diff options
author | 2020-06-01 08:51:13 +0000 | |
---|---|---|
committer | 2020-06-01 08:51:13 +0000 | |
commit | 235b1081ef99fbfa585a9ae33b98a8ec3a6ad78f (patch) | |
tree | d0c9bb70a124aa902a9f9053552937b91406cf74 | |
parent | Enable test-dhe-rsa-key-exchange-with-bad-messages.py (diff) | |
download | wireguard-openbsd-235b1081ef99fbfa585a9ae33b98a8ec3a6ad78f.tar.xz wireguard-openbsd-235b1081ef99fbfa585a9ae33b98a8ec3a6ad78f.zip |
Revert "Ignore new Rxblock ack agreements until the WPA handshake is done."
There are access points out there which insist on establishing a block ack
agreement with the client before the WPA handshake can complete. This is sad,
but we cannot operate against such APs if we require the handshake to complete
first.
This reverts CVS commit 4wXCjWU3qNtIX7gW.
Problem reported and fix tested by Brandon Sahlin on bugs@
-rw-r--r-- | sys/net80211/ieee80211_input.c | 7 |
1 files changed, 1 insertions, 6 deletions
diff --git a/sys/net80211/ieee80211_input.c b/sys/net80211/ieee80211_input.c index 52a3fd03eaf..098aa9bce19 100644 --- a/sys/net80211/ieee80211_input.c +++ b/sys/net80211/ieee80211_input.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ieee80211_input.c,v 1.217 2020/05/26 11:45:32 stsp Exp $ */ +/* $OpenBSD: ieee80211_input.c,v 1.218 2020/06/01 08:51:13 stsp Exp $ */ /*- * Copyright (c) 2001 Atsushi Onoe @@ -2657,11 +2657,6 @@ ieee80211_recv_addba_req(struct ieee80211com *ic, struct mbuf *m, DPRINTF(("frame too short\n")); return; } - - /* No point in starting block-ack before the WPA handshake is done. */ - if ((ic->ic_flags & IEEE80211_F_RSNON) && !ni->ni_port_valid) - return; - /* MLME-ADDBA.indication */ wh = mtod(m, struct ieee80211_frame *); frm = (const u_int8_t *)&wh[1]; |