Hi, Your patch corrects the problem !! No unencrypted frame observed anymore. Thank you very much (and Johannes too). Regards, Cédric DEBARGE -----Message d'origine----- De : Jouni Malinen [mailto:j@xxxxx] Envoyé : jeudi 25 octobre 2012 16:51 À : Cédric Debarge - ACKSYS Cc : 'Johannes Berg'; linux-wireless@xxxxxxxxxxxxxxx Objet : Re: TR: Clear data transit during WPA negociation in case of reassociation On Thu, Oct 25, 2012 at 03:42:56PM +0200, Cédric Debarge - ACKSYS wrote: > Please find attached the wpa_supplicant log file (it is quite big because of the EAP-TLS) you asked for. Could you please test this with the following change in wpa_supplicant? diff --git a/src/eapol_supp/eapol_supp_sm.c b/src/eapol_supp/eapol_supp_sm.c index 851cf49..f90fb62 100644 --- a/src/eapol_supp/eapol_supp_sm.c +++ b/src/eapol_supp/eapol_supp_sm.c @@ -1469,10 +1469,7 @@ void eapol_sm_notify_cached(struct eapol_sm *sm) if (sm == NULL) return; wpa_printf(MSG_DEBUG, "EAPOL: PMKSA caching was used - skip EAPOL"); - sm->SUPP_PAE_state = SUPP_PAE_AUTHENTICATED; - sm->suppPortStatus = Authorized; - eapol_sm_set_port_authorized(sm); - sm->portValid = TRUE; + sm->eapSuccess = TRUE; eap_notify_success(sm->eap); eapol_sm_step(sm); } -- Jouni Malinen PGP id EFC895FA -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html