summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorstsp <stsp@openbsd.org>2020-06-01 08:51:13 +0000
committerstsp <stsp@openbsd.org>2020-06-01 08:51:13 +0000
commit235b1081ef99fbfa585a9ae33b98a8ec3a6ad78f (patch)
treed0c9bb70a124aa902a9f9053552937b91406cf74
parentEnable test-dhe-rsa-key-exchange-with-bad-messages.py (diff)
downloadwireguard-openbsd-235b1081ef99fbfa585a9ae33b98a8ec3a6ad78f.tar.xz
wireguard-openbsd-235b1081ef99fbfa585a9ae33b98a8ec3a6ad78f.zip
Revert "Ignore new Rxblock ack agreements until the WPA handshake is done."
There are access points out there which insist on establishing a block ack agreement with the client before the WPA handshake can complete. This is sad, but we cannot operate against such APs if we require the handshake to complete first. This reverts CVS commit 4wXCjWU3qNtIX7gW. Problem reported and fix tested by Brandon Sahlin on bugs@
-rw-r--r--sys/net80211/ieee80211_input.c7
1 files changed, 1 insertions, 6 deletions
diff --git a/sys/net80211/ieee80211_input.c b/sys/net80211/ieee80211_input.c
index 52a3fd03eaf..098aa9bce19 100644
--- a/sys/net80211/ieee80211_input.c
+++ b/sys/net80211/ieee80211_input.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ieee80211_input.c,v 1.217 2020/05/26 11:45:32 stsp Exp $ */
+/* $OpenBSD: ieee80211_input.c,v 1.218 2020/06/01 08:51:13 stsp Exp $ */
/*-
* Copyright (c) 2001 Atsushi Onoe
@@ -2657,11 +2657,6 @@ ieee80211_recv_addba_req(struct ieee80211com *ic, struct mbuf *m,
DPRINTF(("frame too short\n"));
return;
}
-
- /* No point in starting block-ack before the WPA handshake is done. */
- if ((ic->ic_flags & IEEE80211_F_RSNON) && !ni->ni_port_valid)
- return;
-
/* MLME-ADDBA.indication */
wh = mtod(m, struct ieee80211_frame *);
frm = (const u_int8_t *)&wh[1];