mirror of
https://github.com/pentoo/pentoo-overlay
synced 2026-04-19 05:11:05 +02:00
fixed compatwireless and madwifi-hal deps
This commit is contained in:
parent
ae997fe3e3
commit
fb7ebe6ae3
5 changed files with 6 additions and 362 deletions
|
|
@ -5,11 +5,10 @@ AUX 4007_ath5k-pass-failed-crc.patch 568 RMD160 1f38abc77887fc23b5f09b1ddd7e4159
|
|||
AUX 4012_openwrt-b43-disable_qos_when_openfw.patch 721 RMD160 cd67c2425cd5b29f637781652a49a951a9ffda21 SHA1 382947ee332836c43c4eeb32eb8358b88e18fd22 SHA256 f03374faa0d41a5dca7e20079d7a7bd59aebd309b56aa6c7f7108b596d3f0da2
|
||||
AUX failed_ath5k-frequency-chaos-2.6.28.patch 5787 RMD160 978b39113ebdc4ec1543bd4379d4428431524cb6 SHA1 a1b9268aedeb0d9035fd13214fe465145f1c5334 SHA256 8e9e0888e890a2970274a7ba9d40d75e01ebaedb0e16700d8994b9ecfe921185
|
||||
AUX failed_ath5k-injection-2.6.28.patch 737 RMD160 00e2360da1291228e1cfb195cceefae37198a62d SHA1 be353ccf984d6e87fe050ebcd19f935ef1f4212a SHA256 fe8d9355c0381675b41589a9c092460c12af050a7de09aca8a394dc4e0e604be
|
||||
AUX failed_b43-openfwwf-loader.patch 11448 RMD160 2a43ab1047e4a4ba344c91509766f9f24c04bd75 SHA1 bbf9265ea03696fb772dc7352327d69c8d85b80f SHA256 6624841e6f7bb57f45c60bfe91ddb3613e70acbb206ac37240cd95d277789849
|
||||
AUX failed_ieee80211_inject-2.6.22.patch 772 RMD160 ff6f70125009e3cd151ad12d8c2f1aa9333f5556 SHA1 8a1773b86a2742a4ae63f61dda48231b10b591bf SHA256 7403780cd3df720439f54b6cad88a803aacc0260af8fbbab0cfa25e523ae2ae9
|
||||
AUX failed_ipw2200_ipw2200-1.2.1-inject.patch 2207 RMD160 b7ff866af15d91bc882f8c9f0f4f743e63e53b6f SHA1 2ff94a5031c826044fee3508e479cd04bb3abd00 SHA256 21cd575d13ef9a6d2beafea9070ca68296b4f187f2d46d23ea450b8eb1c78761
|
||||
AUX failed_linux-wlanng-kernel-2.6.28.patch 11623 RMD160 23d11bb21ba059b7a0d7a2c597e5ae8224670dde SHA1 8d8d11912160dd8b38b805c928ea746ff9192ba8 SHA256 fd4bd200617c5f28e3a0ae58e5fa02f80279ad98aafed6c2e3d5b249a9b617c6
|
||||
AUX failed_openembedded-orinoco-remove-all-which-are-in-hostap-HACK.patch 6606 RMD160 e479eb0e796aec521e2269d50e9ccc4426e1da55 SHA1 c76220bb8f3a118a224e555517b7e111603da47e SHA256 6b761693587871591fc0ce96273d37f769f61d28f637c1692d931300c4f04504
|
||||
AUX whynot.patch 4106 RMD160 ac38e8dbbe1a59607fe16b36f327a9ba73a001e7 SHA1 2208598c9f9811d368db099c863be2a2af11681e SHA256 956cf3a0a8b8e1f0f0e3df985e351799f325a44e4cddf042d677a9e8109b7c9e
|
||||
DIST compat-wireless-2.6.30-rc6.tar.bz2 1678784 RMD160 f0d69b99d37732a39ba01fdd869d150db8a55037 SHA1 1e91215069ba8cd46654836279dacc964d9dc854 SHA256 6b2beba044860624d44a0a8cc5a701b1243d9dd89f7d028daca12b4ca41d6512
|
||||
EBUILD compat-wireless-2.6.30_rc6.ebuild 2023 RMD160 f30413aaea53305db3e8f85ca0ed34e3476b21c7 SHA1 352747c7fc2d22a4f3a1424f16527c0a46974a13 SHA256 f142c9b95802984b38fecea1a3fd068fad99124628cf6c04f7b1d07f77c35c0b
|
||||
EBUILD compat-wireless-2.6.30_rc6.ebuild 1849 RMD160 e192dd32fe1548b11bda76e403fe91d774539a77 SHA1 f5a5c3a38af7e24fe4106ff32f44235d8f528e5c SHA256 935772dd0ca47431e0b0532cdefeb16e9534a22dfdafbdf063d35dd0006527d0
|
||||
|
|
|
|||
|
|
@ -9,10 +9,7 @@ SRC_URI="http://www.orbit-lab.org/kernel/compat-wireless-2.6-stable/v2.6.30/${MY
|
|||
|
||||
inherit linux-mod linux-info
