Verify that l2_packet is initialized before notification call
It is possible that l2_packet is not used with wpa_supplicant in some cases, so better make sure we do not end up notifying l2_packet code about authentications unless it was actually initialized in the first place.
This commit is contained in:
parent
69a6b47aa0
commit
3f967fe055
1 changed files with 2 additions and 1 deletions
|
@ -1178,7 +1178,8 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|||
wpa_supplicant_scard_init(wpa_s, wpa_s->current_ssid);
|
||||
}
|
||||
wpa_sm_notify_assoc(wpa_s->wpa, bssid);
|
||||
l2_packet_notify_auth_start(wpa_s->l2);
|
||||
if (wpa_s->l2)
|
||||
l2_packet_notify_auth_start(wpa_s->l2);
|
||||
|
||||
/*
|
||||
* Set portEnabled first to FALSE in order to get EAP state machine out
|
||||
|
|
Loading…
Reference in a new issue