From 99ab6e575af01846e0043db5d1dd1dc19e9ae803 Mon Sep 17 00:00:00 2001 From: Felix Fietkau Date: Fri, 3 Feb 2012 10:23:51 +0000 Subject: [PATCH] ath9k: fix WEP connection issues SVN-Revision: 30009 --- .../mac80211/patches/568-ath9k_fix_wep.patch | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 package/mac80211/patches/568-ath9k_fix_wep.patch diff --git a/package/mac80211/patches/568-ath9k_fix_wep.patch b/package/mac80211/patches/568-ath9k_fix_wep.patch new file mode 100644 index 00000000000..f18553f747e --- /dev/null +++ b/package/mac80211/patches/568-ath9k_fix_wep.patch @@ -0,0 +1,17 @@ +--- a/drivers/net/wireless/ath/ath9k/recv.c ++++ b/drivers/net/wireless/ath/ath9k/recv.c +@@ -823,6 +823,14 @@ static bool ath9k_rx_accept(struct ath_c + (ATH9K_RXERR_DECRYPT | ATH9K_RXERR_CRC | ATH9K_RXERR_MIC | + ATH9K_RXERR_KEYMISS)); + ++ /* ++ * Key miss events are only relevant for pairwise keys where the ++ * descriptor does contain a valid key index. This has been observed ++ * mostly with CCMP encryption. ++ */ ++ if (rx_stats->rs_keyix == ATH9K_RXKEYIX_INVALID) ++ rx_stats->rs_status &= ~ATH9K_RXERR_KEYMISS; ++ + if (!rx_stats->rs_datalen) + return false; + /* -- 2.30.2