-/* $OpenBSD: if.c,v 1.563 2018/09/10 16:18:34 sashan Exp $ */
+/* $OpenBSD: if.c,v 1.564 2018/09/11 10:23:40 krw Exp $ */
/* $NetBSD: if.c,v 1.35 1996/05/07 05:26:04 thorpej Exp $ */
/*
#if NPF > 0
if (m->m_pkthdr.pf.delay > 0)
return (pf_delay_pkt(m, ifp->if_index));
-#endif
+#endif
#if NBRIDGE > 0
if (ifp->if_bridgeport && (m->m_flags & M_PROTO1) == 0) {
-/* $OpenBSD: ieee80211_proto.c,v 1.89 2018/08/13 15:19:52 stsp Exp $ */
+/* $OpenBSD: ieee80211_proto.c,v 1.90 2018/09/11 10:23:40 krw Exp $ */
/* $NetBSD: ieee80211_proto.c,v 1.8 2004/04/30 23:58:20 dyoung Exp $ */
/*-
{
int i;
- ni->ni_flags &= ~IEEE80211_NODE_HT;
+ ni->ni_flags &= ~IEEE80211_NODE_HT;
/* Check if we support HT. */
if ((ic->ic_modecaps & (1 << IEEE80211_MODE_11N)) == 0)
if ((ic->ic_flags & IEEE80211_F_HTON) == 0)
return;
- /*
+ /*
* Check if the peer supports HT.
* Require at least one of the mandatory MCS.
* MCS 0-7 are mandatory but some APs have particular MCS disabled.
}
}
- /*
+ /*
* Don't allow group cipher (includes WEP) or TKIP
* for pairwise encryption (see 802.11-2012 11.1.6).
*/
return;
}
- ni->ni_flags |= IEEE80211_NODE_HT;
+ ni->ni_flags |= IEEE80211_NODE_HT;
}
void
/* Try a different AP from the same ESS if available. */
if (ic->ic_caps & IEEE80211_C_SCANALLBAND) {
- /*
+ /*
* Make sure we will consider APs on all bands during
* access point selection in ieee80211_node_choose_bss().
* During multi-band scans, our previous AP may be trying
ni->ni_chan = ic->ic_bss->ni_chan;
}
- /*
+ /*
* Drivers may want to set up state before confirming.
* In which case this returns EBUSY and the driver will
* later call ieee80211_auth_open_confirm() by itself.
{
struct ifnet *ifp = &ic->ic_if;
- /*
+ /*
* Scale the missed beacon counter threshold to the AP's actual
* beacon interval. Give the AP at least 700 ms to time out and
* round up to ensure that at least one beacon may be missed.