wpa_supplicant has been upgraded and previous version
0.6.3 doesn't exist anymore. This patch sets the version and
appropriate md5sum; it also updates all the patches. Note
that patch 130 has been deleted since it seems to be already
included in 0.6.6
Signed-off-by: Jose Vasconcellos <[EMAIL PROTECTED]>
Index: package/wpa_supplicant/patches/130-scanning.patch
===================================================================
--- package/wpa_supplicant/patches/130-scanning.patch (revision 13468)
+++ package/wpa_supplicant/patches/130-scanning.patch (working copy)
@@ -1,159 +0,0 @@
-Add a scan result cache to improve roaming speed if the driver gave us a background scan before losing the connection.
-
---- a/wpa_supplicant/config.h
-+++ b/wpa_supplicant/config.h
-@@ -97,6 +97,12 @@
- int ap_scan;
-
- /**
-+ * scan_cache - controls the time in seconds after the last scan results
-+ * before a new scan may be initiated
-+ */
-+ int scan_cache;
-+
-+ /**
- * ctrl_interface - Parameters for the control interface
- *
- * If this is specified, %wpa_supplicant will open a control interface
---- a/wpa_supplicant/config_file.c
-+++ b/wpa_supplicant/config_file.c
-@@ -312,6 +312,13 @@
- return 0;
- }
-
-+static int wpa_config_process_scan_cache(struct wpa_config *config, char *pos)
-+{
-+ config->scan_cache = atoi(pos);
-+ wpa_printf(MSG_DEBUG, "scan_cache=%d", config->scan_cache);
-+ return 0;
-+}
-+
-
- static int wpa_config_process_fast_reauth(struct wpa_config *config, char *pos)
- {
-@@ -445,6 +452,9 @@
- if (os_strncmp(pos, "ap_scan=", 8) == 0)
- return wpa_config_process_ap_scan(config, pos + 8);
-
-+ if (os_strncmp(pos, "scan_cache=", 11) == 0)
-+ return wpa_config_process_scan_cache(config, pos + 11);
-+
- if (os_strncmp(pos, "fast_reauth=", 12) == 0)
- return wpa_config_process_fast_reauth(config, pos + 12);
-
-@@ -810,6 +820,8 @@
- fprintf(f, "eapol_version=%d\n", config->eapol_version);
- if (config->ap_scan != DEFAULT_AP_SCAN)
- fprintf(f, "ap_scan=%d\n", config->ap_scan);
-+ if (config->scan_cache != 0)
-+ fprintf(f, "scan_cache=%d\n", config->scan_cache);
- if (config->fast_reauth != DEFAULT_FAST_REAUTH)
- fprintf(f, "fast_reauth=%d\n", config->fast_reauth);
- #ifdef EAP_TLS_OPENSSL
---- a/wpa_supplicant/events.c
-+++ b/wpa_supplicant/events.c
-@@ -555,6 +555,9 @@
- if (wpa_s->conf->ap_scan == 2 || wpa_s->disconnected)
- return;
-
-+ if (wpa_s->wpa_state > WPA_ASSOCIATED)
-+ goto done;
-+
- while (selected == NULL) {
- for (prio = 0; prio < wpa_s->conf->num_prio; prio++) {
- selected = wpa_supplicant_select_bss(
-@@ -567,6 +570,7 @@
- wpa_printf(MSG_DEBUG, "No APs found - clear blacklist "
- "and try again");
- wpa_blacklist_clear(wpa_s);
-+ memset(&wpa_s->last_scan_results, 0, sizeof(wpa_s->last_scan_results));
- } else if (selected == NULL) {
- break;
- }
