From patchwork Fri Nov 28 01:36:25 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Miaoqing Pan X-Patchwork-Id: 75503 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0C67DCFD2F6 for ; Fri, 28 Nov 2025 01:37:36 +0000 (UTC) Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.6982.1764293847068358605 for ; Thu, 27 Nov 2025 17:37:27 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@qualcomm.com header.s=qcppdkim1 header.b=f431+Y0Z; dkim=pass header.i=@oss.qualcomm.com header.s=google header.b=fVEQ7ctY; spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: oss.qualcomm.com, ip: 205.220.168.131, mailfrom: miaoqing.pan@oss.qualcomm.com) Received: from pps.filterd (m0279862.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 5AS12QlA848995 for ; Fri, 28 Nov 2025 01:37:26 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=qcppdkim1; bh=vixcYnOdoxJ Qt7u5wqqpBVgahqjNkMttdfpPJ9nSr0Y=; b=f431+Y0ZCbb0BPHlahsU9SdvdH7 W/l3BQ4kTRr0Z+5kL8jM8FtgH2NcjM3YTy4MV1gn6F9KSL1pNf0vqzF3n86setjI hLapOAqkoHQXvxrPjBOce06v3SvRx27qvGC6RoQfWhKq8LRSXgCpA56KaZQSyQtM Cvc1NdjP9yE2ilTycUuFvcOcP1m1DuzbJ2eVYmI8m+TDN/AQu72FcNWIiXTfddVd Qm3qhQp6knUaa9KpJKt8y98bK++6PrVERgOLLL7LeRHb2A2QwMxLVcnhKqU2Opc1 J/mQjKgxmrQso4jzY1V69CoA48gvyM/w3D3Iyj+6STqIDwyxNe7+8bv2rAQ== Received: from mail-pj1-f69.google.com (mail-pj1-f69.google.com [209.85.216.69]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4apmjd9s2d-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Fri, 28 Nov 2025 01:37:25 +0000 (GMT) Received: by mail-pj1-f69.google.com with SMTP id 98e67ed59e1d1-3437863d0easo1901046a91.0 for ; Thu, 27 Nov 2025 17:37:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1764293845; x=1764898645; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=vixcYnOdoxJQt7u5wqqpBVgahqjNkMttdfpPJ9nSr0Y=; b=fVEQ7ctYaUzJLgOB4MVNQUSM3UVs/wE4bkQvt20juxuPvPZrtIeGP+jKCzw1TQVd7T CEWAd7Avt5LcV6BzP+l4THYVNohyA4Cz+bh8vykBxQQPCK6E01Ppjw40c4Ou5xgeVawe zltZh1rysXW3kkviwLYBqm7uK4/SkBH8xBU03WcpQFkdIPPYzstKqKDmmrvolMNq2FWZ cQdF11XmRKjGNnVIz7MygOF/gfw3Jh5hmE/jPCIzDpYePYh7k1Fg3tfGJRDZwkhHB2eO StSaiPstRSpGG8GQWTLVoQV3jLTjRznASvJWMTTsnQJgeiIgS+ElQsnC/l/F72HUInU+ pOhg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764293845; x=1764898645; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=vixcYnOdoxJQt7u5wqqpBVgahqjNkMttdfpPJ9nSr0Y=; b=C7XsUsGRyI9eME8zpjnUP/W6hoXyypT/kNbXJJr1mfzmaoRIPPY2fbqUTfKCnIO20i Ek7ZDhrYSRDI4Ycrl29vuu2myT6SEx8R1/Nk2KcoKyY9xArW/UNcsfiurOYlIRGiWPmM IXpXEIQTiqU/6gOs1wJoDoz074oMMWp/zXQK9Iu+18uugeqfxCsN8DkGqO5ad8eyQzGC 5/hFPgn83sIy5Z1hccYI1NLhO1vmAmga/ujf79wvE8jz0zmFCUcQ3eEm776uD2YHY6Tn 7r7nkbzcHAnqnkTOo496WhdAgs8CBO9BYpzsMFtgp1Et+dzjVj58l/MSIr58lmosyAXQ vOzg== X-Gm-Message-State: AOJu0YxYVU0iwYF+BM8I+tk69n1QtSnNuP5djf5bG/2OYX5BMHyZYRzf rtXfPKhNItkLqnSDOFnyTcLk+/ZEzTE+2Pp+how1CWmlQe8j7DANadqOPU7oqFkVOSL+XdyI/s5 lGV8jD54EIFgVgo9N+dZv+LmXvimusQJNQggZDXt/N1SdC8VGxQesLpcsPwx/oysh+jZZH/anVk Dk3bpDEUa+NRjVGzwB9Q== X-Gm-Gg: ASbGncsGp5tPUjqkDfDu5YLJvSLfW7tSAKADJAL9xbs8JqItuFIjxfZmpZIswwwedfW vdvoXsj6S7/8Hxa29QpfdLfI6WylVGMK5Ib1u3ht+n64sjPvju4otqFiY1HAnyQB2JefOTopezG b5hJ1wJ5ZSgdlN3LljuxzKQOf+xKFm5x2A/QPIrKHBHoehjthuoFDuElWqUO+IdBViqHMZvMoUp VQQbQdRP/QooUQV2gEISjsoYPEVWxSqK1gk0NRma7fmuMCJtAR6EnHXPmPik+vl7XylrXKbb6Jg pLt6c3iKAear4gRctWMlSoEIEpXPQ4ZX4vf5VBUDAZucJIhRYL5ukKokPEZy86LbVZL2fm4dLYr ZvK/o/I8deiaESaCyDmkmXUTro9SvuPohXf68c8A/izsWQIAJhgaOFxkfa/Poj8JXJU0J X-Received: by 2002:a17:90b:48c3:b0:343:bd86:b5a6 with SMTP id 98e67ed59e1d1-34733f51605mr22659056a91.34.1764293844520; Thu, 27 Nov 2025 17:37:24 -0800 (PST) X-Google-Smtp-Source: AGHT+IGoA/3uZsjKCWNh25z4tbRE89+kdK0fzjWr899k/1iVGPG2OfZ21XYaYdwZATKS6KqcGOL0xA== X-Received: by 2002:a17:90b:48c3:b0:343:bd86:b5a6 with SMTP id 98e67ed59e1d1-34733f51605mr22659004a91.34.1764293843559; Thu, 27 Nov 2025 17:37:23 -0800 (PST) Received: from Z2-SFF-G9-MQ.ap.qualcomm.com (i-global052.qualcomm.com. [199.106.103.52]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3477b732e5dsm2943858a91.10.2025.11.27.17.37.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 17:37:17 -0800 (PST) From: Miaoqing Pan To: openembedded-core@lists.openembedded.org Cc: dmitry.baryshkov@oss.qualcomm.com, Miaoqing Pan Subject: [PATCH v3 1/4] wpa-supplicant: restore use of packaged defconfig Date: Fri, 28 Nov 2025 09:36:25 +0800 Message-Id: <20251128013628.2187455-2-miaoqing.pan@oss.qualcomm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> References: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> MIME-Version: 1.0 X-Proofpoint-GUID: V0DYdJ0EWF2N8AYq3yHIVVZjlsgBAO_q X-Proofpoint-ORIG-GUID: V0DYdJ0EWF2N8AYq3yHIVVZjlsgBAO_q X-Authority-Analysis: v=2.4 cv=OPcqHCaB c=1 sm=1 tr=0 ts=6928fcd6 cx=c_pps a=vVfyC5vLCtgYJKYeQD43oA==:117 a=b9+bayejhc3NMeqCNyeLQQ==:17 a=6UeiqGixMTsA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=VwQbUJbxAAAA:8 a=yaAG3qJ-AAAA:8 a=EUspDBNiAAAA:8 a=14Y-O5i4P_BUvtjYldMA:9 a=W7WeN97V9vU_l5Eb:21 a=rl5im9kqc5Lf4LNbBjHf:22 