|
||||
|
||||
#This doesn't seem to work because it doesn't cry about athload being a blocker
|
||||
#PROVIDES="net-wireless/athload"
|
||||
#DEPEND="!net-wireless/athload"
|
||||
#this concern is secondary to the morbid sandbox violations
|
||||
DEPEND="!net-wireless/athload"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
|
|
|
|||
|
|
@ -1,354 +0,0 @@
|
|||
From: Michael Buesch <mb@bu3sch.de>
|
||||
Date: Fri, 23 Jan 2009 20:21:51 +0000 (+0100)
|
||||
Subject: b43: Automatically probe for opensource firmware
|
||||
X-Git-Tag: master-2009-03-04~360
|
||||
X-Git-Url: http://git.kernel.org/?p=linux%2Fkernel%2Fgit%2Flinville%2Fwireless-testing.git;a=commitdiff_plain;h=b00f2457e512d4bcc1b6cb3a4844ef3cb3280c3a;hp=e8299e7642f1987e1d15951ddd18401e3048be14
|
||||
|
||||
b43: Automatically probe for opensource firmware
|
||||
|
||||
First probe for proprietary firmware and then probe for opensource firmware.
|
||||
This way around it's a win-win situation.
|
||||
1) If proprietary fw is available, it will work.
|
||||
2) If opensource firmware is available, but no proprietary (Distros can only ship open fw)
|
||||
it might work.
|
||||
3) If both open and proprietary are available, it will work, because it selects
|
||||
the proprietary. We currently don't prefer the open fw in this case, because it doesn't
|
||||
work on all devices. It would introduce a regression otherwise.
|
||||
|
||||
The remaining FIXMEs in this patch are harmless, because they only matter on multiband
|
||||
devices, which are not implemented yet anyway.
|
||||
|
||||
Signed-off-by: Michael Buesch <mb@bu3sch.de>
|
||||
Signed-off-by: John W. Linville <linville@tuxdriver.com>
|
||||
---
|
||||
|
||||
diff --git a/drivers/net/wireless/b43/b43.h b/drivers/net/wireless/b43/b43.h
|
||||
index a53c378..9e0da21 100644
|
||||
--- a/drivers/net/wireless/b43/b43.h
|
||||
+++ b/drivers/net/wireless/b43/b43.h
|
||||
@@ -655,10 +655,39 @@ struct b43_wl {
|
||||
struct work_struct txpower_adjust_work;
|
||||
};
|
||||
|
||||
+/* The type of the firmware file. */
|
||||
+enum b43_firmware_file_type {
|
||||
+ B43_FWTYPE_PROPRIETARY,
|
||||
+ B43_FWTYPE_OPENSOURCE,
|
||||
+ B43_NR_FWTYPES,
|
||||
+};
|
||||
+
|
||||
+/* Context data for fetching firmware. */
|
||||
+struct b43_request_fw_context {
|
||||
+ /* The device we are requesting the fw for. */
|
||||
+ struct b43_wldev *dev;
|
||||
+ /* The type of firmware to request. */
|
||||
+ enum b43_firmware_file_type req_type;
|
||||
+ /* Error messages for each firmware type. */
|
||||
+ char errors[B43_NR_FWTYPES][128];
|
||||
+ /* Temporary buffer for storing the firmware name. */
|
||||
+ char fwname[64];
|
||||
+ /* A fatal error occured while requesting. Firmware reqest
|
||||
+ * can not continue, as any other reqest will also fail. */
|
||||
+ int fatal_failure;
|
||||
+};
|
||||
+
|
||||
/* In-memory representation of a cached microcode file. */
|
||||
struct b43_firmware_file {
|
||||
const char *filename;
|
||||
const struct firmware *data;
|
||||
+ /* Type of the firmware file name. Note that this does only indicate
|
||||
+ * the type by the firmware name. NOT the file contents.