-@@ -594,10 +598,12 @@
- rsn_preauth_scan_results(wpa_s->wpa, wpa_s->scan_res);
- } else {
- wpa_printf(MSG_DEBUG, "No suitable AP found.");
-- timeout = 5;
-+ timeout = 0;
- goto req_scan;
- }
-
-+done:
-+ os_get_time(&wpa_s->last_scan_results);
- return;
-
- req_scan:
-@@ -804,6 +810,9 @@
- }
- if (wpa_s->wpa_state >= WPA_ASSOCIATED)
- wpa_supplicant_req_scan(wpa_s, 0, 100000);
-+ else if (wpa_s->wpa_state == WPA_ASSOCIATING)
-+ wpa_supplicant_req_auth_timeout(wpa_s, 0, 100000);
-+
- bssid = wpa_s->bssid;
- if (os_memcmp(bssid, "\x00\x00\x00\x00\x00\x00", ETH_ALEN) == 0)
- bssid = wpa_s->pending_bssid;
---- a/wpa_supplicant/wpa_supplicant_i.h
-+++ b/wpa_supplicant/wpa_supplicant_i.h
-@@ -334,6 +334,7 @@
- struct wpa_client_mlme mlme;
- int use_client_mlme;
- int driver_4way_handshake;
-+ struct os_time last_scan_results;
- };
-
-
-@@ -381,6 +382,7 @@
-
- /* scan.c */
- void wpa_supplicant_req_scan(struct wpa_supplicant *wpa_s, int sec, int usec);
-+int wpa_supplicant_may_scan(struct wpa_supplicant *wpa_s);
- void wpa_supplicant_cancel_scan(struct wpa_supplicant *wpa_s);
-
- /* events.c */
---- a/wpa_supplicant/scan.c
-+++ b/wpa_supplicant/scan.c
-@@ -40,6 +40,18 @@
- wpa_supplicant_event(wpa_s, EVENT_ASSOC, &data);
- }
-
-+int wpa_supplicant_may_scan(struct wpa_supplicant *wpa_s)
-+{
-+ struct os_time time;
-+
-+ if (wpa_s->conf->scan_cache > 0) {
-+ os_get_time(&time);
-+ time.sec -= wpa_s->conf->scan_cache;
-+ if (os_time_before(&time, &wpa_s->last_scan_results))
-+ return 0;
-+ }
-+ return 1;
-+}
-
- static void wpa_supplicant_scan(void *eloop_ctx, void *timeout_ctx)
- {
-@@ -150,8 +162,9 @@
- } else
- wpa_s->prev_scan_ssid = BROADCAST_SSID_SCAN;
-
-- if (wpa_s->scan_res_tried == 0 && wpa_s->conf->ap_scan == 1 &&
-- !wpa_s->use_client_mlme) {
-+ if (!wpa_supplicant_may_scan(wpa_s) ||
-+ (wpa_s->scan_res_tried == 0 && wpa_s->conf->ap_scan == 1 &&
-+ !wpa_s->use_client_mlme)) {
- wpa_s->scan_res_tried++;
- wpa_printf(MSG_DEBUG, "Trying to get current scan results "
- "first without requesting a new scan to speed up "
---- a/wpa_supplicant/wpa_supplicant.c
-+++ b/wpa_supplicant/wpa_supplicant.c
-@@ -1417,6 +1417,9 @@
- {
- struct wpa_supplicant *wpa_s = ctx;
-
-+ if (wpa_s->wpa_state < WPA_ASSOCIATING)
-+ return;
-+
- wpa_printf(MSG_DEBUG, "RX EAPOL from " MACSTR, MAC2STR(src_addr));
- wpa_hexdump(MSG_MSGDUMP, "RX EAPOL", buf, len);
-
Index: package/wpa_supplicant/patches/140-quality.patch
===================================================================
--- package/wpa_supplicant/patches/140-quality.patch (revision 13468)
+++ package/wpa_supplicant/patches/140-quality.patch (working copy)
@@ -1,8 +1,8 @@
-Index: wpa_supplicant-0.6.3/wpa_supplicant/wpa_supplicant.c
+Index: wpa_supplicant-0.6.6/wpa_supplicant/wpa_supplicant.c
===================================================================
