hostapd/src/l2_packet
Sergey Matyukevich 3626e72c8d l2_packet: Fix bridge workaround for repeater configuration
In repeater configuration, both AP and STA wireless interfaces may be
included into the same bridge. In this case the following race condition
may occur: wpa_supplicant and hostapd are started, then hostapd clients
are connected before wpa_supplicant connects to remote AP. EAPOL packets
between hostapd and its clients are detected by wpa_supplicant on bridge
interface, prematurely disabling the workaround.

One possible option to fix this issue is to check EAPOL destination MAC
in wpa_supplicant and disable workaround only if EAPOL packet on bridge
interface is indeed intended for wpa_supplicant.

Signed-off-by: Sergey Matyukevich <sergey.matyukevich.os@quantenna.com>
2019-12-24 21:16:23 +02:00
..
l2_packet.h wpa_supplicant: Don't reply to EAPOL if pkt_type is PACKET_OTHERHOST 2018-04-02 12:21:27 +03:00
l2_packet_freebsd.c Work around Linux packet socket regression 2015-01-31 17:21:58 +02:00
l2_packet_linux.c l2_packet: Fix bridge workaround for repeater configuration 2019-12-24 21:16:23 +02:00
l2_packet_ndis.c Work around Linux packet socket regression 2015-01-31 17:21:58 +02:00
l2_packet_none.c Work around Linux packet socket regression 2015-01-31 17:21:58 +02:00
l2_packet_pcap.c Fix wpa_supplicant build with CONFIG_L2_PACKET=pcap 2016-01-01 16:50:24 +02:00
l2_packet_privsep.c Remove trailing whitespace 2016-12-28 14:31:42 +02:00
l2_packet_winpcap.c Work around Linux packet socket regression 2015-01-31 17:21:58 +02:00
Makefile tests: Add eapol-fuzzer 2015-04-22 11:44:19 +03:00