Просмотр исходного кода

Revert "hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken clients (#9561)" This is causing regressions for other clients

SVN-Revision: 28141
Felix Fietkau 14 лет назад
Родитель
Сommit
44616eca49

+ 0 - 18
package/hostapd/patches/570-eapol_key_type.patch

@@ -1,18 +0,0 @@
---- a/src/ap/wpa_auth.c
-+++ b/src/ap/wpa_auth.c
-@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato
- 		return;
- 	}
- 
-+#if 0
- 	if (sm->wpa == WPA_VERSION_WPA2) {
- 		if (key->type != EAPOL_KEY_TYPE_RSN) {
- 			wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
-@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato
- 			return;
- 		}
- 	}
-+#endif
- 
- 	wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
- 		    WPA_NONCE_LEN);

+ 1 - 1
package/hostapd/patches/770-group_key_timeout.patch

@@ -1,6 +1,6 @@
 --- a/src/ap/wpa_auth.c
 +++ b/src/ap/wpa_auth.c
-@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au
+@@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au
  			 keyidx, encr, 0);
  
  	ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;