a=oLVlbjkABFOu4cUI0CGI:22 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMTI4MDAxMCBTYWx0ZWRfX9sct5HdUYUk0 DL93wyJqxUdO8QQxgqeoRIQHbgtxagJvsUCGWFIUYFFRjAaEI0aLXZ+UMIzLC9n+9ADgOxZaO5V EKKhjVHDGa4amST1f3JGNHUEgpmiy3LGigba2/IF/bKESliC1whgfVB0Rme5rF9V/a7B5iji9/N 2TRDtMpyJhw0ydD0na4OMtzsaRzop9jh7ow6Yh1P/yuPUUBFcJt7+GGVBSy9dV6hPOm4+p/K9RR Z/9dB069hWIr6JzmBYzHLfoegJlBnJia56wNWZh6l1dhLXU8iIPbGC9qm5NtzkTmRJWHpZ3LrlA qxi2TUu+AMw0OY35lQz8muaFNvyMudhh0h/ZLl7HF6HRIFleHVq1M49pJv+FLg45HWlCGwGGWjO BexLpW/hLcOH/JW9BW0BRa9v/nBrPg== X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2025-11-25_02,2025-11-27_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 adultscore=0 lowpriorityscore=0 impostorscore=0 clxscore=1015 spamscore=0 malwarescore=0 phishscore=0 suspectscore=0 priorityscore=1501 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510240001 definitions=main-2511280010 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 28 Nov 2025 01:37:36 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/226874 Commit d97bedd8bdcc ("wpa-supplicant: Use upstream defconfig") switched to the upstream defconfig, but the upstream file is only an example and is not intended for builds. It may change or fail to reflect a stable baseline configuration. Restore the packaged defconfig from version 2.11 to ensure a consistent baseline and simplify enabling additional options. Fixes: d97bedd8bdcc ("wpa-supplicant: Use upstream defconfig") Signed-off-by: Miaoqing Pan --- .../wpa-supplicant/wpa-supplicant/defconfig | 688 ++++++++++++++++++ .../wpa-supplicant/wpa-supplicant_2.11.bb | 5 +- 2 files changed, 692 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig new file mode 100644 index 0000000000..52befd8f15 --- /dev/null +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig @@ -0,0 +1,688 @@ +# Example wpa_supplicant build time configuration +# +# This file lists the configuration options that are used when building the +# wpa_supplicant binary. All lines starting with # are ignored. Configuration +# option lines must be commented out complete, if they are not to be included, +# i.e., just setting VARIABLE=n is not disabling that variable. +# +# This file is included in Makefile, so variables like CFLAGS and LIBS can also +# be modified from here. In most cases, these lines should use += in order not +# to override previous values of the variables. + + +# Uncomment following two lines and fix the paths if you have installed OpenSSL +# or GnuTLS in non-default location +#CFLAGS += -I/usr/local/openssl/include +#LIBS += -L/usr/local/openssl/lib + +# Some Red Hat versions seem to include kerberos header files from OpenSSL, but +# the kerberos files are not in the default include path. Following line can be +# used to fix build issues on such systems (krb5.h not found). +#CFLAGS += -I/usr/include/kerberos + +# Driver interface for generic Linux wireless extensions +# Note: WEXT is deprecated in the current Linux kernel version and no new +# functionality is added to it. nl80211-based interface is the new +# replacement for WEXT and its use allows wpa_supplicant to properly control +# the driver to improve existing functionality like roaming and to support new +# functionality. +CONFIG_DRIVER_WEXT=y + +# Driver interface for Linux drivers using the nl80211 kernel interface +CONFIG_DRIVER_NL80211=y + +# QCA vendor extensions to nl80211 +#CONFIG_DRIVER_NL80211_QCA=y + +# driver_nl80211.c requires libnl. If you are compiling it yourself +# you may need to point hostapd to your version of libnl. +# +#CFLAGS += -I$ +#LIBS += -L$ + +# Use libnl v2.0 (or 3.0) libraries. +#CONFIG_LIBNL20=y + +# Use libnl 3.2 libraries (if this is selected, CONFIG_LIBNL20 is ignored) +CONFIG_LIBNL32=y + + +# Driver interface for FreeBSD net80211 layer (e.g., Atheros driver) +#CONFIG_DRIVER_BSD=y +#CFLAGS += -I/usr/local/include +#LIBS += -L/usr/local/lib +#LIBS_p += -L/usr/local/lib +#LIBS_c += -L/usr/local/lib + +# Driver interface for Windows NDIS +#CONFIG_DRIVER_NDIS=y +#CFLAGS += -I/usr/include/w32api/ddk +#LIBS += -L/usr/local/lib +# For native build using mingw +#CONFIG_NATIVE_WINDOWS=y +# Additional directories for cross-compilation on Linux host for mingw target +#CFLAGS += -I/opt/mingw/mingw32/include/ddk +#LIBS += -L/opt/mingw/mingw32/lib +#CC=mingw32-gcc +# By default, driver_ndis uses WinPcap for low-level operations. This can be +# replaced with the following option which replaces WinPcap calls with NDISUIO. +# However, this requires that WZC is disabled (net stop wzcsvc) before starting +# wpa_supplicant. +# CONFIG_USE_NDISUIO=y + +# Driver interface for wired Ethernet drivers +CONFIG_DRIVER_WIRED=y + +# Driver interface for MACsec capable Qualcomm Atheros drivers +#CONFIG_DRIVER_MACSEC_QCA=y + +# Driver interface for Linux MACsec drivers +CONFIG_DRIVER_MACSEC_LINUX=y + +# Driver interface for the Broadcom RoboSwitch family +#CONFIG_DRIVER_ROBOSWITCH=y + +# Driver