hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken...
authornbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Mon, 29 Aug 2011 08:24:34 +0000 (08:24 +0000)
committernbd <nbd@3c298f89-4303-0410-b956-a3cf2f4a3e73>
Mon, 29 Aug 2011 08:24:34 +0000 (08:24 +0000)
git-svn-id: svn://svn.openwrt.org/openwrt/branches/backfire@28112 3c298f89-4303-0410-b956-a3cf2f4a3e73

package/hostapd/patches/570-eapol_key_type.patch [new file with mode: 0644]
package/hostapd/patches/770-group_key_timeout.patch

diff --git a/package/hostapd/patches/570-eapol_key_type.patch b/package/hostapd/patches/570-eapol_key_type.patch
new file mode 100644 (file)
index 0000000..e608f10
--- /dev/null
@@ -0,0 +1,18 @@
+--- a/src/ap/wpa_auth.c
++++ b/src/ap/wpa_auth.c
+@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato
+               return;
+       }
++#if 0
+       if (sm->wpa == WPA_VERSION_WPA2) {
+               if (key->type != EAPOL_KEY_TYPE_RSN) {
+                       wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
+@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato
+                       return;
+               }
+       }
++#endif
+       wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
+                   WPA_NONCE_LEN);
index a41a89bed6de5518eeb295e93356e53f4aa824cd..3f0bfc33d3e5d33d40ce5d781c24e56b45d5f409 100644 (file)
@@ -1,6 +1,6 @@
 --- a/src/ap/wpa_auth.c
 +++ b/src/ap/wpa_auth.c
-@@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au
+@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au
                         keyidx, encr, 0);
  
        ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;