aboutsummaryrefslogtreecommitdiffstats
path: root/package/hostapd/patches
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2011-09-01 16:07:38 +0000
committerFelix Fietkau <nbd@openwrt.org>2011-09-01 16:07:38 +0000
commit44616eca491f027a7a4828d3e719177545436fee (patch)
treeea2af2d7b5ea1b26219adcec09ed3f9ea3418980 /package/hostapd/patches
parent5c8270da86d52f57e73d964c5bae297a2e9e73db (diff)
downloadupstream-44616eca491f027a7a4828d3e719177545436fee.tar.gz
upstream-44616eca491f027a7a4828d3e719177545436fee.tar.bz2
upstream-44616eca491f027a7a4828d3e719177545436fee.zip
Revert "hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken clients (#9561)" This is causing regressions for other clients
SVN-Revision: 28141
Diffstat (limited to 'package/hostapd/patches')
-rw-r--r--package/hostapd/patches/570-eapol_key_type.patch18
-rw-r--r--package/hostapd/patches/770-group_key_timeout.patch2
2 files changed, 1 insertions, 19 deletions
diff --git a/package/hostapd/patches/570-eapol_key_type.patch b/package/hostapd/patches/570-eapol_key_type.patch
deleted file mode 100644
index e608f10929..0000000000
--- a/package/hostapd/patches/570-eapol_key_type.patch
+++ /dev/null
@@ -1,18 +0,0 @@
---- a/src/ap/wpa_auth.c
-+++ b/src/ap/wpa_auth.c
-@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato
- return;
- }
-
-+#if 0
- if (sm->wpa == WPA_VERSION_WPA2) {
- if (key->type != EAPOL_KEY_TYPE_RSN) {
- wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
-@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato
- return;
- }
- }
-+#endif
-
- wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
- WPA_NONCE_LEN);
diff --git a/package/hostapd/patches/770-group_key_timeout.patch b/package/hostapd/patches/770-group_key_timeout.patch
index 3f0bfc33d3..a41a89bed6 100644
--- a/package/hostapd/patches/770-group_key_timeout.patch
+++ b/package/hostapd/patches/770-group_key_timeout.patch
@@ -1,6 +1,6 @@
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
-@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au
+@@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au
keyidx, encr, 0);
ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;