interface for no driver (e.g., WPS ER only) +#CONFIG_DRIVER_NONE=y + +# Solaris libraries +#LIBS += -lsocket -ldlpi -lnsl +#LIBS_c += -lsocket + +# Enable IEEE 802.1X Supplicant (automatically included if any EAP method or +# MACsec is included) +CONFIG_IEEE8021X_EAPOL=y + +# EAP-MD5 +CONFIG_EAP_MD5=y + +# EAP-MSCHAPv2 +CONFIG_EAP_MSCHAPV2=y + +# EAP-TLS +CONFIG_EAP_TLS=y +# Enable EAP-TLSv1.3 support by default (currently disabled unless explicitly +# enabled in network configuration) +#CONFIG_EAP_TLSV1_3=y + +# EAL-PEAP +CONFIG_EAP_PEAP=y + +# EAP-TTLS +CONFIG_EAP_TTLS=y + +# EAP-FAST +CONFIG_EAP_FAST=y + +# EAP-TEAP +# Note: The current EAP-TEAP implementation is experimental and should not be +# enabled for production use. The IETF RFC 7170 that defines EAP-TEAP has number +# of conflicting statements and missing details and the implementation has +# vendor specific workarounds for those and as such, may not interoperate with +# any other implementation. This should not be used for anything else than +# experimentation and interoperability testing until those issues has been +# resolved. +#CONFIG_EAP_TEAP=y + +# EAP-GTC +CONFIG_EAP_GTC=y + +# EAP-OTP +CONFIG_EAP_OTP=y + +# EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) +#CONFIG_EAP_SIM=y + +# Enable SIM simulator (Milenage) for EAP-SIM +#CONFIG_SIM_SIMULATOR=y + +# EAP-PSK (experimental; this is _not_ needed for WPA-PSK) +#CONFIG_EAP_PSK=y + +# EAP-pwd (secure authentication using only a password) +CONFIG_EAP_PWD=y + +# EAP-PAX +CONFIG_EAP_PAX=y + +# LEAP +CONFIG_EAP_LEAP=y + +# EAP-AKA (enable CONFIG_PCSC, if EAP-AKA is used) +#CONFIG_EAP_AKA=y + +# EAP-AKA' (enable CONFIG_PCSC, if EAP-AKA' is used). +# This requires CONFIG_EAP_AKA to be enabled, too. +#CONFIG_EAP_AKA_PRIME=y + +# Enable USIM simulator (Milenage) for EAP-AKA +#CONFIG_USIM_SIMULATOR=y + +# EAP-SAKE +CONFIG_EAP_SAKE=y + +# EAP-GPSK +CONFIG_EAP_GPSK=y +# Include support for optional SHA256 cipher suite in EAP-GPSK +CONFIG_EAP_GPSK_SHA256=y + +# EAP-TNC and related Trusted Network Connect support (experimental) +CONFIG_EAP_TNC=y + +# Wi-Fi Protected Setup (WPS) +CONFIG_WPS=y +# Enable WPS external registrar functionality +#CONFIG_WPS_ER=y +# Disable credentials for an open network by default when acting as a WPS +# registrar. +#CONFIG_WPS_REG_DISABLE_OPEN=y +# Enable WPS support with NFC config method +#CONFIG_WPS_NFC=y + +# EAP-IKEv2 +CONFIG_EAP_IKEV2=y + +# EAP-EKE +#CONFIG_EAP_EKE=y + +# MACsec +CONFIG_MACSEC=y + +# PKCS#12 (PFX) support (used to read private key and certificate file from +# a file that usually has extension .p12 or .pfx) +CONFIG_PKCS12=y + +# Smartcard support (i.e., private key on a smartcard), e.g., with openssl +# engine. +CONFIG_SMARTCARD=y + +# PC/SC interface for smartcards (USIM, GSM SIM) +# Enable this if EAP-SIM or EAP-AKA is included +#CONFIG_PCSC=y + +# Support HT overrides (disable HT/HT40, mask MCS rates, etc.) +#CONFIG_HT_OVERRIDES=y + +# Support VHT overrides (disable VHT, mask MCS rates, etc.) +#CONFIG_VHT_OVERRIDES=y + +# Support HE overrides +#CONFIG_HE_OVERRIDES=y + +# Development testing +#CONFIG_EAPOL_TEST=y + +# Support IPv6 +CONFIG_IPV6=y + +# Select control interface backend for external programs, e.g, wpa_cli: +# unix = UNIX domain sockets (default for Linux/*BSD) +# udp = UDP sockets using localhost (127.0.0.1) +# udp6 = UDP IPv6 sockets using localhost (::1) +# named_pipe = Windows Named Pipe (default for Windows) +# udp-remote = UDP sockets with remote access (only for tests systems/purpose) +# udp6-remote = UDP IPv6 sockets with remote access (only for tests purpose) +# y = use default (backwards compatibility) +# If this option is commented out, control interface is not included in the +# build. +CONFIG_CTRL_IFACE=y + +# Include support for GNU Readline and History Libraries in wpa_cli. +# When building a wpa_cli binary for distribution, please note that these +# libraries are licensed under GPL and as such, BSD license may not apply for +# the resulting binary. +#CONFIG_READLINE=y + +# Include internal line edit mode in wpa_cli. This can be used as a replacement +# for GNU Readline to provide limited command line editing and history support. +#CONFIG_WPA_CLI_EDIT=y + +# Remove debugging code that is printing out debug message to stdout. +# This can be used to reduce the size of the wpa_supplicant considerably +# if debugging code is not needed. The size reduction can be around 35% +# (e.g., 90 kB). +#CONFIG_NO_STDOUT_DEBUG=y + +# Remove WPA support, e.g., for wired-only IEEE 802.1X supplicant, to save +# 35-50 kB in code size. +#CONFIG_NO_WPA=y + +# Remove IEEE 802.11i/WPA-Personal ASCII passphrase support +# This option can be used to reduce code size by removing support for +# converting ASCII passphrases into PSK. If this functionality is removed, the +# PSK can only be configured as the 64-octet hexstring (e.g., from +# wpa_passphrase). This saves about 