lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160411114118.GT8413@pali>
Date:	Mon, 11 Apr 2016 13:41:18 +0200
From:	Pali Rohár <pali.rohar@...il.com>
To:	Pavel Machek <pavel@...x.de>
Cc:	"Machani, Yaniv" <yanivma@...com>, "Chalmers, Kevin" <kev@...com>,
	Kalle Valo <kvalo@...eaurora.org>,
	"Davis, Andrew" <afd@...com>, "Mishol, Guy" <guym@...com>,
	Arik Nemtsov <arik@...ery.com>, Gery Kahn <geryk@...com>,
	Felipe Balbi <balbi@...nel.org>,
	David Woodhouse <dwmw2@...radead.org>,
	Aaro Koskinen <aaro.koskinen@....fi>,
	Ben Hutchings <ben@...adent.org.uk>,
	David Gnedt <david.gnedt@...izone.at>,
	Ivaylo Dimitrov <ivo.g.dimitrov.75@...il.com>,
	Sebastian Reichel <sre@...nel.org>,
	Tony Lindgren <tony@...mide.com>,
	"Menon, Nishanth" <nm@...com>,
	"linux-wireless@...r.kernel.org" <linux-wireless@...r.kernel.org>,
	"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: AP firmware for TI wl1251 wifi chip (wl1251-fw-ap.bin)

On Sunday 10 April 2016 13:51:41 Pavel Machek wrote:
> Is it "hardware can't do AP", "firmware can't do AP" or "current drivers 
> do not support AP"?

We know that current linux TI wl1251.ko driver does not support AP. And
I'm still do not know if "hardware can do AP" or not. Also I'm not sure...
maybe current firmware can be "forced" for implementing AP mode.

David Gnedt implemented packet injection for wl1251.ko via JOIN firmware
command. And he wrote me that aircrack utils contains one application
which implementing full AP station in userspace just via packet
injection radiotap (which is supported by wl1251).

So maybe using other firmware (filter) commands together with current
packet injection implementation could be possible to create AP mode
(usable for standard hostapd daemon)? Just thinking...

Anyway, other TI wilink devices have different firmware for AP mode...

-- 
Pali Rohár
pali.rohar@...il.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