Would code that puts the chipset inside the macbook pro into passive
"stealth" mode be useful to the kismac project? The chipset has a
"hidden" stealth mode that I recently learned about, and can get code
for from an employee of the chipset maker.
On Aug 22, 2006, at 7:20 PM, svn@xxxxxxxxxxxxxxxx wrote:
Author: gkruse Date: 2006-08-23 04:20:24 +0200 (Wed, 23 Aug 2006) New Revision: 168
Modified: trunk/Sources/Driver/USBIntersilJack/USBIntersil.mm Log: Minor error in previous commit. Also see #138 & #137
Modified: trunk/Sources/Driver/USBIntersilJack/USBIntersil.mm
===================================================================
--- trunk/Sources/Driver/USBIntersilJack/USBIntersil.mm 2006-08-23 02:18:02 UTC (rev 167)
+++ trunk/Sources/Driver/USBIntersilJack/USBIntersil.mm 2006-08-23 02:20:24 UTC (rev 168)
@@ -716,11 +716,11 @@
NSLog(@"USBIntersilJack::Unable to do async interrupt read (%08x). The card is stopped!\n", kr);
if (kr == kIOReturnNoDevice) {
NSLog(@"USBIntersilJack::There is no connection to an IOService,");
- _devicePresent = false;
+ me->_devicePresent = false;
}
if (kr == kIOReturnNotOpen) {
NSLog(@"USBIntersilJack::Pipe not open for exclusive access.");
- _devicePresent = false;
+ me->_devicePresent = false;
}
//we should never get here because some devices don't like to be inited more than once, however this might do something good
// I haven't been able to reproduce the error that caused it to hit this point in the code again since adding the following lines