lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 17 Oct 2021 14:52:22 +0100 From: Daniel Golle <daniel@...rotopia.org> To: Frank Wunderlich <frank-w@...lic-files.de> Cc: Nick <vincent@...temli.org>, Kalle Valo <kvalo@...eaurora.org>, nbd@....name, lorenzo.bianconi83@...il.com, ryder.lee@...iatek.com, davem@...emloft.net, kuba@...nel.org, matthias.bgg@...il.com, sean.wang@...iatek.com, shayne.chen@...iatek.com, linux-wireless@...r.kernel.org, netdev@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, linux-mediatek@...ts.infradead.org, linux-kernel@...r.kernel.org, Robert Foss <robert.foss@...aro.org> Subject: Re: Re: [RFC v2] mt76: mt7615: mt7622: fix ibss and meshpoint On Sun, Oct 17, 2021 at 02:28:16PM +0200, Frank Wunderlich wrote: > > Gesendet: Samstag, 09. Oktober 2021 um 15:22 Uhr > > Von: "Daniel Golle" <daniel@...rotopia.org> > > > Does Mesh+AP or Ad-Hoc+AP also work on MT7622 and does it still work on > > MT7615E card with your patch applied? > > tested bananapi-r2 with mt7615 and bananapi-r64 with internal mt7622-wmac > > ibss/ad-hoc: working > AP-Mode: still working Independently of each other or simultanously? What I meant was to ask if **simultanous** Mesh+AP or Ad-Hoc+AP still works on MT7615E (you can only test that with OpenWrt-patched hostapd or by using wpa_supplicant to setup the AP as well as mesh/ad-hoc interface by settings in wpa_supplicant.conf)
Powered by blists - more mailing lists