aboutsummaryrefslogtreecommitdiffstats
path: root/package/hostapd/patches
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2011-08-29 08:23:13 +0000
committerFelix Fietkau <nbd@openwrt.org>2011-08-29 08:23:13 +0000
commitc8b4192518339896799bed399db1591caa355804 (patch)
tree47c9f2772a1a194e0e892735b04771e9dec6d42a /package/hostapd/patches
parent01baf9084f197ec31a17e57977fb93ad499bed1a (diff)
downloadupstream-c8b4192518339896799bed399db1591caa355804.tar.gz
upstream-c8b4192518339896799bed399db1591caa355804.tar.bz2
upstream-c8b4192518339896799bed399db1591caa355804.zip
hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken clients (#9561)
SVN-Revision: 28111
Diffstat (limited to 'package/hostapd/patches')
-rw-r--r--package/hostapd/patches/570-eapol_key_type.patch18
-rw-r--r--package/hostapd/patches/770-group_key_timeout.patch2
2 files changed, 19 insertions, 1 deletions
diff --git a/package/hostapd/patches/570-eapol_key_type.patch b/package/hostapd/patches/570-eapol_key_type.patch
new file mode 100644
index 0000000000..e608f10929
--- /dev/null
+++ b/package/hostapd/patches/570-eapol_key_type.patch
@@ -0,0 +1,18 @@
+--- a/src/ap/wpa_auth.c
++++ b/src/ap/wpa_auth.c
+@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato
+ return;
+ }
+
++#if 0
+ if (sm->wpa == WPA_VERSION_WPA2) {
+ if (key->type != EAPOL_KEY_TYPE_RSN) {
+ wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
+@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato
+ return;
+ }
+ }
++#endif
+
+ wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
+ WPA_NONCE_LEN);
diff --git a/package/hostapd/patches/770-group_key_timeout.patch b/package/hostapd/patches/770-group_key_timeout.patch
index a41a89bed6..3f0bfc33d3 100644
--- a/package/hostapd/patches/770-group_key_timeout.patch
+++ b/package/hostapd/patches/770-group_key_timeout.patch
@@ -1,6 +1,6 @@
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
-@@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au
+@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au
keyidx, encr, 0);
ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;