mirror of
git://projects.qi-hardware.com/openwrt-xburst.git
synced 2025-04-21 12:27:27 +03:00
hostapd: merge an upstream workaround for broken clients sending the wrong wpa type (should fix #9561)
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@29876 3c298f89-4303-0410-b956-a3cf2f4a3e73
This commit is contained in:
@@ -160,3 +160,21 @@
|
||||
|
||||
if (bss != &drv->first_bss) {
|
||||
struct i802_bss *tbss;
|
||||
--- a/src/ap/wpa_auth.c
|
||||
+++ b/src/ap/wpa_auth.c
|
||||
@@ -776,7 +776,14 @@ void wpa_receive(struct wpa_authenticato
|
||||
}
|
||||
|
||||
if (sm->wpa == WPA_VERSION_WPA2) {
|
||||
- if (key->type != EAPOL_KEY_TYPE_RSN) {
|
||||
+ if (key->type == EAPOL_KEY_TYPE_WPA) {
|
||||
+ /*
|
||||
+ * Some deployed station implementations seem to send
|
||||
+ * msg 4/4 with incorrect type value in WPA2 mode.
|
||||
+ */
|
||||
+ wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key "
|
||||
+ "with unexpected WPA type in RSN mode");
|
||||
+ } else if (key->type != EAPOL_KEY_TYPE_RSN) {
|
||||
wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
|
||||
"unexpected type %d in RSN mode",
|
||||
key->type);
|
||||
|
||||
Reference in New Issue
Block a user