hostapd: backport fix for wnm_sleep_mode=0
authorTimo Sigurdsson <public_timo.s@silentcreek.de>
Tue, 14 Nov 2017 20:41:30 +0000 (21:41 +0100)
committerRISCi_ATOM <bob@bobcall.me>
Mon, 11 Dec 2017 18:24:19 +0000 (13:24 -0500)
commiteed4bd81cce7eb76489a7db66deae46158a2c1a2
tree0d116e39a8ccb756c0b46ad6ae39fd24f462af68
parenta2c34fc57599fece97f034e37fca4d73248c265f
hostapd: backport fix for wnm_sleep_mode=0

wpa_disable_eapol_key_retries can't prevent attacks against the Wireless
Network Management (WNM) Sleep Mode handshake. Currently, hostapd
processes WNM Sleep Mode requests from clients regardless of the setting
wnm_sleep_mode. Backport Jouni Malinen's upstream patch 114f2830 in
order to ignore such requests by clients when wnm_sleep_mode is disabled
(which is the default).

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
[rewrite commit subject (<= 50 characters), bump PKG_RELEASE]
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit bd45e15d0afe64dfed5a02a50a634f7947b50144
 fixed PKG_RELEASE and renumbered patch)

Conflicts:
package/network/services/hostapd/Makefile
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/019-WNM-Ignore-WNM-Sleep-Mode-Request-in-wnm_sleep_mode-.patch [new file with mode: 0644]