summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: f9bea68)
raw | patch | inline | side by side (parent: f9bea68)
author | Yotam Rubin <yotam@wizery.com> | |
Sun, 25 Dec 2011 15:46:27 +0000 (17:46 +0200) | ||
committer | Arik Nemtsov <arik@wizery.com> | |
Tue, 13 Mar 2012 16:36:29 +0000 (18:36 +0200) |
CONFIG_ROAMING flag was added in Android for roaming and it is
turned off by default.
Also turn on 11N in wpa_supplicant and disable the random-pool (to speed
up connection operations)
Change-Id: I3eb21cc5da656e7686e2f1f8d20df2e86696e788
Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
turned off by default.
Also turn on 11N in wpa_supplicant and disable the random-pool (to speed
up connection operations)
Change-Id: I3eb21cc5da656e7686e2f1f8d20df2e86696e788
Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
wpa_supplicant/android.config | patch | blob | history |
index 78fb88e6825326c978f075d5f2a0ca08e5de0882..50ba00cdf8af30317cae89009a8fc45c8e1a5465 100644 (file)
# Remove support for configuration blobs to reduce code size by about 1.5 kB.
#CONFIG_NO_CONFIG_BLOBS=y
+# wpa_supplicant depends on strong random number generation being available
+# from the operating system. os_get_random() function is used to fetch random
+# data when needed, e.g., for key generation. On Linux and BSD systems, this
+# works by reading /dev/urandom. It should be noted that the OS entropy pool
+# needs to be properly initialized before wpa_supplicant is started. This is
+# important especially on embedded devices that do not have a hardware random
+# number generator and may by default start up with minimal entropy available
+# for random number generation.
+#
+# As a safety net, wpa_supplicant is by default trying to internally collect
+# additional entropy for generating random data to mix in with the data fetched
+# from the OS. This by itself is not considered to be very strong, but it may
+# help in cases where the system pool is not initialized properly. However, it
+# is very strongly recommended that the system pool is initialized with enough
+# entropy either by using hardware assisted random number generatior or by
+# storing state over device reboots.
+#
+# If the os_get_random() is known to provide strong ramdom data (e.g., on
+# Linux/BSD, the board in question is known to have reliable source of random
+# data from /dev/urandom), the internal wpa_supplicant random pool can be
+# disabled. This will save some in binary size and CPU use. However, this
+# should only be considered for builds that are known to be used on devices
+# that meet the requirements described above.
+CONFIG_NO_RANDOM_POOL=y
+
+# IEEE 802.11n (High Throughput) support (mainly for AP mode)
+CONFIG_IEEE80211N=y
+
+# Roaming flag (Android specific)
+# Roaming code is enabled by default in wpa_supplicant, but it is
+# wrapped around this flag in Android.
+CONFIG_ROAMING=y
+
# Select program entry point implementation:
# main = UNIX/POSIX like main() function (default)
# main_winsvc = Windows service (read parameters from registry)