Hello Thomas,
On Wed, Nov 06, 2019 at 11:31:23PM +0100, tm...@gmx.de wrote:
> > Support ported from ar71xx.
> >
> > Signed-off-by: Paul Fertser
>
> [...]
>
> Can you please add installation instructions?
Please notice that this patch is WiP and some additional changes are
to be introduced in v
On 11/6/19 2:47 PM, Daniel Golle wrote:
Hi Jeff,
On Thu, Oct 24, 2019 at 08:57:52PM -0700, Jeff Kletsky wrote:
From: Jeff Kletsky
Targets that use nand_do_platform_check() can't use SUPPORTED_DEVICES
as the check requires ./sysupgrade-legacy_boardname/CONTROL to be
non-zero length as extract
On 11/5/19 1:27 AM, Petr Štetiar wrote:
> Hi,
>
> Hauke Mehrtens [2019-11-01 17:06:34]:
>
>> +ADD_DEFINITIONS(-Os -Wall -Werror -Wclobbered --std=gnu99 -g3 -I.
>> -DUCI_PREFIX="${CMAKE_INSTALL_PREFIX}")
>
> is there any reason to not use -Wextra directly?
I was looking on how we could prevent
On 11/6/19 2:30 PM, Petr Štetiar wrote:
> Hi,
>
> v1 patches were somehow screwed probably due to the rebase, so this v2 series
> is done from scratch again. Previous cover letter[1] for reference, and Git
> branch[2] with all the patches.
>
> 1. https://patchwork.ozlabs.org/cover/1190274/
> 2.
On 11/6/19 12:05 PM, Petr Štetiar wrote:
> From: Hauke Mehrtens
>
> This also syncs the configuration files with the default configuration
> files, but no extra options are activated or deactivated.
>
> The mesh patches were partially merged into hostapd 2.8, the remaining
> patches were extract
On 11/6/19 12:46 PM, Petr Štetiar wrote:
> Daniel Golle [2019-11-06 12:15:47]:
>
> Hi,
>
>>> Signed-off-by: Hauke Mehrtens
>>> (cherry picked from commit 1d4df52c215874a5238ddef7bccf0139f7758c24)
>>
>> Looks like you forgot to `git add`, also in patch 3 and 4...
>
> hm, thanks for spotting it,
Hi Jeff,
On Thu, Oct 24, 2019 at 08:57:52PM -0700, Jeff Kletsky wrote:
> From: Jeff Kletsky
>
> Targets that use nand_do_platform_check() can't use SUPPORTED_DEVICES
> as the check requires ./sysupgrade-legacy_boardname/CONTROL to be
> non-zero length as extracted from the tar file. Previously,
Hello Adrian,
On 11/6/19 11:16 PM, m...@adrianschmutzler.de wrote:
> Hi,
>
> for the to-be-supported TP-Link Archer C6/A6 v2 US (QCA9563) there are
> reports that 5 GHz channels from 52 to 144 lead to "Device is not active"
> messages and 5 GHz WiFi disabled:
>
> https://github.com/openwrt/ope
Hi Paul,
> Support ported from ar71xx.
>
> Signed-off-by: Paul Fertser
[...]
Can you please add installation instructions?
Thanks!
Thomas
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/ope
> On 6/11/2019 12:51, Stijn Tintel wrote:
> > Hi,
> >
> > As the server that is hosting the OpenWrt.org wiki is running out of
> > disk space, we will take it down to resize it.
> >
> And it's back.
Thanks for the upgrade!
Thomas
___
openwrt-devel mai
Hi,
for the to-be-supported TP-Link Archer C6/A6 v2 US (QCA9563) there are reports
that 5 GHz channels from 52 to 144 lead to "Device is not active" messages and
5 GHz WiFi disabled:
https://github.com/openwrt/openwrt/pull/2470#issuecomment-550444362
Since 52 is the first DFS channel, I wonder
Many bugs were fixed--2 patches removed here.
This release of wolfSSL includes fixes for 5 security vulnerabilities,
including two CVEs with high/critical base scores:
- potential invalid read with TLS 1.3 PSK, including session tickets
- potential hang with ocspstaping2 (always enabled in openwr
This is needed to export crypto information to netfilter, allowing
the alt. afalg openssl engine to obtain information about the drivers
being used.
Signed-off-by: Eneas U de Queiroz
---
Tested on WRT3200ACM, running openrt master. For mvebu, this
increases the package size from 17,097 to 20,452
Oh thanks, updated...
On 11/5/19 10:01 PM, Bjørn Mork wrote:
subject typo. I was curious about that new chip :-)
Bjørn
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel
The elecom-header renames the firmware image to v_0.0.0.bin, stores its
MD5 sum as v_0.0.0.md5 and tars both files again.