0.5 kB in code size. +#CONFIG_NO_WPA_PASSPHRASE=y + +# Simultaneous Authentication of Equals (SAE), WPA3-Personal +CONFIG_SAE=y + +# SAE Public Key, WPA3-Personal +#CONFIG_SAE_PK=y + +# Disable scan result processing (ap_scan=1) to save code size by about 1 kB. +# This can be used if ap_scan=1 mode is never enabled. +#CONFIG_NO_SCAN_PROCESSING=y + +# Select configuration backend: +# file = text file (e.g., wpa_supplicant.conf; note: the configuration file +# path is given on command line, not here; this option is just used to +# select the backend that allows configuration files to be used) +# winreg = Windows registry (see win_example.reg for an example) +CONFIG_BACKEND=file + +# Remove configuration write functionality (i.e., to allow the configuration +# file to be updated based on runtime configuration changes). The runtime +# configuration can still be changed, the changes are just not going to be +# persistent over restarts. This option can be used to reduce code size by +# about 3.5 kB. +#CONFIG_NO_CONFIG_WRITE=y + +# Remove support for configuration blobs to reduce code size by about 1.5 kB. +#CONFIG_NO_CONFIG_BLOBS=y + +# Select program entry point implementation: +# main = UNIX/POSIX like main() function (default) +# main_winsvc = Windows service (read parameters from registry) +# main_none = Very basic example (development use only) +#CONFIG_MAIN=main + +# Select wrapper for operating system and C library specific functions +# unix = UNIX/POSIX like systems (default) +# win32 = Windows systems +# none = Empty template +#CONFIG_OS=unix + +# Select event loop implementation +# eloop = select() loop (default) +# eloop_win = Windows events and WaitForMultipleObject() loop +#CONFIG_ELOOP=eloop + +# Should we use poll instead of select? Select is used by default. +#CONFIG_ELOOP_POLL=y + +# Should we use epoll instead of select? Select is used by default. +#CONFIG_ELOOP_EPOLL=y + +# Should we use kqueue instead of select? Select is used by default. +#CONFIG_ELOOP_KQUEUE=y + +# Select layer 2 packet implementation +# linux = Linux packet socket (default) +# pcap = libpcap/libdnet/WinPcap +# freebsd = FreeBSD libpcap +# winpcap = WinPcap with receive thread +# ndis = Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y) +# none = Empty template +#CONFIG_L2_PACKET=linux + +# Disable Linux packet socket workaround applicable for station interface +# in a bridge for EAPOL frames. This should be uncommented only if the kernel +# is known to not have the regression issue in packet socket behavior with +# bridge interfaces (commit 'bridge: respect RFC2863 operational state')'). +#CONFIG_NO_LINUX_PACKET_SOCKET_WAR=y + +# Support Operating Channel Validation +#CONFIG_OCV=y + +# Select TLS implementation +# openssl = OpenSSL (default) +# gnutls = GnuTLS +# internal = Internal TLSv1 implementation (experimental) +# linux = Linux kernel AF_ALG and internal TLSv1 implementation (experimental) +# none = Empty template +#CONFIG_TLS=openssl + +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1) +# can be enabled to get a stronger construction of messages when block ciphers +# are used. It should be noted that some existing TLS v1.0 -based +# implementation may not be compatible with TLS v1.1 message (ClientHello is +# sent prior to negotiating which version will be used) +#CONFIG_TLSV11=y + +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2) +# can be enabled to enable use of stronger crypto algorithms. It should be +# noted that some existing TLS v1.0 -based implementation may not be compatible +# with TLS v1.2 message (ClientHello is sent prior to negotiating which version +# will be used) +#CONFIG_TLSV12=y + +# Select which ciphers to use by default with OpenSSL if the user does not +# specify them. +#CONFIG_TLS_DEFAULT_CIPHERS="DEFAULT:!EXP:!LOW" + +# If CONFIG_TLS=internal is used, additional library and include paths are +# needed for LibTomMath. Alternatively, an integrated, minimal version of +# LibTomMath can be used. See beginning of libtommath.c for details on benefits +# and drawbacks of this option. +#CONFIG_INTERNAL_LIBTOMMATH=y +#ifndef CONFIG_INTERNAL_LIBTOMMATH +#LTM_PATH=/usr/src/libtommath-0.39 +#CFLAGS += -I$(LTM_PATH) +#LIBS += -L$(LTM_PATH) +#LIBS_p += -L$(LTM_PATH) +#endif +# At the cost of about 4 kB of additional binary size, the internal LibTomMath +# can be configured to include faster routines for exptmod, sqr, and div to +# speed up DH and RSA calculation considerably +#CONFIG_INTERNAL_LIBTOMMATH_FAST=y + +# Include NDIS event processing through WMI into wpa_supplicant/wpasvc. +# This is only for Windows builds and requires WMI-related header files and +# WbemUuid.Lib from Platform SDK even when building with MinGW. +#CONFIG_NDIS_EVENTS_INTEGRATED=y +#PLATFORMSDKLIB="/opt/Program Files/Microsoft Platform SDK/Lib" + +# Add support for new DBus control interface +# (fi.w1.wpa_supplicant1) +CONFIG_CTRL_IFACE_DBUS_NEW=y + +# Add introspection support for new DBus control interface +CONFIG_CTRL_IFACE_DBUS_INTRO=y + +# Add support for loading EAP methods dynamically as shared libraries. +# When this option is enabled, each EAP method can be either included +# statically (CONFIG_EAP_=y) or dynamically (CONFIG_EAP_=dyn). +# Dynamic EAP methods are build as shared objects (eap_*.so) and they need to +# be loaded in the beginning of the wpa_supplicant configuration file +# (see load_dynamic_eap parameter in the example file) before being used in +# the network blocks. +# +# Note that some shared parts of EAP methods are included in the main program +# and in order to be able to use dynamic EAP methods using these parts, the +# main program must have been build with the EAP method enabled (=y or =dyn). +# This means that EAP-TLS/PEAP/TTLS/FAST cannot be added as dynamic libraries +# unless at least one of them was included in the main build to force inclusion +# of the shared code. Similarly, at least one of EAP-SIM/AKA must be included +# in the main build to be able to load these methods dynamically. +# +# Please also note that using dynamic libraries will increase the total binary +# size. Thus, it may not be the best option for targets that have limited +# amount of memory/flash. +#CONFIG_DYNAMIC_EAP_METHODS=y + +# Dynamic library loading + +# Add the ability to configure libraries to load at compile time. +# If set, these disable dynamic configuration. +#CONFIG_PKCS11_ENGINE_PATH - pkcs11_engine library location. +#CONFIG_PKCS11_MODULE_PATH - pkcs11_module library location. +#CONFIG_OPENSC_ENGINE_PATH - opensc_engine library location. +# +# Prevent library loading at runtime +#CONFIG_NO_PKCS11_ENGINE_PATH=y # prevents loading pkcs11_engine library. +#CONFIG_NO_PKCS11_MODULE_PATH=y # prevents loading pkcs11_module library. +# CONFIG_NO_OPENSC_ENGINE_PATH=y # prevents loading opensc_engine library. + +# Prevents loading EAP libraries at runtime +#CONFIG_NO_LOAD_DYNAMIC_EAP=y + +# IEEE Std 802.11r-2008 (Fast BSS Transition) for station mode +CONFIG_IEEE80211R=y + +# Add support for writing debug log to a file (/tmp/wpa_supplicant-log-#.txt) +CONFIG_DEBUG_FILE=y + +# Send debug messages to syslog instead of stdout +CONFIG_DEBUG_SYSLOG=y +# Set syslog facility for debug messages +#CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON + +# Add support for sending all debug messages (regardless of debug verbosity) +# to the Linux kernel tracing facility. This helps debug the entire stack by +# making it easy to record everything happening from the driver up into the +# same file, e.g., using trace-cmd. +#CONFIG_DEBUG_LINUX_TRACING=y + +# Add support for writing debug log to Android logcat instead of standard +# output +#CONFIG_ANDROID_LOG=y + +# Enable privilege separation (see README 'Privilege separation' for details) +#CONFIG_PRIVSEP=y + +# Enable mitigation against certain attacks against TKIP by delaying Michael +# MIC error reports by a random amount of time between 0 and 60 seconds +#CONFIG_DELAYED_MIC_ERROR_REPORT=y + +# Enable tracing code for developer debugging +# This tracks use of memory allocations and other registrations and reports +# incorrect use with a backtrace of call (or allocation) location. +#CONFIG_WPA_TRACE=y +# For BSD, uncomment these. +#LIBS += -lexecinfo +#LIBS_p += -lexecinfo +#LIBS_c += -lexecinfo + +# Use libbfd to get more details for developer debugging +# This enables use of libbfd to get more detailed symbols for the backtraces +# generated by CONFIG_WPA_TRACE=y. +#CONFIG_WPA_TRACE_BFD=y +# For BSD, uncomment these. +#LIBS += -lbfd -liberty -lz +#LIBS_p += -lbfd -liberty -lz +#LIBS_c += -lbfd -liberty -lz + +# wpa_supplicant depends on strong random number generation being available +# from the operating system. os_get_random() function is used to fetch random +# data when needed, e.g., for key generation. On Linux and BSD systems, this +# works by reading /dev/urandom. It should be noted that the OS entropy pool +# needs to be properly initialized before wpa_supplicant is started. This is +# important especially on embedded devices that do not have a hardware random +# number generator and may by default start up with minimal entropy available +# for random number generation. +# +# As a safety net, wpa_supplicant is by default trying to internally collect +# additional entropy for generating random data to mix in with the data fetched +# from the OS. This by itself is not considered to be very strong, but it may +# help in cases where the system pool is not initialized properly. However, it +# is very strongly recommended that the system pool is initialized with enough +# entropy either by using hardware assisted random number generator or by +# storing state over device reboots. +# +# wpa_supplicant can be configured to maintain its own entropy store over +# restarts to enhance random number generation. This