From eeb5a81942a373bf8a48eeef4324f9abacc2b12c Mon Sep 17 00:00:00 2001
From: Mathy <mathy.vanhoef@nyu.edu>
Date: Mon, 8 Jun 2020 07:37:28 -0400
Subject: [PATCH] fragattacks: ignore entropy in AP operations

---
 src/crypto/random.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/crypto/random.c b/src/crypto/random.c
index 1cabf3f4b..9e5c7da77 100644
--- a/src/crypto/random.c
+++ b/src/crypto/random.c
@@ -296,9 +296,9 @@ int random_pool_ready(void)
 		return 1;
 	}
 
-	wpa_printf(MSG_INFO, "random: Not enough entropy pool available for "
-		   "secure operations");
-	return 0;
+	//wpa_printf(MSG_INFO, "random: Not enough entropy pool available for "
+	//	   "secure operations");
+	return 1;
 #else /* __linux__ */
 	/* TODO: could do similar checks on non-Linux platforms */
 	return 1;