|
@@ -1332,25 +1332,6 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|
wpa_s->pending_eapol_rx = NULL;
|
|
wpa_s->pending_eapol_rx = NULL;
|
|
}
|
|
}
|
|
|
|
|
|
-#ifdef CONFIG_BGSCAN
|
|
|
|
- if (wpa_s->current_ssid != wpa_s->bgscan_ssid) {
|
|
|
|
- bgscan_deinit(wpa_s);
|
|
|
|
- if (wpa_s->current_ssid && wpa_s->current_ssid->bgscan) {
|
|
|
|
- if (bgscan_init(wpa_s, wpa_s->current_ssid)) {
|
|
|
|
- wpa_dbg(wpa_s, MSG_DEBUG, "Failed to "
|
|
|
|
- "initialize bgscan");
|
|
|
|
-
|
|
|
|
- * Live without bgscan; it is only used as a
|
|
|
|
- * roaming optimization, so the initial
|
|
|
|
- * connection is not affected.
|
|
|
|
- */
|
|
|
|
- } else
|
|
|
|
- wpa_s->bgscan_ssid = wpa_s->current_ssid;
|
|
|
|
- } else
|
|
|
|
- wpa_s->bgscan_ssid = NULL;
|
|
|
|
- }
|
|
|
|
-#endif
|
|
|
|
-
|
|
|
|
if ((wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
|
|
if ((wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
|
|
wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) &&
|
|
wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) &&
|
|
wpa_s->current_ssid && wpa_drv_get_capa(wpa_s, &capa) == 0 &&
|
|
wpa_s->current_ssid && wpa_drv_get_capa(wpa_s, &capa) == 0 &&
|
|
@@ -1422,8 +1403,6 @@ static void wpa_supplicant_event_disassoc(struct wpa_supplicant *wpa_s,
|
|
wpa_clear_keys(wpa_s, wpa_s->bssid);
|
|
wpa_clear_keys(wpa_s, wpa_s->bssid);
|
|
}
|
|
}
|
|
wpa_supplicant_mark_disassoc(wpa_s);
|
|
wpa_supplicant_mark_disassoc(wpa_s);
|
|
- bgscan_deinit(wpa_s);
|
|
|
|
- wpa_s->bgscan_ssid = NULL;
|
|
|
|
|
|
|
|
if (authenticating && (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME))
|
|
if (authenticating && (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME))
|
|
sme_disassoc_while_authenticating(wpa_s, prev_pending_bssid);
|
|
sme_disassoc_while_authenticating(wpa_s, prev_pending_bssid);
|