Currently background scanning with wpa_supplicant does not work very
well because rtl8812au does not notify it about changes to RSSI. To
fix this:
* Implement the cfg80211_ops::set_cqm_rssi_config operation to set the
parameters for RSSI notifications.
* Add a rtw_cfg80211_cqm_rssi_update() function that calls
cfg80211_cqm_rssi_notify() if the RSSI has changed significantly
(based on those parameters).
* When connected in infrastructure mode, call
rtw_cfg80211_cqm_rssi_update() after processing a beacon and
updating the RSSI.
Signed-off-by: Ben Hutchings <ben.hutchings@mind.be>
Remove IPX support from driver, set as obsolete in Jan 2018.
IPX is not supported by the linux kernel since v5.15-rc1 see commit 6c9b40844751ea30c72f7a2f92f4d704bc6b2927
The reliability of some attacks is increased by letting the device
retransmit injected frames. Since it may not always be desired to
retransmit injected frames, add a module parameter to enable it
manually.
This was tested with an Alfa AWUS036ACH. Even when using a spoofed
sender MAC address, the retransmission behaviour is as expected.
That is, when an ACK frame towards the spoofed MAC address is received,
the retransmission will stop.
The sequence number of inject frames was being overwritten. This prevents
certain older attacks against WEP fragmentation older TKIP attacks. Fix
this by tracking if a frames was injected in monitor mode, and if so, do
not overwrite its sequence number.
The patch also adds a module parameter to revert this behaviour if needed.
By setting rtw_monitor_overwrite_seqnum to 1, sequence numbers will again
be set by the driver/device. This may by useful if user-space relied on
the driver/device to set sequence numbers.
This patch was tested using an Alfa AWUS036ACH.
This commit is cherry-pick + refactoring of:
ff04a94b00
and
313311c14b
I'm not sure how this got lost in the latest version on GitHub (I guess merging issues).
But all credits go to @gordboy, @kimocoder and all the other authors.