lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CA+5PVA5awD_uMvhKR-KdN_io5g3s2YZBVao1Tj6wWtcBUY9W1w@mail.gmail.com>
Date:   Tue, 12 Mar 2019 08:09:28 -0400
From:   Josh Boyer <jwboyer@...nel.org>
To:     Balakrishna Godavarthi <bgodavar@...eaurora.org>
Cc:     Hemantg <hemantg@...eaurora.org>,
        Linux Firmware <linux-firmware@...nel.org>,
        BlueZ development <linux-bluetooth@...r.kernel.org>,
        Linux-arm Msm <linux-arm-msm@...r.kernel.org>,
        "Linux-Kernel@...r. Kernel. Org" <linux-kernel@...r.kernel.org>,
        rjliao@...eauroa.com
Subject: Re: Fw files for QCA BT Chip QCA6174

On Wed, Mar 6, 2019 at 11:40 AM Balakrishna Godavarthi
<bgodavar@...eaurora.org> wrote:
>
>
> Hi,
>
> The following changes since commit
> 54b0a748c8966c93aaa8726402e0b69cb51cd5d2:
>
>    WHENCE: Correct errant entries (2019-02-21 07:21:45 -0500)
>
> are available in the Git repository at:
>
>    https://github.com/bgodavar/qca6174_bt_fw.git
>
> for you to fetch changes up to c99beda7e0368961d024ddc8e45a46f118100cc7:
>
>    QCA: Add the fw files for BT Chip QCA6174. (2019-02-25 15:36:36 +0530)
>
> ----------------------------------------------------------------
> Balakrishna Godavarthi (1):
>        QCA: Add the fw files for BT Chip QCA6174.
>
>   WHENCE                    |   2 ++
>   qca/nvm_00440302.bin      | Bin 0 -> 2010 bytes
>   qca/rampatch_00440302.bin | Bin 0 -> 64940 bytes
>   3 files changed, 2 insertions(+)
>   create mode 100644 qca/nvm_00440302.bin
>   create mode 100644 qca/rampatch_00440302.bin

Pulled and pushed out.

josh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