|
||||
+ * If you want to check for proprietary vs opensource, use (struct b43_firmware)->opensource
|
||||
+ * instead! The (struct b43_firmware)->opensource flag is derived from the actual firmware
|
||||
+ * binary code, not just the filename.
|
||||
+ */
|
||||
+ enum b43_firmware_file_type type;
|
||||
};
|
||||
|
||||
/* Pointers to the firmware data and meta information about it. */
|
||||
@@ -677,7 +706,8 @@ struct b43_firmware {
|
||||
/* Firmware patchlevel */
|
||||
u16 patch;
|
||||
|
||||
- /* Set to true, if we are using an opensource firmware. */
|
||||
+ /* Set to true, if we are using an opensource firmware.
|
||||
+ * Use this to check for proprietary vs opensource. */
|
||||
bool opensource;
|
||||
/* Set to true, if the core needs a PCM firmware, but
|
||||
* we failed to load one. This is always false for
|
||||
diff --git a/drivers/net/wireless/b43/main.c b/drivers/net/wireless/b43/main.c
|
||||
index 675a73a..cbb3d45 100644
|
||||
--- a/drivers/net/wireless/b43/main.c
|
||||
+++ b/drivers/net/wireless/b43/main.c
|
||||
@@ -1934,7 +1934,7 @@ static irqreturn_t b43_interrupt_handler(int irq, void *dev_id)
|
||||
return ret;
|
||||
}
|
||||
|
||||
-static void do_release_fw(struct b43_firmware_file *fw)
|
||||
+void b43_do_release_fw(struct b43_firmware_file *fw)
|
||||
{
|
||||
release_firmware(fw->data);
|
||||
fw->data = NULL;
|
||||
@@ -1943,10 +1943,10 @@ static void do_release_fw(struct b43_firmware_file *fw)
|
||||
|
||||
static void b43_release_firmware(struct b43_wldev *dev)
|
||||
{
|
||||
- do_release_fw(&dev->fw.ucode);
|
||||
- do_release_fw(&dev->fw.pcm);
|
||||
- do_release_fw(&dev->fw.initvals);
|
||||
- do_release_fw(&dev->fw.initvals_band);
|
||||
+ b43_do_release_fw(&dev->fw.ucode);
|
||||
+ b43_do_release_fw(&dev->fw.pcm);
|
||||
+ b43_do_release_fw(&dev->fw.initvals);
|
||||
+ b43_do_release_fw(&dev->fw.initvals_band);
|
||||
}
|
||||
|
||||
static void b43_print_fw_helptext(struct b43_wl *wl, bool error)
|
||||
@@ -1963,12 +1963,10 @@ static void b43_print_fw_helptext(struct b43_wl *wl, bool error)
|
||||
b43warn(wl, text);
|
||||
}
|
||||
|
||||
-static int do_request_fw(struct b43_wldev *dev,
|
||||
- const char *name,
|
||||
- struct b43_firmware_file *fw,
|
||||
- bool silent)
|
||||
+int b43_do_request_fw(struct b43_request_fw_context *ctx,
|
||||
+ const char *name,
|
||||
+ struct b43_firmware_file *fw)
|
||||
{
|
||||
- char path[sizeof(modparam_fwpostfix) + 32];
|
||||
const struct firmware *blob;
|
||||
struct b43_fw_header *hdr;
|
||||
u32 size;
|
||||
@@ -1976,29 +1974,49 @@ static int do_request_fw(struct b43_wldev *dev,
|
||||
|
||||
if (!name) {
|
||||
/* Don't fetch anything. Free possibly cached firmware. */
|
||||
- do_release_fw(fw);
|
||||
+ /* FIXME: We should probably keep it anyway, to save some headache
|
||||
+ * on suspend/resume with multiband devices. */
|
||||
+ b43_do_release_fw(fw);
|
||||
return 0;
|
||||
}
|
||||
if (fw->filename) {
|
||||
- if (strcmp(fw->filename, name) == 0)
|
||||
+ if ((fw->type == ctx->req_type) &&
|
||||
+ (strcmp(fw->filename, name) == 0))
|
||||
return 0; /* Already have this fw. */
|
||||
/* Free the cached firmware first. */
|
||||
- do_release_fw(fw);
|
||||
+ /* FIXME: We should probably do this later after we successfully
|
||||
+ * got the new fw. This could reduce headache with multiband devices.
