diff options
author | Michal Kazior <michal.kazior@tieto.com> | 2013-06-26 10:57:24 +0400 |
---|---|---|
committer | John W. Linville <linville@tuxdriver.com> | 2013-06-27 21:42:15 +0400 |
commit | d847e3e2e4d9d0c2902122a474d7fe62e08d6309 (patch) | |
tree | 098bb11b88ceb0bdc7f5f6143b95c2a6f44364ba | |
parent | 429ff56a4ad5d9568a319f9368cc06c9f4f571af (diff) | |
download | linux-d847e3e2e4d9d0c2902122a474d7fe62e08d6309.tar.xz |
ath10k: leave MMIC generation to the HW
Apparently HW doesn't require us to generate MMIC
for TKIP suite.
Each frame was 8 bytes longer than it should be
and some APs would drop frames that exceed 1520
bytes of 802.11 payload. This could be observed
during throughput tests or fragmented IP traffic.
Signed-off-by: Michal Kazior <michal.kazior@tieto.com>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
-rw-r--r-- | drivers/net/wireless/ath/ath10k/mac.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/drivers/net/wireless/ath/ath10k/mac.c b/drivers/net/wireless/ath/ath10k/mac.c index 725b06799043..95e306ef4df2 100644 --- a/drivers/net/wireless/ath/ath10k/mac.c +++ b/drivers/net/wireless/ath/ath10k/mac.c @@ -54,7 +54,6 @@ static int ath10k_send_key(struct ath10k_vif *arvif, key->flags |= IEEE80211_KEY_FLAG_SW_MGMT_TX; break; case WLAN_CIPHER_SUITE_TKIP: - key->flags |= IEEE80211_KEY_FLAG_GENERATE_MMIC; arg.key_cipher = WMI_CIPHER_TKIP; arg.key_txmic_len = 8; arg.key_rxmic_len = 8; |