madwifi update: include upstream fixes for ff handling, disable ff by default (not reliable enough), wpa in ap mode should be working now
SVN-Revision: 7440master
parent
e19eb3d828
commit
47ecff5cf8
@ -1,11 +0,0 @@ |
||||
diff -ur madwifi.old/net80211/ieee80211_input.c madwifi.dev/net80211/ieee80211_input.c
|
||||
--- madwifi.old/net80211/ieee80211_input.c 2007-06-01 16:44:25.174897520 +0200
|
||||
+++ madwifi.dev/net80211/ieee80211_input.c 2007-06-01 17:43:52.153634328 +0200
|
||||
@@ -685,6 +685,7 @@
|
||||
IEEE80211_NODE_STAT(ni, rx_decap);
|
||||
goto err;
|
||||
}
|
||||
+ skb1 = skb_clone(skb, GFP_ATOMIC);
|
||||
|
||||
/* get to the tunneled headers */
|
||||
ath_hdr = (struct athl2p_tunnel_hdr *)
|
@ -0,0 +1,13 @@ |
||||
diff -ur madwifi.old/net80211/ieee80211_linux.c madwifi.dev/net80211/ieee80211_linux.c
|
||||
--- madwifi.old/net80211/ieee80211_linux.c 2007-05-30 03:41:18.000000000 +0200
|
||||
+++ madwifi.dev/net80211/ieee80211_linux.c 2007-06-02 01:43:40.818092096 +0200
|
||||
@@ -285,6 +285,9 @@
|
||||
k->wk_cipher->ic_name, k->wk_keyix,
|
||||
(unsigned long long)rsc );
|
||||
|
||||
+ /* disabled for now due to bogus events for unknown reasons */
|
||||
+ return;
|
||||
+
|
||||
/* TODO: needed parameters: count, keyid, key type, src address, TSC */
|
||||
snprintf(buf, sizeof(buf), "%s(keyid=%d %scast addr=%s)", tag,
|
||||
k->wk_keyix,
|
Loading…
Reference in new issue