ath9k: fix a dynamic WEP related regression
authorFelix Fietkau <nbd@openwrt.org>
Sat, 23 Jun 2012 17:30:45 +0000 (17:30 +0000)
committerFelix Fietkau <nbd@openwrt.org>
Sat, 23 Jun 2012 17:30:45 +0000 (17:30 +0000)
SVN-Revision: 32492

package/mac80211/patches/300-pending_work.patch
package/mac80211/patches/400-ath_move_debug_code.patch
package/mac80211/patches/522-ath9k_per_chain_signal_strength.patch

index 3f45286e9d74ae9b51620c7e57d5639982e9a7f4..6062e9da2646d2a61999b615b94c94579536c209 100644 (file)
        cal_interval = ATH_LONG_CALINTERVAL;
        if (sc->sc_ah->config.enable_ani)
                cal_interval = min(cal_interval,
+--- a/drivers/net/wireless/ath/ath.h
++++ b/drivers/net/wireless/ath/ath.h
+@@ -143,6 +143,7 @@ struct ath_common {
+       u32 keymax;
+       DECLARE_BITMAP(keymap, ATH_KEYMAX);
+       DECLARE_BITMAP(tkip_keymap, ATH_KEYMAX);
++      DECLARE_BITMAP(ccmp_keymap, ATH_KEYMAX);
+       enum ath_crypt_caps crypt_caps;
+       unsigned int clockrate;
+--- a/drivers/net/wireless/ath/ath9k/recv.c
++++ b/drivers/net/wireless/ath/ath9k/recv.c
+@@ -785,7 +785,8 @@ static bool ath9k_rx_accept(struct ath_c
+        * descriptor does contain a valid key index. This has been observed
+        * mostly with CCMP encryption.
+        */
+-      if (rx_stats->rs_keyix == ATH9K_RXKEYIX_INVALID)
++      if (rx_stats->rs_keyix == ATH9K_RXKEYIX_INVALID ||
++          !test_bit(rx_stats->rs_keyix, common->ccmp_keymap))
+               rx_stats->rs_status &= ~ATH9K_RXERR_KEYMISS;
+       if (!rx_stats->rs_datalen) {
+--- a/drivers/net/wireless/ath/key.c
++++ b/drivers/net/wireless/ath/key.c
+@@ -556,6 +556,9 @@ int ath_key_config(struct ath_common *co
+               return -EIO;
+       set_bit(idx, common->keymap);
++      if (key->cipher == WLAN_CIPHER_SUITE_CCMP)
++              set_bit(idx, common->ccmp_keymap);
++
+       if (key->cipher == WLAN_CIPHER_SUITE_TKIP) {
+               set_bit(idx + 64, common->keymap);
+               set_bit(idx, common->tkip_keymap);
+@@ -582,6 +585,7 @@ void ath_key_delete(struct ath_common *c
+               return;
+       clear_bit(key->hw_key_idx, common->keymap);
++      clear_bit(key->hw_key_idx, common->ccmp_keymap);
+       if (key->cipher != WLAN_CIPHER_SUITE_TKIP)
+               return;
index 1714e9aafe786a3ff2f1802ddfe7e07dd33cc0fd..944a485fb71f18da4ac8a1f5bc072615f2280633 100644 (file)
@@ -12,7 +12,7 @@
  ccflags-y += -D__CHECK_ENDIAN__
 --- a/drivers/net/wireless/ath/ath.h
 +++ b/drivers/net/wireless/ath/ath.h
-@@ -277,13 +277,6 @@ void _ath_dbg(struct ath_common *common,
+@@ -278,13 +278,6 @@ void _ath_dbg(struct ath_common *common,
  #endif /* CONFIG_ATH_DEBUG */
  
  /** Returns string describing opmode, or NULL if unknown mode. */
index ba1f9f0534c53b301706d5206c6e9abb0f39a46c..671ae7ae6fe103302964f91bdd6bf034ea0b849e 100644 (file)
        u8 rs_num_delims;
 --- a/drivers/net/wireless/ath/ath9k/recv.c
 +++ b/drivers/net/wireless/ath/ath9k/recv.c
-@@ -951,6 +951,7 @@ static int ath9k_rx_skb_preprocess(struc
+@@ -952,6 +952,7 @@ static int ath9k_rx_skb_preprocess(struc
                                   bool *decrypt_error)
  {
        struct ath_hw *ah = common->ah;
  
        /*
         * everything but the rate is checked here, the rate check is done
-@@ -976,6 +977,20 @@ static int ath9k_rx_skb_preprocess(struc
+@@ -977,6 +978,20 @@ static int ath9k_rx_skb_preprocess(struc
        if (rx_stats->rs_moreaggr)
                rx_status->flag |= RX_FLAG_NO_SIGNAL_VAL;