hostapd: backport fix for wnm_sleep_mode=0
authorTimo Sigurdsson <public_timo.s@silentcreek.de>
Tue, 14 Nov 2017 20:41:30 +0000 (21:41 +0100)
committerStijn Tintel <stijn@linux-ipv6.be>
Thu, 7 Dec 2017 18:45:44 +0000 (19:45 +0100)
commitf5f5f583f9fe3581646fdc35b613f436908666c6
treeffa192c8946acd53f912b9f9b02ecb6d68836827
parent19ebc19f545c7f96bcf5a6437b405cb849be453c
hostapd: backport fix for wnm_sleep_mode=0

wpa_disable_eapol_key_retries can't prevent attacks against the Wireless
Network Management (WNM) Sleep Mode handshake. Currently, hostapd
processes WNM Sleep Mode requests from clients regardless of the setting
wnm_sleep_mode. Backport Jouni Malinen's upstream patch 114f2830 in
order to ignore such requests by clients when wnm_sleep_mode is disabled
(which is the default).

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
[rewrite commit subject (<= 50 characters), bump PKG_RELEASE]
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit bd45e15d0afe64dfed5a02a50a634f7947b50144
 fixed PKG_RELEASE and renumbered patch)

Conflicts:
package/network/services/hostapd/Makefile
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/019-WNM-Ignore-WNM-Sleep-Mode-Request-in-wnm_sleep_mode-.patch [new file with mode: 0644]