Hi,
On 27.07.2020 03:30, Heppler, J. Scott wrote:
I came onto a Trendnet TEW-827DRU Version 2 that is MT7621an with
MT7615E x 2 wifi chips. I was able to get UART output and stock has
these partitions:
[2.512000] 0x-0x0100 : "ALL"
[2.52] 0x-0x000
Hi Hauke, Adrian,
> -Original Message-
> From: Hauke Mehrtens
> Sent: Sunday, July 26, 2020 7:11 PM
> To: m...@adrianschmutzler.de; Evgeniy Didin ; Alexey
> Brodkin
> Cc: openwrt-devel@lists.openwrt.org
> Subject: Re: [OpenWrt-Devel] [RFT PATCH] arc770: bump kernel to 5.4
> On 7/22/20
Hauke Mehrtens [2020-07-26 19:15:59]:
> How stable is the ABI of wolfssl?
I assume, that we're going to find the answer in the upcoming years :-)
Anyway, by looking purely at the Git log of hostapd it seems stable.
$ git log --pretty="%ci %s" src/crypto/*wolfssl*
2020-05-16 21:02:17 +0300
Henrique de Moraes Holschuh [2020-07-24 13:02:30]:
> On 24/07/2020 11:29, Petr Štetiar wrote:
> > As there is now WolfSSL included by default due to SAE/WPA3 we can
> > finally switch to TLS/SSL in other parts as well.
>
> > +DEFAULT_PACKAGES:= \
> > + base-files libc libgcc busybox dropbear m
Hi,
>> How stable is the ABI of wolfssl?
>
> I assume, that we're going to find the answer in the upcoming years :-)
see https://abi-laboratory.pro/index.php?view=timeline&l=wolfssl for the
historic track record. Compared to OpenSSL here:
https://abi-laboratory.pro/index.php?view=timeline&l=open
Daniel Golle [2020-07-25 11:02:16]:
> Hence it makes sense exclude device images which are anyway not going
> to be offered for download (ie. 4/32 devices) from this change and keep
> them with wpad-mini. In the end it doesn't matter too much as anyone
> using the IB for those devices is anyway l
Add package which provides size optimized wpad with support for just
WPA-PSK, SAE (WPA3-Personal), 802.11r and 802.11w.
Signed-off-by: Petr Štetiar
---
changed in v2: no changes
include/target.mk | 2 +-
package/network/services/hostapd/Config.in | 2 ++
package/netw
As there is now wolfSSL included by default due to SAE/WPA3 we can
finally switch to TLS/SSL in other parts as well.
Tested-by: Paul Spooren
Signed-off-by: Petr Štetiar
---
changed in v2:
* replaced ca-certificates with ca-bundle package
README | 2 +-
include/target.mk | 6 +++
In order to support SAE/WPA3-Personal in default images. Replaced all
occurencies of wpad-basic and wpad-mini with wpad-basic-wolfssl for
consistency.
Signed-off-by: Petr Štetiar
---
changed in v2:
* replacement of wpad-mini with wpad-basic-wolfssl for consistency
target/linux/apm821xx/image
> -Original Message-
> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> On Behalf Of Petr Štetiar
> Sent: Montag, 27. Juli 2020 11:57
> To: openwrt-devel@lists.openwrt.org
> Cc: Petr Štetiar
> Subject: [PATCH v2 2/3] treewide: use wpad-basic-wolfssl as default
>
> In
On Mon, 27 Jul 2020 at 17:03, Petr Štetiar wrote:
>
> Henrique de Moraes Holschuh [2020-07-24 13:02:30]:
>
> > On 24/07/2020 11:29, Petr Štetiar wrote:
> > > As there is now WolfSSL included by default due to SAE/WPA3 we can
> > > finally switch to TLS/SSL in other parts as well.
> >
> > > +DEFAU
Hi,
> -Original Message-
> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> On Behalf Of Piotr Dymacz
> Sent: Montag, 27. Juli 2020 09:53
> To: Heppler, J. Scott ; openwrt-
> de...@openwrt.org
> Subject: Re: ramips: mt7621 novel art_block partition
>
> Hi,
>
> On 27
In order to support SAE/WPA3-Personal in default images. Replaced almost
all occurencies of wpad-basic and wpad-mini with wpad-basic-wolfssl for
consistency. Keeping out ar71xx from the list in order to make the
backports easier.
Signed-off-by: Petr Štetiar
---
changed in v2:
* replacement of
In order to support SAE/WPA3-Personal in default images. Replaced almost
all occurencies of wpad-basic and wpad-mini with wpad-basic-wolfssl for
consistency. Keeping out ar71xx from the list in order to make the
backports easier.
Signed-off-by: Petr Štetiar
---
changed in v2:
* replacement of
m...@adrianschmutzler.de [2020-07-27 12:04:09]:
Hi,
> as stated earlier, I'm fine with covering ath79/tiny etc. as well, but I'd
> personally not touch ar71xx.
sorry about that, I failed to exclude ar71xx from that git/sed foo, should be
fixed in v3. Thanks for the review!
-- ynezz
__
Since commit 7546be60074e ("build: allow overriding default selection
state for devices") we can disable building of devices with `DEFAULT :=
n` construct which is prefered as those devices would still be available
for use with Image Builder for example.
Signed-off-by: Petr Štetiar
---
target/li
> -Original Message-
> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> On Behalf Of Adrian Schmutzler
> Sent: Dienstag, 14. Juli 2020 16:28
> To: openwrt-devel@lists.openwrt.org
> Subject: [PATCH v2 0/6] sysupgrade: introduce compatibility version for
> devices
This
Hi Petr,
> -Original Message-
> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> On Behalf Of Petr Štetiar
> Sent: Montag, 27. Juli 2020 12:53
> To: openwrt-devel@lists.openwrt.org
> Cc: Petr Štetiar
> Subject: [PATCH] treewide: consistenly disable building of device
> > @Evgeniy and @Alexey: Could you please test if this update to kernel 5.4
> for the arc770 works basically.
>
> Thank you a lot for updating kernel to 5.4 for arc770! Unfortunately we do
> not have access to boards with arc770, so we are not able to test the image
> right now. By the way we ran
From: Rafał Miłecki
After specified time of network inactivity uhttpd is meant to close
connection. It doesn't seem to work thought. After timeout client
doesn't receive any more data but connection it still opened.
This change fixes that.
Signed-off-by: Rafał Miłecki
---
While this fixes desc
> -Original Message-
> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> On Behalf Of m...@adrianschmutzler.de
> Sent: Montag, 27. Juli 2020 15:39
> To: 'Evgeniy Didin' ; 'Hauke Mehrtens'
> ; 'Alexey Brodkin'
> Cc: openwrt-devel@lists.openwrt.org
> Subject: RE: [OpenWr
Update the openvpn sample configurations to use modern options in favor
of deprecated ones, suggest more sane default settings and add some
warnings.
* Add tls_crypt and ncp_disable to the sample configuration
* Replace nsCertType with remote_cert_tls in client sample configuration
* Comment out "
From: Daniel Gröber
Currently when assigning IPv6 addresses with large prefixes to a wireguard
interface, like
config interface 'wg'
option proto 'wireguard'
list addresses 'fd::/48'
and having, say, a LAN interface such as
config interface 'lan'
opt
23 matches
Mail list logo