mirror of
https://github.com/chinawrj/rtl8812au
synced 2024-11-15 02:16:08 +00:00
849bbf0698
The reliability of some attacks is increased by letting the device retransmit injected frames. Since it may not always be desired to retransmit injected frames, add a module parameter to enable it manually. This was tested with an Alfa AWUS036ACH. Even when using a spoofed sender MAC address, the retransmission behaviour is as expected. That is, when an ACK frame towards the spoofed MAC address is received, the retransmission will stop. |
||
---|---|---|
.. | ||
custom_gpio_linux.c | ||
ioctl_cfg80211.c | ||
ioctl_cfg80211.h | ||
ioctl_linux.c | ||
ioctl_mp.c | ||
mlme_linux.c | ||
os_intfs.c | ||
recv_linux.c | ||
rhashtable.c | ||
rhashtable.h | ||
rtw_android.c | ||
rtw_proc.c | ||
rtw_proc.h | ||
rtw_rhashtable.c | ||
rtw_rhashtable.h | ||
usb_intf.c | ||
usb_ops_linux.c | ||
wifi_regd.c | ||
xmit_linux.c |