---- wpa_supplicant-0.6.3.orig/wpa_supplicant/wpa_supplicant.c 2008-07-24 16:28:58.000000000 +0200
-+++ wpa_supplicant-0.6.3/wpa_supplicant/wpa_supplicant.c 2008-07-24 16:47:40.000000000 +0200
-@@ -1182,7 +1182,7 @@
+--- wpa_supplicant-0.6.6.orig/wpa_supplicant/wpa_supplicant.c 2008-07-24 16:28:58.000000000 +0200
++++ wpa_supplicant-0.6.6/wpa_supplicant/wpa_supplicant.c 2008-07-24 16:47:40.000000000 +0200
+@@ -1206,7 +1206,7 @@
{
#define SCAN_AP_LIMIT 128
struct wpa_scan_result *results;
@@ -11,7 +11,7 @@
struct wpa_scan_results *res;
results = os_malloc(SCAN_AP_LIMIT * sizeof(struct wpa_scan_result));
-@@ -1279,6 +1279,21 @@
+@@ -1303,6 +1303,21 @@
res->res[res->num++] = r;
}
Index: package/wpa_supplicant/patches/110-roaming.patch
===================================================================
--- package/wpa_supplicant/patches/110-roaming.patch (revision 13468)
+++ package/wpa_supplicant/patches/110-roaming.patch (working copy)
@@ -1,9 +1,9 @@
This patch decreases the timeouts for assoc/auth to more realistic values. Improves roaming speed
-Index: wpa_supplicant-0.6.3/wpa_supplicant/events.c
+Index: wpa_supplicant-0.6.6/wpa_supplicant/events.c
===================================================================
---- wpa_supplicant-0.6.3.orig/wpa_supplicant/events.c 2008-02-23 03:45:24.000000000 +0100
-+++ wpa_supplicant-0.6.3/wpa_supplicant/events.c 2008-07-09 15:13:37.000000000 +0200
-@@ -762,7 +762,7 @@
+--- wpa_supplicant-0.6.6.orig/wpa_supplicant/events.c 2008-02-23 03:45:24.000000000 +0100
++++ wpa_supplicant-0.6.6/wpa_supplicant/events.c 2008-07-09 15:13:37.000000000 +0200
+@@ -807,7 +807,7 @@
wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
} else if (!ft_completed) {
/* Timeout for receiving the first EAPOL packet */
@@ -12,11 +12,11 @@
}
wpa_supplicant_cancel_scan(wpa_s);
-Index: wpa_supplicant-0.6.3/wpa_supplicant/scan.c
+Index: wpa_supplicant-0.6.6/wpa_supplicant/scan.c
===================================================================
---- wpa_supplicant-0.6.3.orig/wpa_supplicant/scan.c 2008-02-23 03:45:24.000000000 +0100
-+++ wpa_supplicant-0.6.3/wpa_supplicant/scan.c 2008-07-09 15:13:37.000000000 +0200
-@@ -144,6 +144,7 @@
+--- wpa_supplicant-0.6.6.orig/wpa_supplicant/scan.c 2008-02-23 03:45:24.000000000 +0100
++++ wpa_supplicant-0.6.6/wpa_supplicant/scan.c 2008-07-09 15:13:37.000000000 +0200
+@@ -145,6 +145,7 @@
return;
}
@@ -24,7 +24,7 @@
if (wpa_s->use_client_mlme) {
ieee80211_sta_set_probe_req_ie(wpa_s, extra_ie, extra_ie_len);
ret = ieee80211_sta_req_scan(wpa_s, ssid ? ssid->ssid : NULL,
-@@ -156,7 +157,7 @@
+@@ -157,7 +158,7 @@
if (ret) {
wpa_printf(MSG_WARNING, "Failed to initiate AP scan.");
@@ -33,19 +33,20 @@
}
}
-Index: wpa_supplicant-0.6.3/wpa_supplicant/wpa_supplicant.c
+Index: wpa_supplicant-0.6.6/wpa_supplicant/wpa_supplicant.c
