- Increase association timeout, mainly for drivers that don't fully support
WPA ioctls yet
This commit is contained in:
		
							parent
							
								
									f2743777dd
								
							
						
					
					
						commit
						60981ed2d0
					
				
							
								
								
									
										14
									
								
								wpa_supplicant-assoc-timeout.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										14
									
								
								wpa_supplicant-assoc-timeout.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,14 @@ | |||||||
|  | --- wpa_supplicant-0.4.8/wpa_supplicant.c.timeout	2006-03-03 22:26:13.000000000 -0500
 | ||||||
|  | +++ wpa_supplicant-0.4.8/wpa_supplicant.c	2006-03-03 22:26:45.000000000 -0500
 | ||||||
|  | @@ -1252,9 +1252,9 @@
 | ||||||
|  |  		/* Timeout for IEEE 802.11 authentication and association */ | ||||||
|  |  		int timeout; | ||||||
|  |  		if (assoc_failed) | ||||||
|  | -			timeout = 5;
 | ||||||
|  | +			timeout = 15;
 | ||||||
|  |  		else if (wpa_s->conf->ap_scan == 1) | ||||||
|  | -			timeout = 10;
 | ||||||
|  | +			timeout = 15;
 | ||||||
|  |  		else | ||||||
|  |  			timeout = 60; | ||||||
|  |  		wpa_supplicant_req_auth_timeout(wpa_s, timeout, 0); | ||||||
							
								
								
									
										110
									
								
								wpa_supplicant-driver-wext-debug.patch
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										110
									