Both v_0.0.0 files are created as the build user making it harder to
reproduce.
This commit sets the owner/group of both files to root by adding extra
options to the final tar
scan-build from clang version 9 complains about following:
nl.c:507:9: warning: Use of memory after it is freed
while (nlmsg_ok(hdr, n)) {
^~~~
which seems to be impossible codepath as clang analyzer doesn't somehow
account properly nl_syserr2nlerr(errno) retur
scan-build from clang version 9 complains about following:
nl.c:648:3: warning: Value stored to 'err' is never read
err = 0;
^ ~
Signed-off-by: Petr Štetiar
---
nl.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/nl.c b/nl.c
index 505965fd16aa..c875573bb
scan-build from clang version 9 complains about following:
cache.c:106:2: warning: Dereference of null pointer
nl_list_for_each_entry_safe(obj, tmp, &cache->c_items, ce_list)
^~~
include/netlink/list.h:83:20: note: expan
Hi,
> Wouldn't it make more sense to spend time now on implementing
> future-proof solution and switch to it when it's ready?
Obviously, yes. But for the meantime, I'd like to have a less-arbitrary status
quo.
> I believe the major issue here is that there is no 'in place'
> replacement for 'gp
From: Hauke Mehrtens
All the content of this function is proceeded by IEEE8021X_EAPOL no code
accesses the ssid variable outside of this ifdef.
Signed-off-by: Hauke Mehrtens
(cherry picked from commit 0d86bf518aaefa57bef577d09a18aff03eccb70c)
---
.../hostapd/patches/110-no_eapol_fix.patch
From: Hauke Mehrtens
Instead of patching the workaround away, just use the config option.
Signed-off-by: Hauke Mehrtens
(cherry picked from commit 9b4a27455c17c00698ce7ce24e0bcad419c6319e)
---
.../hostapd/files/wpa_supplicant-basic.config| 2 +-
.../hostapd/files/wpa_supplicant-full.c
From: Hauke Mehrtens
The size of the ipkgs increase a bit (between 0.7% and 1.1%):
old 2019-04-21 (2.8):
288264 wpad-basic_2019-04-21-63962824-1_mipsel_24kc.ipk
256188 wpad-mini_2019-04-21-63962824-1_mipsel_24kc.ipk
427475 wpad-openssl_2019-04-21-63962824-1_mipsel_24kc.ipk
423071 wpad-wolfssl_20
From: Jo-Philipp Wich
For AP mode, OpenWrt automatically sets ieee80211w to either 1 or 2, depending
on whether the encryption is set to sae-mixed, or sae/owe/eap suite-b.
Mirror the same defaults for client mode connections, in order to allow an
OpenWrt station to associate to an OpenWrt ap wit
From: Eneas U de Queiroz
This edjusts the selection of recently removed wolfssl options which
have always been built into the library even in their abscence.
Also remove the selection of libwolfssl itself, allowing the library to
be built as a module.
Signed-off-by: Eneas U de Queiroz
(cherry p
Hi,
v1 patches were somehow screwed probably due to the rebase, so this v2 series
is done from scratch again. Previous cover letter[1] for reference, and Git
branch[2] with all the patches.
1. https://patchwork.ozlabs.org/cover/1190274/
2.
https://git.openwrt.org/?p=openwrt/staging/ynezz.git;a=s
From: Jo-Philipp Wich
This changes fixes the generation of the wpa_supplicant client configuration
in WPA3 OWE client mode. Instead of incorrectly emitting key_mgmt=NONE, use
the proper key_mgmt=OWE setting instead.
Signed-off-by: Jo-Philipp Wich
(cherry picked from commit 4209b28d23b8bf28575af
From: "Leon M. George"
wps_supplicant.h assumes that 'struct wpa_bss' is forward declared if
CONFIG_WPS is not defined. With the later inclusion of
600-ubus_support, the issue manifests in warnings like these:
wps_supplicant.h:113:15: warning: 'struct wpa_bss' declared inside parameter
list wi
From: "Leon M. George"
The original wpa_hexdump uses a 'void *' for the payload. With patch
410-limit_debug_messages, the signature changes and compiler warnings
occur at various places. One such warning is:
wpa_debug.h:106:20: note: expected 'const u8 * {aka const unsigned char *}'
but argu
The old GPIO based phy reset (phy-reset-gpio) will be removed form
the ipq40xx mdio driver in the future.
