpa_supplicant patch. johannes > --- > net/wireless/mlme.c | 2 +- > 1 files changed, 1 insertions(+), 1 deletions(-) > > diff --git a/net/wireless/mlme.c b/net/wireless/mlme.c > index 83c2a28..3d91b4e 100644 > --- a/net/wireless/mlme.c > +++ b/net/wireless/mlme.c > @@ -372,7 +372,7 @@ int __cfg80211_mlme_auth(struct cfg80211_registered_device *rdev, > if (wdev->auth_bsses[i] && > memcmp(bssid, wdev->auth_bsses[i]->pub.bssid, > ETH_ALEN) == 0) > - return -EALREADY; > + wdev->auth_bsses[i] = NULL; > } > > memset(&req, 0, sizeof(req));
Attachment:
signature.asc
Description: This is a digitally signed message part