lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 09 Dec 2021 10:21:02 +0100
From:   Sven Eckelmann <sven@...fation.org>
To:     jwboyer@...nel.org, dwmw2@...radead.org, ben@...adent.org.uk,
        Felix Fietkau <nbd@....name>,
        Lorenzo Bianconi <lorenzo.bianconi@...hat.com>,
        Deren Wu <Deren.Wu@...iatek.com>
Cc:     Mark-YW Chen <Mark-YW.Chen@...iatek.com>,
        Sean Wang <sean.wang@...iatek.com>,
        Soul Huang <Soul.Huang@...iatek.com>,
        YN Chen <YN.Chen@...iatek.com>,
        Deren Wu <Deren.Wu@...iatek.com>, KM Lin <km.lin@...iatek.com>,
        Robin Chiu <robin.chiu@...iatek.com>,
        CH Yeh <ch.yeh@...iatek.com>, Posh Sun <posh.sun@...iatek.com>,
        Eric Liang <Eric.Liang@...iatek.com>, jemele@...gle.com,
        linux-firmware <linux-firmware@...nel.org>,
        linux-wireless <linux-wireless@...r.kernel.org>,
        linux-mediatek <linux-mediatek@...ts.infradead.org>,
        linux-kernel <linux-kernel@...r.kernel.org>,
        Deren Wu <deren.wu@...iatek.com>, jf@...onwunderlich.de
Subject: Re: [PATCH] linux-firmware: update firmware for MT7921 WiFi device

On Thursday, 9 December 2021 09:24:11 CET Deren Wu wrote:
> From: Deren Wu <deren.wu@...iatek.com>
> 
> Update binary firmware for MT7921 WiFi devices
> 
> File: mediatek/WIFI_MT7961_patch_mcu_1_2_hdr.bin
> Version: 20211129210838a
> File: mediatek/WIFI_RAM_CODE_MT7961_1.bin
> Version: 20211129210917

Thank you for the firmware update. With this firmware and the mt76.git 
commit 678071ef7029 ("mt76: mt7615: clear mcu error interrupt status on 
mt7663") + hostapd commit 14ab4a816c68 ("Reject ap_vendor_elements if
its length is odd") , I was able to connect to an 6GHz AP:

    $ cat > station_sae_test.conf << "EOF"
    country=US
    network={
            scan_ssid=1
            ssid="Maverick6g"
            key_mgmt=SAE
            psk="testtest"
            proto=RSN
            ieee80211w=2
            beacon_int=100
    }
    EOF

    $ ip link set up dev wlp5s0
    $ ./wpa_supplicant -D nl80211 -i wlp6s0 -c ~/station_sae_test.cfg -B
    $ iw dev wlp5s0 link
    Connected to 00:03:7f:12:8c:8c (on wlp5s0)
            SSID: Maverick6g
            freq: 6115
            RX: 3092674 bytes (26805 packets)
            TX: 114756 bytes (1073 packets)
            signal: -49 dBm
            rx bitrate: 1080.6 MBit/s 80MHz HE-MCS 10 HE-NSS 2 HE-GI 0 HE-DCM 0
            tx bitrate: 6.5 MBit/s MCS 0
    
            bss flags:      short-slot-time
            dtim period:    2
            beacon int:     100
    $ ping ff02::1%wlp5s0
    ....
     

Just as note: It is still not possible to see beacons when using the card in 
monitor mode.

Tested-by: Sven Eckelmann <sven@...fation.org>

Kind regards,
	Svem
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