is not perfect, but it is +# much more secure than using the same sequence of random numbers after every +# reboot. This can be enabled with -e command line option. The +# specified file needs to be readable and writable by wpa_supplicant. +# +# If the os_get_random() is known to provide strong random data (e.g., on +# Linux/BSD, the board in question is known to have reliable source of random +# data from /dev/urandom), the internal wpa_supplicant random pool can be +# disabled. This will save some in binary size and CPU use. However, this +# should only be considered for builds that are known to be used on devices +# that meet the requirements described above. +#CONFIG_NO_RANDOM_POOL=y + +# Should we attempt to use the getrandom(2) call that provides more reliable +# yet secure randomness source than /dev/random on Linux 3.17 and newer. +# Requires glibc 2.25 to build, falls back to /dev/random if unavailable. +#CONFIG_GETRANDOM=y + +# IEEE 802.11ac (Very High Throughput) support (mainly for AP mode) +CONFIG_IEEE80211AC=y + +# IEEE 802.11ax HE support (mainly for AP mode) +CONFIG_IEEE80211AX=y + +# IEEE 802.11be EHT support (mainly for AP mode) +# CONFIG_IEEE80211AX is mandatory for setting CONFIG_IEEE80211BE. +# Note: This is experimental and work in progress. The definitions are still +# subject to change and this should not be expected to interoperate with the +# final IEEE 802.11be version. +#CONFIG_IEEE80211BE=y + +# Wireless Network Management (IEEE Std 802.11v-2011) +# Note: This is experimental and not complete implementation. +#CONFIG_WNM=y + +# Interworking (IEEE 802.11u) +# This can be used to enable functionality to improve interworking with +# external networks (GAS/ANQP to learn more about the networks and network +# selection based on available credentials). +CONFIG_INTERWORKING=y + +# Hotspot 2.0 +CONFIG_HS20=y + +# Enable interface matching in wpa_supplicant +#CONFIG_MATCH_IFACE=y + +# Disable roaming in wpa_supplicant +#CONFIG_NO_ROAMING=y + +# AP mode operations with wpa_supplicant +# This can be used for controlling AP mode operations with wpa_supplicant. It +# should be noted that this is mainly aimed at simple cases like +# WPA2-Personal while more complex configurations like WPA2-Enterprise with an +# external RADIUS server can be supported with hostapd. +CONFIG_AP=y + +# P2P (Wi-Fi Direct) +# This can be used to enable P2P support in wpa_supplicant. See README-P2P for +# more information on P2P operations. +CONFIG_P2P=y + +# Enable TDLS support +CONFIG_TDLS=y + +# Wi-Fi Display +# This can be used to enable Wi-Fi Display extensions for P2P using an external +# program to control the additional information exchanges in the messages. +CONFIG_WIFI_DISPLAY=y + +# Autoscan +# This can be used to enable automatic scan support in wpa_supplicant. +# See wpa_supplicant.conf for more information on autoscan usage. +# +# Enabling directly a module will enable autoscan support. +# For exponential module: +#CONFIG_AUTOSCAN_EXPONENTIAL=y +# For periodic module: +#CONFIG_AUTOSCAN_PERIODIC=y + +# Password (and passphrase, etc.) backend for external storage +# These optional mechanisms can be used to add support for storing passwords +# and other secrets in external (to wpa_supplicant) location. This allows, for +# example, operating system specific key storage to be used +# +# External password backend for testing purposes (developer use) +#CONFIG_EXT_PASSWORD_TEST=y +# File-based backend to read passwords from an external file. +#CONFIG_EXT_PASSWORD_FILE=y + +# Enable Fast Session Transfer (FST) +#CONFIG_FST=y + +# Enable CLI commands for FST testing +#CONFIG_FST_TEST=y + +# OS X builds. This is only for building eapol_test. +#CONFIG_OSX=y + +# Automatic Channel Selection +# This will allow wpa_supplicant to pick the channel automatically when channel +# is set to "0". +# +# TODO: Extend parser to be able to parse "channel=acs_survey" as an alternative +# to "channel=0". This would enable us to eventually add other ACS algorithms in +# similar way. +# +# Automatic selection is currently only done through initialization, later on +# we hope to do background checks to keep us moving to more ideal channels as +# time goes by. ACS is currently only supported through the nl80211 driver and +# your driver must have survey dump capability that is filled by the driver +# during scanning. +# +# TODO: In analogy to hostapd be able to customize the ACS survey algorithm with +# a newly to create wpa_supplicant.conf variable acs_num_scans. +# +# Supported ACS drivers: +# * ath9k +# * ath5k +# * ath10k +# +# For more details refer to: +# http://wireless.kernel.org/en/users/Documentation/acs +#CONFIG_ACS=y + +# Support Multi Band Operation +#CONFIG_MBO=y + +# Fast Initial Link Setup (FILS) (IEEE 802.11ai) +#CONFIG_FILS=y +# FILS shared key authentication with PFS +#CONFIG_FILS_SK_PFS=y + +# Support RSN on IBSS networks +# This is