On Thu, 2010-07-01 at 10:21 -0700, Paul Stewart wrote: > This bypasses destruction of BSS state if a temporary DEAUTH packet is > received while performing an AUTH. This will allow the retry mechanism > (which runs regardless of this patch) to succeed, since we do not remove > the BSS state which is required to complete authentication on the client > side in cfg80211_send_rx_auth(). > > The specific case handled here is "Previous authentication no longer > valid", which is usually generated by an AP if the AP still has saved > state of the STA being authenticated. Usually a retry will be successful. You don't usually send patches to stable, you send them to the current tree with a cc stable tag, and then they get picked up. I'm going to look at the problem now, I'm still not really convinced by this. johannes -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html