								
								wpa_supplicant-driver-wext-debug.patch
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,110 @@ | |||||||
|  | --- wpa_supplicant-0.4.8/driver_wext.c.debug	2006-03-03 22:57:59.000000000 -0500
 | ||||||
|  | +++ wpa_supplicant-0.4.8/driver_wext.c	2006-03-03 22:58:41.000000000 -0500
 | ||||||
|  | @@ -1612,20 +1612,32 @@
 | ||||||
|  |  	 */ | ||||||
|  |  	if (drv->auth_alg_fallback && | ||||||
|  |  	    wpa_driver_wext_auth_alg_fallback(drv, params) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because auth_alg_fallback failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |   | ||||||
|  |  	if (!params->bssid && | ||||||
|  |  	    wpa_driver_wext_set_bssid(drv, NULL) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_bssid failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |   | ||||||
|  |  	if (wpa_driver_wext_set_mode(drv, params->mode) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_mode failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	/* TODO: should consider getting wpa version and cipher/key_mgmt suites | ||||||
|  |  	 * from configuration, not from here, where only the selected suite is | ||||||
|  |  	 * available */ | ||||||
|  |  	if (wpa_driver_wext_set_gen_ie(drv, params->wpa_ie, params->wpa_ie_len) | ||||||
|  |  	    < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_gen_ie failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	if (params->wpa_ie == NULL || params->wpa_ie_len == 0) | ||||||
|  |  		value = IW_AUTH_WPA_VERSION_DISABLED; | ||||||
|  |  	else if (params->wpa_ie[0] == RSN_INFO_ELEM) | ||||||
|  | @@ -1634,23 +1646,38 @@
 | ||||||
|  |  		value = IW_AUTH_WPA_VERSION_WPA; | ||||||
|  |  	if (wpa_driver_wext_set_auth_param(drv, | ||||||
|  |  					   IW_AUTH_WPA_VERSION, value) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(WPA_VERSION) failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	value = wpa_driver_wext_cipher2wext(params->pairwise_suite); | ||||||
|  |  	if (wpa_driver_wext_set_auth_param(drv, | ||||||
|  |  					   IW_AUTH_CIPHER_PAIRWISE, value) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(CIPHER_PAIRWISE) failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	value = wpa_driver_wext_cipher2wext(params->group_suite); | ||||||
|  |  	if (wpa_driver_wext_set_auth_param(drv, | ||||||
|  |  					   IW_AUTH_CIPHER_GROUP, value) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(CIPHER_GROUP) failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	value = wpa_driver_wext_keymgmt2wext(params->key_mgmt_suite); | ||||||
|  |  	if (wpa_driver_wext_set_auth_param(drv, | ||||||
|  |  					   IW_AUTH_KEY_MGMT, value) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(KEY_MGMT) failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	value = params->key_mgmt_suite != KEY_MGMT_NONE; | ||||||
|  |  	if (wpa_driver_wext_set_auth_param(drv, | ||||||
|  |  					   IW_AUTH_PRIVACY_INVOKED, value) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(PRIVACY_INVOKED) failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |   | ||||||
|  |  	/* Allow unencrypted EAPOL messages even if pairwise keys are set when | ||||||
|  |  	 * not using WPA. IEEE 802.1X specifies that these frames are not | ||||||
|  | @@ -1664,14 +1691,26 @@
 | ||||||
|  |  	if (wpa_driver_wext_set_auth_param(drv, | ||||||
|  |  					   IW_AUTH_RX_UNENCRYPTED_EAPOL, | ||||||
|  |  					   allow_unencrypted_eapol) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_auth_param(RX_UNENCRYPTED_EAPOL) failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	if (params->freq && wpa_driver_wext_set_freq(drv, params->freq) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_freq failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	if (wpa_driver_wext_set_ssid(drv, params->ssid, params->ssid_len) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_ssid failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |  	if (params->bssid && | ||||||
|  |  	    wpa_driver_wext_set_bssid(drv, params->bssid) < 0) | ||||||
|  | +{
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: assoc failed because set_bssid2 failed", __FUNCTION__);
 | ||||||
|  |  		ret = -1; | ||||||
|  | +}
 | ||||||
|  |   | ||||||
|  |  	return ret; | ||||||
|  |  } | ||||||
|  | @@ -1696,6 +1735,8 @@
 | ||||||
|  |  	res = wpa_driver_wext_set_auth_param(drv, IW_AUTH_80211_AUTH_ALG, | ||||||
|  |  					     algs); | ||||||
|  |  	drv->auth_alg_fallback = res == -2; | ||||||
|  | +if (res == -2)
 | ||||||
|  | +wpa_printf(MSG_DEBUG, "%s: falling back to ENCODE for AUTH", __FUNCTION__);
 | ||||||
|  |  	return res; | ||||||
|  |  } | ||||||
|  |   | ||||||
| @ -2,7 +2,7 @@ Summary: WPA/WPA2/IEEE 802.1X Supplicant | |||||||
| Name: wpa_supplicant | Name: wpa_supplicant | ||||||
| Epoch: 1 | Epoch: 1 | ||||||
| Version: 0.4.8 | Version: 0.4.8 | ||||||
| Release: 4 | Release: 5 | ||||||
| License: GPL | License: GPL | ||||||
| Group: System Environment/Base | Group: System Environment/Base | ||||||
| Source0: http://hostap.epitest.fi/releases/%{name}-%{version}.tar.gz | Source0: http://hostap.epitest.fi/releases/%{name}-%{version}.tar.gz | ||||||
| @ -14,6 +14,8 @@ Source5: madwifi-headers.tar.bz2 | |||||||
| Patch0: wpa_supplicant-auth-fallback-v4.patch | Patch0: wpa_supplicant-auth-fallback-v4.patch | ||||||
| Patch1: wpa_supplicant-ctrl-iface-ap-scan.patch | Patch1: wpa_supplicant-ctrl-iface-ap-scan.patch | ||||||
| Patch2: wpa_supplicant-ctrl-iface-hide-keys.patch | Patch2: wpa_supplicant-ctrl-iface-hide-keys.patch | ||||||
|  | Patch3: wpa_supplicant-assoc-timeout.patch | ||||||
|  | Patch4: wpa_supplicant-driver-wext-debug.patch | ||||||
| URL: http://hostap.epitest.fi/wpa_supplicant/ | URL: http://hostap.epitest.fi/wpa_supplicant/ | ||||||
| BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) | BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) | ||||||
| 
 | 
 | ||||||
| @ -42,6 +44,8 @@ Graphical User Interface for wpa_supplicant written using QT3 | |||||||
| %patch0 -p0 -b .we-auth-fallback | %patch0 -p0 -b .we-auth-fallback | ||||||
| %patch1 -p1 -b .ap-scan | %patch1 -p1 -b .ap-scan | ||||||
| %patch2 -p1 -b .ctrl-iface-hide-keys | %patch2 -p1 -b .ctrl-iface-hide-keys | ||||||
|  | %patch3 -p1 -b .assoc-timeout | ||||||
|  | %patch4 -p1 -b .driver-wext-debug | ||||||
| 
 | 
 | ||||||
| %build | %build | ||||||
| cp %{SOURCE1} ./.config | cp %{SOURCE1} ./.config | ||||||
| @ -119,6 +123,10 @@ fi | |||||||
| %{_bindir}/wpa_gui | %{_bindir}/wpa_gui | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Fri Mar  3 2006 Dan Williams <dcbw@redhat.com> - 0.4.8-5 | ||||||
|  | - Increase association timeout, mainly for drivers that don't | ||||||
|  | 	fully support WPA ioctls yet | ||||||
|  | 
 | ||||||
| * Fri Mar  3 2006 Dan Williams <dcbw@redhat.com> - 0.4.8-4 | * Fri Mar  3 2006 Dan Williams <dcbw@redhat.com> - 0.4.8-4 | ||||||
| - Add additional BuildRequires #rh181914# | - Add additional BuildRequires #rh181914# | ||||||
| - Add prereq on chkconfig #rh182905# #rh182906# | - Add prereq on chkconfig #rh182905# #rh182906# | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user