Remove possible authentication timeout on connection failure
The authentication timeout could be triggered after the connection has already been known to have failed. The event at that point can be confusing, so better cancel the timeout when processing connection failure. Signed-hostap: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
1e7fb4f1b7
commit
5fd9fb2772
1 changed files with 5 additions and 0 deletions
|
@ -2848,6 +2848,11 @@ void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid)
|
||||||
int count;
|
int count;
|
||||||
int *freqs = NULL;
|
int *freqs = NULL;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Remove possible authentication timeout since the connection failed.
|
||||||
|
*/
|
||||||
|
eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Add the failed BSSID into the blacklist and speed up next scan
|
* Add the failed BSSID into the blacklist and speed up next scan
|
||||||
* attempt if there could be other APs that could accept association.
|
* attempt if there could be other APs that could accept association.
|
||||||
|
|
Loading…
Reference in a new issue