Verify that l2_packet is initialized before notification call
It is possible that l2_packet is not used with wpa_supplicant in some cases, so better make sure we do not end up notifying l2_packet code about authentications unless it was actually initialized in the first place.
This commit is contained in:
parent
69a6b47aa0
commit
3f967fe055
1 changed files with 2 additions and 1 deletions
|
@ -1178,7 +1178,8 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
||||||
wpa_supplicant_scard_init(wpa_s, wpa_s->current_ssid);
|
wpa_supplicant_scard_init(wpa_s, wpa_s->current_ssid);
|
||||||
}
|
}
|
||||||
wpa_sm_notify_assoc(wpa_s->wpa, bssid);
|
wpa_sm_notify_assoc(wpa_s->wpa, bssid);
|
||||||
l2_packet_notify_auth_start(wpa_s->l2);
|
if (wpa_s->l2)
|
||||||
|
l2_packet_notify_auth_start(wpa_s->l2);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Set portEnabled first to FALSE in order to get EAP state machine out
|
* Set portEnabled first to FALSE in order to get EAP state machine out
|
||||||
|
|
Loading…
Reference in a new issue