Return-path: Received: from he.sipsolutions.net ([78.46.109.217]:57546 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752575Ab1ARPYA (ORCPT ); Tue, 18 Jan 2011 10:24:00 -0500 Subject: Re: intermittent eap authentication failure From: Johannes Berg To: Chuck Crisler Cc: linux-wireless@vger.kernel.org In-Reply-To: <48A27D1459A9493C8A16D0D6308A5FB1@ChuckPC> References: <1295347932.3563.13.camel@jlt3.sipsolutions.net> <1F9D19D1999A4D7885D0A4DD7BEBCEE8@ChuckPC> <1295362622.3563.23.camel@jlt3.sipsolutions.net> <48A27D1459A9493C8A16D0D6308A5FB1@ChuckPC> Content-Type: text/plain; charset="UTF-8" Date: Tue, 18 Jan 2011 16:23:58 +0100 Message-ID: <1295364238.3563.24.camel@jlt3.sipsolutions.net> Mime-Version: 1.0 Sender: linux-wireless-owner@vger.kernel.org List-ID: On Tue, 2011-01-18 at 10:21 -0500, Chuck Crisler wrote: > What is the reason that the design calls for a scan in response to a session > timeout? A session timeout doesn't happen because of a roam, so the original > AP is probably still good. Why scan? I don't think there's any design here, and in any case that's wpa_supplicant's doing. :) johannes