|
||||
+ * We could also redesign this to cache the firmware for all possible
|
||||
+ * bands all the time. */
|
||||
+ b43_do_release_fw(fw);
|
||||
+ }
|
||||
+
|
||||
+ switch (ctx->req_type) {
|
||||
+ case B43_FWTYPE_PROPRIETARY:
|
||||
+ snprintf(ctx->fwname, sizeof(ctx->fwname),
|
||||
+ "b43%s/%s.fw",
|
||||
+ modparam_fwpostfix, name);
|
||||
+ break;
|
||||
+ case B43_FWTYPE_OPENSOURCE:
|
||||
+ snprintf(ctx->fwname, sizeof(ctx->fwname),
|
||||
+ "b43-open%s/%s.fw",
|
||||
+ modparam_fwpostfix, name);
|
||||
+ break;
|
||||
+ default:
|
||||
+ B43_WARN_ON(1);
|
||||
+ return -ENOSYS;
|
||||
}
|
||||
-
|
||||
- snprintf(path, ARRAY_SIZE(path),
|
||||
- "b43%s/%s.fw",
|
||||
- modparam_fwpostfix, name);
|
||||
- err = request_firmware(&blob, path, dev->dev->dev);
|
||||
+ err = request_firmware(&blob, ctx->fwname, ctx->dev->dev->dev);
|
||||
if (err == -ENOENT) {
|
||||
- if (!silent) {
|
||||
- b43err(dev->wl, "Firmware file \"%s\" not found\n",
|
||||
- path);
|
||||
- }
|
||||
+ snprintf(ctx->errors[ctx->req_type],
|
||||
+ sizeof(ctx->errors[ctx->req_type]),
|
||||
+ "Firmware file \"%s\" not found\n", ctx->fwname);
|
||||
return err;
|
||||
} else if (err) {
|
||||
- b43err(dev->wl, "Firmware file \"%s\" request failed (err=%d)\n",
|
||||
- path, err);
|
||||
+ snprintf(ctx->errors[ctx->req_type],
|
||||
+ sizeof(ctx->errors[ctx->req_type]),
|
||||
+ "Firmware file \"%s\" request failed (err=%d)\n",
|
||||
+ ctx->fwname, err);
|
||||
return err;
|
||||
}
|
||||
if (blob->size < sizeof(struct b43_fw_header))
|
||||
@@ -2021,20 +2039,24 @@ static int do_request_fw(struct b43_wldev *dev,
|
||||
|
||||
fw->data = blob;
|
||||
fw->filename = name;
|
||||
+ fw->type = ctx->req_type;
|
||||
|
||||
return 0;
|
||||
|
||||
err_format:
|
||||
- b43err(dev->wl, "Firmware file \"%s\" format error.\n", path);
|
||||
+ snprintf(ctx->errors[ctx->req_type],
|
||||
+ sizeof(ctx->errors[ctx->req_type]),
|
||||
+ "Firmware file \"%s\" format error.\n", ctx->fwname);
|
||||
release_firmware(blob);
|
||||
|
||||
return -EPROTO;
|
||||
}
|
||||
|
||||
-static int b43_request_firmware(struct b43_wldev *dev)
|
||||
+static int b43_try_request_fw(struct b43_request_fw_context *ctx)
|
||||
{
|
||||
- struct b43_firmware *fw = &dev->fw;
|
||||
- const u8 rev = dev->dev->id.revision;
|
||||
+ struct b43_wldev *dev = ctx->dev;
|
||||
+ struct b43_firmware *fw = &ctx->dev->fw;
|
||||
+ const u8 rev = ctx->dev->dev->id.revision;
|
||||
const char *filename;
|
||||
u32 tmshigh;
|
||||
int err;
|
||||
@@ -2049,7 +2071,7 @@ static int b43_request_firmware(struct b43_wldev *dev)
|
||||
filename = "ucode13";
|
||||
else
|
||||
goto err_no_ucode;
|
||||
- err = do_request_fw(dev, filename, &fw->ucode, 0);
|
||||
+ err = b43_do_request_fw(ctx, filename, &fw->ucode);
|
||||
if (err)
|
||||
goto err_load;
|
||||
|
||||
@@ -2061,7 +2083,7 @@ static int b43_request_firmware(struct b43_wldev *dev)
|
||||
else
|
||||
goto err_no_pcm;
|
||||
fw->pcm_request_failed = 0;
|
||||
- err = do_request_fw(dev, filename, &fw->pcm, 1);
|
||||
+ err = b43_do_request_fw(ctx, filename, &fw->pcm);
|
||||
if (err == -ENOENT) {
|
||||
/* We did not find a PCM file? Not fatal, but
|
||||
* core rev <= 10 must do without hwcrypto then. */
|
||||
@@ -2097,7 +2119,7 @@ static int b43_request_firmware(struct b43_wldev *dev)
|
||||
default:
|
||||
goto err_no_initvals;
|
||||
}
|
||||
- err = do_request_fw(dev, filename, &fw->initvals, 0);
|
||||
+ err = b43_do_request_fw(ctx, filename, &fw->initvals);
|
||||
if (err)
|
||||
goto err_load;
|
||||
|
||||
@@ -2131,30 +2153,34 @@ static int b43_request_firmware(struct b43_wldev *dev)
|
||||
default:
|
||||
goto err_no_initvals;
|
||||
}
|
||||
- err = do_request_fw(dev, filename, &fw->initvals_band, 0);
|
||||
+ err = b43_do_request_fw(ctx, filename, &fw->initvals_band);
|
||||
if (err)
|
||||
goto err_load;
|
||||
|
||||
return 0;
|
||||
|
||||
-err_load:
|
||||
- b43_print_fw_helptext(dev->wl, 1);
|
||||
- goto error;
|
||||
-
|
||||
err_no_ucode:
|
||||
- err = -ENODEV;
|
||||
- b43err(dev->wl, "No microcode available for core rev %u\n", rev);
|
||||
+ err = ctx->fatal_failure = -EOPNOTSUPP;
|
||||
+ b43err(dev->wl, "The driver does not know which firmware (ucode) "
|
||||
+ "is required for your device (wl-core rev %u)\n", rev);
|
||||
goto error;
|
||||
|
||||
err_no_pcm:
|
||||
- err = -ENODEV;
|
||||
- b43err(dev->wl, "No PCM available for core rev %u\n", rev);
|
||||
+ err = ctx->fatal_failure = -EOPNOTSUPP;
|
||||
+ b43err(dev->wl, "The driver does not know which firmware (PCM) "
|
||||
+ "is required for your device (wl-core rev %u)\n", rev);
|
||||
goto error;
|
||||
|
||||
err_no_initvals:
|
||||
- err = -ENODEV;
|
||||
- b43err(dev->wl, "No Initial Values firmware file for PHY %u, "
|
||||
- "core rev %u\n", dev->phy.type, rev);
|
||||
+ err = ctx->fatal_failure = -EOPNOTSUPP;
|
||||
+ b43err(dev->wl, "The driver does not know which firmware (initvals) "
|
||||
+ "is required for your device (wl-core rev %u)\n", rev);
|
||||
+ goto error;
|
||||
+
|
||||
+err_load:
|
||||
+ /* We failed to load this firmware image. The error message
|
||||
+ * already is in ctx->errors. Return and let our caller decide
|
||||
+ * what to do. */
|
||||
goto error;
|
||||
|
||||
error:
|
||||
@@ -2162,6 +2188,48 @@ error:
|
||||
return err;
|
||||
}
|
||||
|
||||
+static int b43_request_firmware(struct b43_wldev *dev)
|
||||
+{
|
||||
+ struct b43_request_fw_context *ctx;
|
||||
+ unsigned int i;
|
||||
+ int err;
|
||||
+ const char *errmsg;
|
||||
+
|
||||
+ ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
|
||||
+ if (!ctx)
|
||||
+ return -ENOMEM;
|
||||
+ ctx->dev = dev;
|
||||
+
|
||||
+ ctx->req_type = B43_FWTYPE_PROPRIETARY;
|
||||
+ err = b43_try_request_fw(ctx);
|
||||
+ if (!err)
|
||||
+ goto out; /* Successfully loaded it. */
|
||||
+ err = ctx->fatal_failure;
|
||||
+ if (err)
|
||||
+ goto out;
|
||||
+
|
||||
+ ctx->req_type = B43_FWTYPE_OPENSOURCE;
|
||||
+ err = b43_try_request_fw(ctx);
|
||||
+ if (!err)
|
||||
