Fix wpa_supplicant AP mode to ignore EAPOL Supplicant port callback

This is needed to avoid setting EAPOL PAE port status incorrectly
when using wpa_supplicant to control AP mode operations.
This commit is contained in:
Jouni Malinen 2010-07-17 20:25:41 -07:00 committed by Jouni Malinen
parent c01106f3e8
commit 69a6b47aa0

View file

@ -560,6 +560,14 @@ static void wpa_supplicant_eap_param_needed(void *ctx, const char *field,
static void wpa_supplicant_port_cb(void *ctx, int authorized) static void wpa_supplicant_port_cb(void *ctx, int authorized)
{ {
struct wpa_supplicant *wpa_s = ctx; struct wpa_supplicant *wpa_s = ctx;
#ifdef CONFIG_AP
if (wpa_s->ap_iface) {
wpa_printf(MSG_DEBUG, "AP mode active - skip EAPOL Supplicant "
"port status: %s",
authorized ? "Authorized" : "Unauthorized");
return;
}
#endif /* CONFIG_AP */
wpa_printf(MSG_DEBUG, "EAPOL: Supplicant port status: %s", wpa_printf(MSG_DEBUG, "EAPOL: Supplicant port status: %s",
authorized ? "Authorized" : "Unauthorized"); authorized ? "Authorized" : "Unauthorized");
wpa_drv_set_supp_port(wpa_s, authorized); wpa_drv_set_supp_port(wpa_s, authorized);