Revert "hostapd: add a patch for ignoring the WPA/WPA2 key type to work around some broken clients (#9561)" This is causing regressions for other clients

SVN-Revision: 28141
This commit is contained in:
Felix Fietkau 2011-09-01 16:07:38 +00:00
parent 5c8270da86
commit 44616eca49
2 changed files with 1 additions and 19 deletions

View file

@ -1,18 +0,0 @@
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -725,6 +725,7 @@ void wpa_receive(struct wpa_authenticato
return;
}
+#if 0
if (sm->wpa == WPA_VERSION_WPA2) {
if (key->type != EAPOL_KEY_TYPE_RSN) {
wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
@@ -740,6 +741,7 @@ void wpa_receive(struct wpa_authenticato
return;
}
}
+#endif
wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
WPA_NONCE_LEN);

View file

@ -1,6 +1,6 @@
--- a/src/ap/wpa_auth.c --- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c +++ b/src/ap/wpa_auth.c
@@ -1290,7 +1290,7 @@ static void wpa_send_eapol(struct wpa_au @@ -1288,7 +1288,7 @@ static void wpa_send_eapol(struct wpa_au
keyidx, encr, 0); keyidx, encr, 0);
ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr; ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;