diff options
author | Felix Fietkau <nbd@openwrt.org> | 2011-09-01 16:07:38 +0000 |
---|---|---|
committer | Felix Fietkau <nbd@openwrt.org> | 2011-09-01 16:07:38 +0000 |
commit | 44616eca491f027a7a4828d3e719177545436fee (patch) | |
tree | ea2af2d7b5ea1b26219adcec09ed3f9ea3418980 /package | |
parent | 5c8270da86d52f57e73d964c5bae297a2e9e73db (diff) | |
download | upstream-44616eca491f027a7a4828d3e719177545436fee.tar.gz upstream-44616eca491f027a7a4828d3e719177545436fee.tar.bz2 upstream-44616eca491f027a7a4828d3e719177545436fee.zip |
Revert "hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken clients (#9561)" This is causing regressions for other clients
SVN-Revision: 28141
Diffstat (limited to 'package')
-rw-r--r-- | package/hostapd/patches/570-eapol_key_type.patch | 18 | ||||
-rw-r--r-- | package/hostapd/patches/770-group_key_timeout.patch | 2 |
2 files changed, 1 insertions, 19 deletions
diff --git a/package/hostapd/patches/570-eapol_key_type.patch b/package/hostapd/patches/570-eapol_key_type.patch deleted file mode 100644 index e608f10929..0000000000 --- a/package/hostapd/patches/570-eapol_key_type.patch +++ /dev/null @@ -1,18 +0,0 @@ ---- a/src/ap/wpa_auth.c -+++ b/src/ap/wpa_auth.c -@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato - return; - } - -+#if 0 - if (sm->wpa == WPA_VERSION_WPA2) { - if (key->type != EAPOL_KEY_TYPE_RSN) { - wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with " -@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato - return; - } - } -+#endif - - wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce, - WPA_NONCE_LEN); diff --git a/package/hostapd/patches/770-group_key_timeout.patch b/package/hostapd/patches/770-group_key_timeout.patch index 3f0bfc33d3..a41a89bed6 100644 --- a/package/hostapd/patches/770-group_key_timeout.patch +++ b/package/hostapd/patches/770-group_key_timeout.patch @@ -1,6 +1,6 @@ --- a/src/ap/wpa_auth.c +++ b/src/ap/wpa_auth.c -@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au +@@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au keyidx, encr, 0); ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr; |