needed to be able to use mode=1 network profile with proto=RSN and +# key_mgmt=WPA-PSK (i.e., full key management instead of WPA-None). +CONFIG_IBSS_RSN=y + +# External PMKSA cache control +# This can be used to enable control interface commands that allow the current +# PMKSA cache entries to be fetched and new entries to be added. +#CONFIG_PMKSA_CACHE_EXTERNAL=y + +# Mesh Networking (IEEE 802.11s) +#CONFIG_MESH=y + +# Background scanning modules +# These can be used to request wpa_supplicant to perform background scanning +# operations for roaming within an ESS (same SSID). See the bgscan parameter in +# the wpa_supplicant.conf file for more details. +# Periodic background scans based on signal strength +CONFIG_BGSCAN_SIMPLE=y +# Learn channels used by the network and try to avoid bgscans on other +# channels (experimental) +#CONFIG_BGSCAN_LEARN=y + +# Opportunistic Wireless Encryption (OWE) +# Experimental implementation of draft-harkins-owe-07.txt +#CONFIG_OWE=y + +# Device Provisioning Protocol (DPP) (also known as Wi-Fi Easy Connect) +CONFIG_DPP=y +# DPP version 2 support +CONFIG_DPP2=y +# DPP version 3 support (experimental and still changing; do not enable for +# production use) +#CONFIG_DPP3=y + +# Wired equivalent privacy (WEP) +# WEP is an obsolete cryptographic data confidentiality algorithm that is not +# considered secure. It should not be used for anything anymore. The +# functionality needed to use WEP is available in the current wpa_supplicant +# release under this optional build parameter. This functionality is subject to +# be completely removed in a future release. +#CONFIG_WEP=y + +# Remove all TKIP functionality +# TKIP is an old cryptographic data confidentiality algorithm that is not +# considered secure. It should not be used anymore for anything else than a +# backwards compatibility option as a group cipher when connecting to APs that +# use WPA+WPA2 mixed mode. For now, the default wpa_supplicant build includes +# support for this by default, but that functionality is subject to be removed +# in the future. +#CONFIG_NO_TKIP=y + +# Pre-Association Security Negotiation (PASN) +# Experimental implementation based on IEEE P802.11z/D2.6 and the protocol +# design is still subject to change. As such, this should not yet be enabled in +# production use. +#CONFIG_PASN=y + +# Disable support for Radio Measurement (IEEE 802.11k) and supported operating +# class indication. Removing these is not recommended since they can help the +# AP manage the network and STA steering. +#CONFIG_NO_RRM=y + +# Disable support for Robust AV streaming for consumer and enterprise Wi-Fi +# applications; IEEE Std 802.11-2020, 4.3.24; SCS, MSCS, QoS Management +#CONFIG_NO_ROBUST_AV=y + +# Disable support for WMM admission control +#CONFIG_NO_WMM_AC=y + +# Wi-Fi Aware unsynchronized service discovery (NAN USD) +#CONFIG_NAN_USD=y diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb index ffb1cf617d..b9a8964439 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb @@ -11,6 +11,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=5ebcb90236d1ad640558c3d3cd3035df \ DEPENDS = "dbus libnl" SRC_URI = "http://w1.fi/releases/wpa_supplicant-${PV}.tar.gz \ + file://defconfig \ file://wpa-supplicant.sh \ file://wpa_supplicant.conf \ file://wpa_supplicant.conf-sane \ @@ -37,7 +38,9 @@ EXTRA_OEMAKE = "'LIBDIR=${libdir}' 'INCDIR=${includedir}' 'BINDIR=${sbindir}'" do_configure () { ${MAKE} -C wpa_supplicant clean - sed -e '/^CONFIG_TLS=/d' wpa_supplicant/.config + install -m 0755 ${UNPACKDIR}/defconfig wpa_supplicant/.config + + sed -i '/CONFIG_TLS=/d' wpa_supplicant/.config if ${@ bb.utils.contains('PACKAGECONFIG', 'openssl', 'true', 'false', d) }; then echo 'CONFIG_TLS=openssl' >>wpa_supplicant/.config From patchwork Fri Nov 28 01:36:26 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Miaoqing Pan X-Patchwork-Id: 75504 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 067B7D111A8 for ; Fri, 28 Nov 2025 01:37:56 +0000 (UTC) Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7081.1764293869065527433 for ; Thu, 27 Nov 2025 17:37:49 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@qualcomm.com header.s=qcppdkim1 header.b=H+YFQeSv; dkim=pass header.i=@oss.qualcomm.com header.s=google header.b=VKz5tHzf; spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: oss.qualcomm.com, ip: 205.220.180.131, mailfrom: miaoqing.pan@oss.qualcomm.com) Received: from pps.filterd (m0279871.