===================================================================
---- wpa_supplicant-0.6.3.orig/wpa_supplicant/wpa_supplicant.c 2008-02-23 03:45:24.000000000 +0100
-+++ wpa_supplicant-0.6.3/wpa_supplicant/wpa_supplicant.c 2008-07-09 15:13:37.000000000 +0200
-@@ -1092,9 +1092,9 @@
- /* Timeout for IEEE 802.11 authentication and association */
- int timeout;
- if (assoc_failed)
-- timeout = 5;
-+ timeout = 2;
- else if (wpa_s->conf->ap_scan == 1)
-- timeout = 10;
-+ timeout = 3;
- else
- timeout = 60;
+--- wpa_supplicant-0.6.6/wpa_supplicant/wpa_supplicant.c-old 2008-09-20 22:37:09.000000000 -0400
++++ wpa_supplicant-0.6.6/wpa_supplicant/wpa_supplicant.c 2008-09-20 22:37:43.000000000 -0400
+@@ -1118,10 +1118,10 @@
+
+ if (assoc_failed) {
+ /* give IBSS a bit more time */
+- timeout = ssid->mode ? 10 : 5;
++ timeout = ssid->mode ? 5 : 2;
+ } else if (wpa_s->conf->ap_scan == 1) {
+ /* give IBSS a bit more time */
+- timeout = ssid->mode ? 20 : 10;
++ timeout = ssid->mode ? 7 : 3;
+ }
wpa_supplicant_req_auth_timeout(wpa_s, timeout, 0);
+ }
Index: package/wpa_supplicant/patches/100-timestamp_check.patch
===================================================================
--- package/wpa_supplicant/patches/100-timestamp_check.patch (revision 13468)
+++ package/wpa_supplicant/patches/100-timestamp_check.patch (working copy)
@@ -1,8 +1,8 @@
-Index: wpa_supplicant-0.6.3/src/tls/x509v3.c
+Index: wpa_supplicant-0.6.6/src/tls/x509v3.c
===================================================================
---- wpa_supplicant-0.6.3.orig/src/tls/x509v3.c 2008-02-23 03:45:24.000000000 +0100
-+++ wpa_supplicant-0.6.3/src/tls/x509v3.c 2008-07-09 12:47:19.000000000 +0200
-@@ -1551,8 +1551,11 @@
+--- wpa_supplicant-0.6.6.orig/src/tls/x509v3.c 2008-02-23 03:45:24.000000000 +0100
++++ wpa_supplicant-0.6.6/src/tls/x509v3.c 2008-07-09 12:47:19.000000000 +0200
+@@ -1591,8 +1591,11 @@
if (chain_trusted)
continue;
Index: package/wpa_supplicant/Makefile
===================================================================
--- package/wpa_supplicant/Makefile (revision 13468)
+++ package/wpa_supplicant/Makefile (working copy)
@@ -9,14 +9,14 @@
include $(TOPDIR)/rules.mk
PKG_NAME:=wpa_supplicant
-PKG_VERSION:=0.6.3
+PKG_VERSION:=0.6.6
PKG_RELEASE:=1
-PKG_MD5SUM:=b51b2975f21006f85f7297f3fb1acde1
+PKG_MD5SUM:=cd0b386bdf4b0b3b01516e36cb6977d1
PKG_SOURCE_URL:=http://hostap.epitest.fi/releases
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_BUILD_DEPENDS:=madwifi
+#PKG_BUILD_DEPENDS:=madwifi
include $(INCLUDE_DIR)/package.mk
STAMP_CONFIGURED:=$(STAMP_CONFIGURED)_$(call confvar,CONFIG_PACKAGE_kmod-madwifi CONFIG_WPA_SUPPLICANT_NO_TIMESTAMP_CHECK)
_______________________________________________
openwrt-devel mailing list
[email protected]
http://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel