lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 24 Jul 2015 05:39:29 -0700
From:	Joshua Clayton <stillcompiling@...il.com>
To:	Sudip Mukherjee <sudipm.mukherjee@...il.com>
Cc:	Larry Finger <Larry.Finger@...inger.net>,
	Florian Schilhabel <florian.c.schilhabel@...glemail.com>,
	Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	Tapasweni Pathak <tapaswenipathak@...il.com>,
	Vaishali Thakkar <vthakkar1994@...il.com>,
	devel@...verdev.osuosl.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 3/5] staging: rtl8712: remove duplicate struct

On Friday, July 24, 2015 02:02:56 PM Sudip Mukherjee wrote:
> On Thu, Jul 23, 2015 at 09:57:50PM -0700, Joshua Clayton wrote:
> > struct ndis_wlan_bssid_ex is a dopelganger of
> > struct wlan_bssid_ex, and is used about a third as often
> > 
> > Switch all instances to wlan_bssid_ex
> > 
> > This also gets rid of a use of typedef NDIS_802_11_RATES_EX
> > 
> > Signed-off-by: Joshua Clayton <stillcompiling@...il.com>
> > ---
> 
> This patch seems to be corrupted. Did you try to edit the patch?
> 
> regards
> sudip
I did not manually edit it as far as I know.
However, git-send-email (which sent the cover letter and patches 1,2,4, and 
5), died every time I try to send this patch.
I opened it with kmail and it seemed to send successfully
Perhaps there is something in the patch, or its size that trips up the smtp 
server.

Here it is as an attachment

 
View attachment "0003-staging-rtl8712-remove-duplicate-struct.patch" of type "text/x-patch" (15875 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