+ goto out; /* Successfully loaded it. */
|
||||
+ err = ctx->fatal_failure;
|
||||
+ if (err)
|
||||
+ goto out;
|
||||
+
|
||||
+ /* Could not find a usable firmware. Print the errors. */
|
||||
+ for (i = 0; i < B43_NR_FWTYPES; i++) {
|
||||
+ errmsg = ctx->errors[i];
|
||||
+ if (strlen(errmsg))
|
||||
+ b43err(dev->wl, errmsg);
|
||||
+ }
|
||||
+ b43_print_fw_helptext(dev->wl, 1);
|
||||
+ err = -ENOENT;
|
||||
+
|
||||
+out:
|
||||
+ kfree(ctx);
|
||||
+ return err;
|
||||
+}
|
||||
+
|
||||
static int b43_upload_microcode(struct b43_wldev *dev)
|
||||
{
|
||||
const size_t hdr_len = sizeof(struct b43_fw_header);
|
||||
diff --git a/drivers/net/wireless/b43/main.h b/drivers/net/wireless/b43/main.h
|
||||
index f871a25..e6d90f3 100644
|
||||
--- a/drivers/net/wireless/b43/main.h
|
||||
+++ b/drivers/net/wireless/b43/main.h
|
||||
@@ -121,4 +121,11 @@ void b43_power_saving_ctl_bits(struct b43_wldev *dev, unsigned int ps_flags);
|
||||
void b43_mac_suspend(struct b43_wldev *dev);
|
||||
void b43_mac_enable(struct b43_wldev *dev);
|
||||
|
||||
+
|
||||
+struct b43_request_fw_context;
|
||||
+int b43_do_request_fw(struct b43_request_fw_context *ctx,
|
||||
+ const char *name,
|
||||
+ struct b43_firmware_file *fw);
|
||||
+void b43_do_release_fw(struct b43_firmware_file *fw);
|
||||
+
|
||||
#endif /* B43_MAIN_H_ */
|
||||
|
|
@ -8,4 +8,4 @@ DIST madwifi-hal-0.10.5.6-r4016-20090429.tar.gz 4423386 RMD160 7e464addc4bd7433d
|
|||
EBUILD madwifi-hal-0.10.5.6-r3917.ebuild 3154 RMD160 b16c74c718c6d4ca5e97cc0b365a4a06361ea3c0 SHA1 2c2b7628e0633107b3c5d30f4cb2a2fc12549115 SHA256 975f979ddfd9578b431ebdedd8c1d4bcb2246521c99d50e327032adcc65b3835
|
||||
EBUILD madwifi-hal-0.10.5.6-r3942.ebuild 4798 RMD160 52e1771a9854d8eef55523ac70428bcc3c565cf9 SHA1 f136073d1a8f3c27fc1799eddc1a9050936ec457 SHA256 b1d56cf0769dfeaa9f2112fd8fb3674f012e99eac6960215262a9eb19f6074a0
|
||||
EBUILD madwifi-hal-0.10.5.6-r3977.ebuild 4888 RMD160 044252a3b985e69db5467860999bf890bb1d1ec2 SHA1 9010bb141413ae9140ee4af20c0c43f1a030b87d SHA256 8a15240e59e38bcafffdee8a20349d601b9cddd2124f47751966ec17d4d46771
|
||||
EBUILD madwifi-hal-0.10.5.6-r4016.ebuild 4891 RMD160 a4fe738599b2e6b76b9a005cb097cf9da6f44e07 SHA1 86336bd16e5f5bacdbe9ff6d77e7b832af0de7d4 SHA256 4f2bd11ae311270fac83abbc1e5566775cc82de419d6bbd6f418b5f3149b39b0
|
||||
EBUILD madwifi-hal-0.10.5.6-r4016.ebuild 4963 RMD160 d051da447f388a36ca6f3ca36bf18b79128db404 SHA1 0f7452db6104a8cc50b29c8121e3c287911c245e SHA256 9ed8c19ea0ccf352740828ff7478a08951dee6f8c85321a6c30f645d5f320b81
|
||||
|
|
|
|||
|
|
@ -22,7 +22,9 @@ DEPEND="app-arch/sharutils
|
|||
RDEPEND="!net-wireless/madwifi-old
|
||||
net-wireless/wireless-tools
|
||||
=net-wireless/madwifi-hal-tools-${PVR}
|
||||
net-wireless/athload"
|
||||
( ||
|
||||
( net-wireless/compat-wireless
|
||||
net-wireless/athload ) )"
|
||||
|
||||
CONFIG_CHECK="CRYPTO WIRELESS_EXT SYSCTL MODULES"
|
||||
ERROR_CRYPTO="${P} requires Cryptographic API support (CONFIG_CRYPTO)."
|
||||
|
|
|
|||
Loading…
Reference in a new issue