Revert "hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken clients (#9561)" This is causing regressions for other clients

SVN-Revision: 28141
master
Felix Fietkau 13 years ago
parent 5c8270da86
commit 44616eca49
  1. 18
      package/hostapd/patches/570-eapol_key_type.patch
  2. 2
      package/hostapd/patches/770-group_key_timeout.patch

@ -1,18 +0,0 @@
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato
return;
}
+#if 0
if (sm->wpa == WPA_VERSION_WPA2) {
if (key->type != EAPOL_KEY_TYPE_RSN) {
wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato
return;
}
}
+#endif
wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
WPA_NONCE_LEN);

@ -1,6 +1,6 @@
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au
@@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au
keyidx, encr, 0);
ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;

Loading…
Cancel
Save