Signed-off-by: Daniel Danzberger
---
.../files-4.19/arch/arm/boot/dts/qcom-ipq4019-wpj419.dts | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git
a/target/linux/ipq40x
On 6/11/2019 12:51, Stijn Tintel wrote:
Hi,
As the server that is hosting the OpenWrt.org wiki is running out of
disk space, we will take it down to resize it.
And it's back.
Stijn
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
h
Hi,
As the server that is hosting the OpenWrt.org wiki is running out of
disk space, we will take it down to resize it.
Stijn
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel
Daniel Golle [2019-11-06 12:15:47]:
Hi,
> > Signed-off-by: Hauke Mehrtens
> > (cherry picked from commit 1d4df52c215874a5238ddef7bccf0139f7758c24)
>
> Looks like you forgot to `git add`, also in patch 3 and 4...
hm, thanks for spotting it, this is interesting as I've used `git
cherry-pick -x
Hi Petr,
On Wed, Nov 06, 2019 at 12:05:07PM +0100, Petr Štetiar wrote:
> From: Hauke Mehrtens
>
> This commit will activate CONFIG_IEEE80211W for all, but the mini
> variant when at least one driver supports it. This will add ieee80211w
> support for the mesh variant for example.
>
> Fixes: FS#
From: Jo-Philipp Wich
This changes fixes the generation of the wpa_supplicant client configuration
in WPA3 OWE client mode. Instead of incorrectly emitting key_mgmt=NONE, use
the proper key_mgmt=OWE setting instead.
Signed-off-by: Jo-Philipp Wich
(cherry picked from commit 4209b28d23b8bf28575af
From: "Leon M. George"
wps_supplicant.h assumes that 'struct wpa_bss' is forward declared if
CONFIG_WPS is not defined. With the later inclusion of
600-ubus_support, the issue manifests in warnings like these:
wps_supplicant.h:113:15: warning: 'struct wpa_bss' declared inside parameter
list wi
From: "Leon M. George"
The original wpa_hexdump uses a 'void *' for the payload. With patch
410-limit_debug_messages, the signature changes and compiler warnings
occur at various places. One such warning is:
wpa_debug.h:106:20: note: expected 'const u8 * {aka const unsigned char *}'
but argu
From: Jo-Philipp Wich
For AP mode, OpenWrt automatically sets ieee80211w to either 1 or 2, depending
on whether the encryption is set to sae-mixed, or sae/owe/eap suite-b.
Mirror the same defaults for client mode connections, in order to allow an
OpenWrt station to associate to an OpenWrt ap wit
Hi,
TL;DR I would like to propose backport of most of hostap patches from master
and thus bumping hostapd in 19.07 to the latest stable release v2.9.
I understand, that it's quite a radical change as we've 19.07-rc1 already
tagged, but bellow you can find a filtered list of 147 (total count is 11
From: Hauke Mehrtens
This fixes:
CVE-2019-11555 "EAP-pwd message reassembly issue with unexpected fragment"
https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
This shouöld not affect OpenWrt in the default settings as we do not use
EAP-pwd.
Signed-off-by
From: Eneas U de Queiroz
This edjusts the selection of recently removed wolfssl options which
have always been built into the library even in their abscence.
Also remove the selection of libwolfssl itself, allowing the library to
be built as a module.
Signed-off-by: Eneas U de Queiroz
(cherry p
From: Hauke Mehrtens
This commit will activate CONFIG_IEEE80211W for all, but the mini
variant when at least one driver supports it. This will add ieee80211w
support for the mesh variant for example.
Fixes: FS#2397
Signed-off-by: Hauke Mehrtens
(cherry picked from commit 1d4df52c215874a5238ddef
From: Hauke Mehrtens
Fixes this security problem:
* SAE/EAP-pwd side-channel attack update
https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt
Signed-off-by: Hauke Mehrtens
(cherry picked from commit 7bed9bf10fc8d05df34c7efc66e8b4ade37a1a0c)
---
package/network/services/ho
Boards added: WNR1000v2, WNR2000v3, WNR2200, WNR612v2, WNDR4300.
Boards changed: WNDR3700 (u-boot env size is 2 sectors not 1).
Signed-off-by: Michal Cieslakiewicz
---
package/boot/uboot-envtools/files/ar71xx | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/package
Boards added: WNR1000v2, WNR2000v3, WNR612v2, WNDR3700.
Signed-off-by: Michal Cieslakiewicz
---
package/boot/uboot-envtools/files/ath79 | 6 ++
1 file changed, 6 insertions(+)
diff --git a/package/boot/uboot-envtools/files/ath79
b/package/boot/uboot-envtools/files/ath79
index 5da5df2420..f
subject typo. I was curious about that new chip :-)
Bjørn
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel
45 matches
Mail list logo