From: Hong Liu <[EMAIL PROTECTED]>

After key negotiation completed using wpa_supplicant, wpa_supplicant
can't reassoc with the AP if we reboot the AP. It always fails at the
4-way handshake.
The problem is the key info is not cleared correctly. Thus when
wpa_supplicant send the EAPOL-KEY packet, the d80211 stack finds the old
key and uses it to encrypt the packet.

The patch removes the sta_info when we disassociate with AP.

Signed-off-by: Hong Liu <[EMAIL PROTECTED]>
Signed-off-by: Jiri Benc <[EMAIL PROTECTED]>

---

 net/d80211/ieee80211_sta.c |    2 ++
 net/d80211/sta_info.c      |    8 ++++++--
 2 files changed, 8 insertions(+), 2 deletions(-)

25a49e579344602c14e4cf79fa95098b01e7cf27
diff --git a/net/d80211/ieee80211_sta.c b/net/d80211/ieee80211_sta.c
index a933d92..557ba17 100644
--- a/net/d80211/ieee80211_sta.c
+++ b/net/d80211/ieee80211_sta.c
@@ -710,6 +710,8 @@ static void ieee80211_associated(struct 
                                       "range\n",
                                       dev->name, MAC_ARG(ifsta->bssid));
                                disassoc = 1;
+                               sta_info_free(sta, 0);
+                               ifsta->probereq_poll = 0;
                        } else {
                                ieee80211_send_probe_req(dev, ifsta->bssid,
                                                         local->scan_ssid,
diff --git a/net/d80211/sta_info.c b/net/d80211/sta_info.c
index 622b234..5edbd0c 100644
--- a/net/d80211/sta_info.c
+++ b/net/d80211/sta_info.c
@@ -197,6 +197,12 @@ #ifdef CONFIG_D80211_VERBOSE_DEBUG
               local->mdev->name, MAC_ARG(sta->addr));
 #endif /* CONFIG_D80211_VERBOSE_DEBUG */
 
+       if (sta->key) {
+               ieee80211_key_sysfs_remove(sta->key);
+               ieee80211_key_free(sta->key);
+               sta->key = NULL;
+       }
+
        rate_control_remove_sta_attrs(local, sta->rate_ctrl_priv, &sta->kobj);
        ieee80211_sta_sysfs_remove(sta);
 
@@ -244,8 +250,6 @@ void sta_info_free(struct sta_info *sta,
                                kfree(key);
                        }
                }
-               ieee80211_key_free(sta->key);
-               sta->key = NULL;
        } else if (sta->key_idx_compression != HW_KEY_IDX_INVALID) {
                struct ieee80211_key_conf conf;
                memset(&conf, 0, sizeof(conf));
-- 
1.3.0

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to