mirror of
https://github.com/aircrack-ng/rtl8812au.git
synced 2024-11-22 21:34:37 +00:00
1b86121806
The sequence number of inject frames was being overwritten. This prevents certain older attacks against WEP fragmentation older TKIP attacks. Fix this by tracking if a frames was injected in monitor mode, and if so, do not overwrite its sequence number. The patch also adds a module parameter to revert this behaviour if needed. By setting rtw_monitor_overwrite_seqnum to 1, sequence numbers will again be set by the driver/device. This may by useful if user-space relied on the driver/device to set sequence numbers. This patch was tested using an Alfa AWUS036ACH. |
||
---|---|---|
.. | ||
custom_gpio_linux.c | ||
ioctl_cfg80211.c | ||
ioctl_cfg80211.h | ||
ioctl_linux.c | ||
ioctl_mp.c | ||
mlme_linux.c | ||
os_intfs.c | ||
recv_linux.c | ||
rhashtable.c | ||
rhashtable.h | ||
rtw_android.c | ||
rtw_proc.c | ||
rtw_proc.h | ||
rtw_rhashtable.c | ||
rtw_rhashtable.h | ||
usb_intf.c | ||
usb_ops_linux.c | ||
wifi_regd.c | ||
xmit_linux.c |