aboutsummaryrefslogtreecommitdiffstats
path: root/package/hostapd/patches/340-madwifi_key_fixes.patch
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2011-03-21 23:02:12 +0000
committerFelix Fietkau <nbd@openwrt.org>2011-03-21 23:02:12 +0000
commit0e823a1b023430d1a8a67ccb6ffb03f4b4ab269d (patch)
treeaf87a6ddbfebb2854365648555520af4d5bc4570 /package/hostapd/patches/340-madwifi_key_fixes.patch
parent17057a805e54103d740d3499c013d5a0b0b4c1ea (diff)
downloadupstream-0e823a1b023430d1a8a67ccb6ffb03f4b4ab269d.tar.gz
upstream-0e823a1b023430d1a8a67ccb6ffb03f4b4ab269d.tar.bz2
upstream-0e823a1b023430d1a8a67ccb6ffb03f4b4ab269d.zip
hostapd: update to 2011-02-21, use PKG_MIRROR_MD5SUM, includes fixes for WPS
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@26261 3c298f89-4303-0410-b956-a3cf2f4a3e73
Diffstat (limited to 'package/hostapd/patches/340-madwifi_key_fixes.patch')
-rw-r--r--package/hostapd/patches/340-madwifi_key_fixes.patch55
1 files changed, 45 insertions, 10 deletions
diff --git a/package/hostapd/patches/340-madwifi_key_fixes.patch b/package/hostapd/patches/340-madwifi_key_fixes.patch
index 5d2e9c1078..ab4d0575eb 100644
--- a/package/hostapd/patches/340-madwifi_key_fixes.patch
+++ b/package/hostapd/patches/340-madwifi_key_fixes.patch
@@ -1,19 +1,54 @@
--- a/src/drivers/driver_madwifi.c
+++ b/src/drivers/driver_madwifi.c
-@@ -463,15 +463,30 @@ madwifi_set_key(const char *ifname, void
- memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);
+@@ -439,7 +439,11 @@ madwifi_set_key(const char *ifname, void
+ __func__, alg, ether_sprintf(addr), key_idx);
+
+ if (alg == WPA_ALG_WEP)
++ {
+ cipher = IEEE80211_CIPHER_WEP;
++ if ((!addr || !memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN)) && drv->wext)
++ return wpa_driver_wext_set_key(ifname, drv->wext, alg, addr, key_idx, set_tx, seq, seq_len, key, key_len);
++ }
+ else if (alg == WPA_ALG_TKIP)
+ cipher = IEEE80211_CIPHER_TKIP;
+ else if (alg == WPA_ALG_CCMP)
+@@ -458,20 +462,45 @@ madwifi_set_key(const char *ifname, void
+
+ memset(&wk, 0, sizeof(wk));
+ wk.ik_type = cipher;
+- wk.ik_flags = IEEE80211_KEY_RECV | IEEE80211_KEY_XMIT;
+- if (addr == NULL || is_broadcast_ether_addr(addr)) {
+- memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);
++ wk.ik_flags = IEEE80211_KEY_RECV;
++ if (set_tx)
++ wk.ik_flags |= IEEE80211_KEY_XMIT;
++ if (addr == NULL) {
++ os_memset(wk.ik_macaddr, 0xff, IEEE80211_ADDR_LEN);
wk.ik_keyix = key_idx;
- wk.ik_flags |= IEEE80211_KEY_DEFAULT;
-+ wk.ik_flags |= IEEE80211_KEY_GROUP;
- } else if (!memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN)) {
-+ wk.ik_keyix = key_idx;
- wk.ik_flags |= IEEE80211_KEY_GROUP;
+- wk.ik_flags |= IEEE80211_KEY_DEFAULT;
+- } else if (!memcmp(addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN)) {
+- wk.ik_flags |= IEEE80211_KEY_GROUP;
- memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
-+ memset(wk.ik_macaddr, 0, IEEE80211_ADDR_LEN);
} else {
- memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
- wk.ik_keyix = IEEE80211_KEYIX_NONE;
+- memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
+- wk.ik_keyix = IEEE80211_KEYIX_NONE;
++ os_memcpy(wk.ik_macaddr, addr, IEEE80211_ADDR_LEN);
++ /*
++ * Deduce whether group/global or unicast key by checking
++ * the address (yech). Note also that we can only mark global
++ * keys default; doing this for a unicast key is an error.
++ */
++ if (os_memcmp(addr, "\xff\xff\xff\xff\xff\xff",
++ IEEE80211_ADDR_LEN) == 0) {
++ wk.ik_flags |= IEEE80211_KEY_GROUP;
++ wk.ik_keyix = key_idx;
++ } else {
++ wk.ik_keyix = key_idx == 0 ? IEEE80211_KEYIX_NONE :
++ key_idx;
++ }
}
++ if (wk.ik_keyix != IEEE80211_KEYIX_NONE && set_tx)
++ wk.ik_flags |= IEEE80211_KEY_DEFAULT;
wk.ik_keylen = key_len;
memcpy(wk.ik_keydata, key, key_len);
+#ifdef WORDS_BIGENDIAN