update hostapd patches to the latest from http://johannes.sipsolutions.net/patches...
[openwrt/openwrt.git] / package / hostapd / patches / 002-remove-michael-mic.patch
1 ---
2 hostapd/driver_devicescape.c | 4 +++-
3 1 file changed, 3 insertions(+), 1 deletion(-)
4
5 --- hostap.orig/hostapd/driver_devicescape.c 2007-11-14 17:30:47.000000000 +0100
6 +++ hostap/hostapd/driver_devicescape.c 2007-11-14 17:31:07.000000000 +0100
7 @@ -1264,6 +1264,7 @@ static void dump_frame_info(struct ieee8
8 }
9
10
11 +/*
12 static void hostapd_michael_mic_failure(struct hostapd_data *hapd, u8 *buf,
13 size_t len)
14 {
15 @@ -1278,6 +1279,7 @@ static void hostapd_michael_mic_failure(
16
17 mlme_michaelmicfailure_indication(hapd, hdr->addr2);
18 }
19 +*/
20
21
22 static void handle_frame(struct hostapd_iface *iface, u8 *buf, size_t len,
23 @@ -1386,10 +1388,10 @@ static void handle_frame(struct hostapd_
24 case ieee80211_msg_wep_frame_unknown_key:
25 ieee802_11_rx_unknown_key(hapd, buf, data_len);
26 return;
27 - */
28 case ieee80211_msg_michael_mic_failure:
29 hostapd_michael_mic_failure(hapd, buf, data_len);
30 return;
31 + */
32 /*
33 * TODO
34 * We should be telling them to go away. But we don't support that now.