aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/events.c
diff options
context:
space:
mode:
authorJouni Malinen <j@w1.fi>2015-03-01 13:54:24 (GMT)
committerJouni Malinen <j@w1.fi>2015-03-01 13:54:24 (GMT)
commitc28059091aad21d13396509cdf8bde50b9aa147a (patch)
tree66b1d719927f88f22a48c0eb7fb5e1f2e0212c72 /wpa_supplicant/events.c
parent6acca70536bf3f19fd50a7cb059fb753565a3a98 (diff)
downloadhostap-c28059091aad21d13396509cdf8bde50b9aa147a.zip
hostap-c28059091aad21d13396509cdf8bde50b9aa147a.tar.gz
hostap-c28059091aad21d13396509cdf8bde50b9aa147a.tar.bz2
Do not add blacklist entries based on normal disconnect request cases
There are number of cases where wpa_supplicant requests the current connection to be disconnected before starting a new operation. Such cases do not really indicate that there was an error in connecting or a disconnection initiated by the AP, so do not add a temporary blacklist entry in such sequences. Signed-off-by: Jouni Malinen <j@w1.fi>
Diffstat (limited to 'wpa_supplicant/events.c')
-rw-r--r--wpa_supplicant/events.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c
index 1f9fc97..9de8f7a 100644
--- a/wpa_supplicant/events.c
+++ b/wpa_supplicant/events.c
@@ -2671,6 +2671,9 @@ static void wpas_event_disconnect(struct wpa_supplicant *wpa_s, const u8 *addr,
}
#endif /* CONFIG_AP */
+ if (!locally_generated)
+ wpa_s->own_disconnect_req = 0;
+
wpa_supplicant_event_disassoc(wpa_s, reason_code, locally_generated);
if (((reason_code == WLAN_REASON_IEEE_802_1X_AUTH_FAILED ||