From eeb5a81942a373bf8a48eeef4324f9abacc2b12c Mon Sep 17 00:00:00 2001 From: Mathy <mathy.vanhoef@nyu.edu> Date: Mon, 8 Jun 2020 07:37:28 -0400 Subject: [PATCH] fragattacks: ignore entropy in AP operations --- src/crypto/random.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/crypto/random.c b/src/crypto/random.c index 1cabf3f4b..9e5c7da77 100644 --- a/src/crypto/random.c +++ b/src/crypto/random.c @@ -296,9 +296,9 @@ int random_pool_ready(void) return 1; } - wpa_printf(MSG_INFO, "random: Not enough entropy pool available for " - "secure operations"); - return 0; + //wpa_printf(MSG_INFO, "random: Not enough entropy pool available for " + // "secure operations"); + return 1; #else /* __linux__ */ /* TODO: could do similar checks on non-Linux platforms */ return 1;