From 53c6db5ab43194c89cc7fe2d03dbd630c39bcfda Mon Sep 17 00:00:00 2001 From: Felix Fietkau Date: Tue, 24 Jan 2012 01:49:23 +0000 Subject: hostapd: merge an upstream workaround for broken clients sending the wrong wpa type (should fix #9561) SVN-Revision: 29876 --- package/hostapd/patches/100-pending_work.patch | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) (limited to 'package/hostapd/patches/100-pending_work.patch') diff --git a/package/hostapd/patches/100-pending_work.patch b/package/hostapd/patches/100-pending_work.patch index d9824f3178..8b318190fd 100644 --- a/package/hostapd/patches/100-pending_work.patch +++ b/package/hostapd/patches/100-pending_work.patch @@ -160,3 +160,21 @@ if (bss != &drv->first_bss) { struct i802_bss *tbss; +--- a/src/ap/wpa_auth.c ++++ b/src/ap/wpa_auth.c +@@ -776,7 +776,14 @@ void wpa_receive(struct wpa_authenticato + } + + if (sm->wpa == WPA_VERSION_WPA2) { +- if (key->type != EAPOL_KEY_TYPE_RSN) { ++ if (key->type == EAPOL_KEY_TYPE_WPA) { ++ /* ++ * Some deployed station implementations seem to send ++ * msg 4/4 with incorrect type value in WPA2 mode. ++ */ ++ wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key " ++ "with unexpected WPA type in RSN mode"); ++ } else if (key->type != EAPOL_KEY_TYPE_RSN) { + wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with " + "unexpected type %d in RSN mode", + key->type); -- cgit v1.2.3