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 5AS0tlPV785486 for ; Fri, 28 Nov 2025 01:37:47 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=qcppdkim1; bh=N7dzE72mm7E PeSTaoPphBQe3X8weP71qva/janqpAlM=; b=H+YFQeSvP96A3Mj+KoWNPYvuOa/ CpryPrZy44khTgSTK342SB+wczK1fmvgu2H3fCsAd3ixH+dCCx9UQFAZ9DNcRyrY 4UPs8P54BAHVixseJ9d3lzNc7JZBOSPxvfn6GVOXKZ5+CXXIkT3ti2KLyBbX3LFL 3xtBWY8THNHAjhjsGFI76jnrcFnlQqys9XZQRD+jkTrL4cfwdQMI1yDvOLtYncjB uVkMWoEpqPRY5qaQisiXjlw/ExPWbmTD+Zn9piwdxZxhmi9IcxOVjCgo+qiA4ka4 ihtHA+N4NrpwNl3QHpkTIcfFWH3Halk8GBDAK9FjFHrzEv4pZoLLk1a7lFQ== Received: from mail-pj1-f72.google.com (mail-pj1-f72.google.com [209.85.216.72]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4apm61su0c-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Fri, 28 Nov 2025 01:37:47 +0000 (GMT) Received: by mail-pj1-f72.google.com with SMTP id 98e67ed59e1d1-3416dc5752aso3921040a91.1 for ; Thu, 27 Nov 2025 17:37:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1764293866; x=1764898666; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=N7dzE72mm7EPeSTaoPphBQe3X8weP71qva/janqpAlM=; b=VKz5tHzfrC7F8NG7VQtGbEGo1G3z3PfngfnQpuZ1gbSq2ca3JuYcwC660UzOiJ2nA0 pvaVyvUhYyNvkmiXq2Lrtj+xin+ajN8ULEKvhlgQdgDLg5JCfZJJbKzGWIxPY+OzwZ+E axL5xAPDDr060kfUnALnkS12o014Crb/QICPua7kOKH7hu7rBj2cMUgR9IPTLbhuru9B tAeTg36qkP4a5T/o7QGWpypjkR2TVBC1se50/qQgm8xTN9TV82MNyI5/Wof2SEkjUrDp 6+Th4+NEmSiW0PhZ+SOAyKemsBGcJRUL4ORzYQ39eJ76v3NxVnfRTbhS21TFXgflinx5 Q3wg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764293866; x=1764898666; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=N7dzE72mm7EPeSTaoPphBQe3X8weP71qva/janqpAlM=; b=RU1pHVlF1hinqjMov0ZLUePHpue/AKI0+52NQV3kNVFBc2+RfbFeqcQlbRWTEUirpy DUCWWs6bmTQXGY280AwUJVexMEHLa/n3X6aiLlS/kBciu5yB0ki0ZJjHNb/CTX6J764d enk4FYc7X8jZgUr+E1jdEv8md8VdsvKHe5NvhO/d/kEsxF5qlFwzQ5cXSeUIcvUyx0c9 9XtJKlhv72dg1AczHXg1XvwKEb9LQt4Mw4JFsCDAZivOEI3SWM+KS2Rzk6kWXsmT20gt fDe69L3XGaYzaeuVl1MmrZeNjSAwEv4OIDp4TC6S+vLyuCNeeVFdABQ9svS4I1F/FWih q+wQ== X-Gm-Message-State: AOJu0Yy7jD97AXEqOl7ES8678KzOJhfHTMSqdFKDrE5AAapPupDS7SdB t1/H1nDZPDcZ2woy5E//zTp4zfjebnoUCu610pyZKlEkEcW2rzv4a7c+E2wVCTS1QkG9tSR6ItY /rQGHya/tBIB4n0gB8WnUseDNOMOLIJHhhg00nJsrLVHr7pbzWbOZKEXlJmfy0i+OdyIAzcl1SK 0gqm2x1Ucx6bZFCk+mtw== X-Gm-Gg: ASbGncvU03893s24mgXndSyWpygZ3R9nzS6iywoXj4EJID5uG2zG1G/RCeE4pLKWe5k uqQ4SitKuCfDfKyTFBET7zc5Zab0nBhnduGtQNlqEc6J2BL3PQW0gv5zkfLSNWBTso71eNaqMYH fKttQpqMYjIw+YveLzhqBjSJBwmQ0uQs9+y0CFiYsLB/e2PAqwdRyiq5NRQ2Lpo6Pva2u71cipJ 3oG6x08dF2zc6MuugqM6DiEvLhv7jvCGUDkJfSJ/8ujBBWAty/memusDfsKZnfI/Gde4bNB6jbH 7koa8i+gUh+T26udVhArV7xpDumnIdITVCfY87Ts7Ry3+CosbMMxCRwILyxsY13hppV3VqpniX4 xF43wBsHJhPQfTI9I+tRBKBL/gS2zu6Q0i8U7KadBNZu6+/vEKaVNa2J9SOTmXqBVNnPK X-Received: by 2002:a17:90b:578b:b0:340:ff89:8b62 with SMTP id 98e67ed59e1d1-3475ed44aeamr11964003a91.21.1764293866532; Thu, 27 Nov 2025 17:37:46 -0800 (PST) X-Google-Smtp-Source: AGHT+IGT/qXbqD0kFO4SMIPicHRHRHM2eKz0enmQp739/zV+MYlyldPqOomov6wmJSXVvy2LTU+9rw== X-Received: by 2002:a17:90b:578b:b0:340:ff89:8b62 with SMTP id 98e67ed59e1d1-3475ed44aeamr11963986a91.21.1764293866105; Thu, 27 Nov 2025 17:37:46 -0800 (PST) Received: from Z2-SFF-G9-MQ.ap.qualcomm.com (i-global052.qualcomm.com. [199.106.103.52]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3477b732e5dsm2943858a91.10.2025.11.27.17.37.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 17:37:27 -0800 (PST) From: Miaoqing Pan To: openembedded-core@lists.openembedded.org Cc: dmitry.baryshkov@oss.qualcomm.com, Miaoqing Pan Subject: [PATCH v3 2/4] wpa-supplicant: fix sed indentation Date: Fri, 28 Nov 2025 09:36:26 +0800 Message-Id: <20251128013628.2187455-3-miaoqing.pan@oss.qualcomm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> References: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> MIME-Version: 1.0 X-Proofpoint-GUID: UUQf6ubTK9RkgzIcl8XSoZPssigPkHeN X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMTI4MDAxMCBTYWx0ZWRfXwwwVvSdSM9o5 n/9eDv/f+hFW0Mo0WV20JUJstuUZ9VTCFNU1OnaMrWcOKWSz5R+JCIAXfEDPsJEOF+B8CCw06ap k2ldQxpyQY7u7UmutHhPbXZlLNcTrOT2pntQJo7WEtBdsG5ISSxdOjOEYuJvgP9CDtNpugm0A68 YUIpoK6V7G8VS03jZlmWZQWm+koSi4zcrK3OKGJtmeHtidbVbmmqA5ShwKN6xDABZBLFpfeQvkF QYOKPOQHmu7RHQ+Ph8C7yczqs7jZKbuDCEf086dJ6JGlSad2iIC0q3vC3ygUS62TsBJVOxKnIck QYqVmHalXircAL7+Ngwh4xNVLCQGJX1atuJY0SRlldIUOndfum8BidE56raoopfCq9v0XxGGmFj P6Afmka+SomhSs8/C1Js1gJb+Bz+kg== X-Proofpoint-ORIG-GUID: UUQf6ubTK9RkgzIcl8XSoZPssigPkHeN X-Authority-Analysis: v=2.4 cv=IciKmGqa c=1 sm=1 tr=0 ts=6928fceb cx=c_pps a=RP+M6JBNLl+fLTcSJhASfg==:117 a=b9+bayejhc3NMeqCNyeLQQ==:17 a=6UeiqGixMTsA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=EUspDBNiAAAA:8 a=646l1OQNd_mmeMfxMTwA:9 a=iS9zxrgQBfv6-_F4QbHw:22 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2025-11-25_02,2025-11-27_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 lowpriorityscore=0 clxscore=1015 impostorscore=0 priorityscore=1501 bulkscore=0 adultscore=0 spamscore=0 malwarescore=0 suspectscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510240001 definitions=main-2511280010 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 28 Nov 2025 01:37:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/226875 Unify indentation of sed commands in do_configure() for better readability. No functional changes. Reviewed-by: Dmitry Baryshkov Signed-off-by: Miaoqing Pan --- .../wpa-supplicant/wpa-supplicant_2.11.bb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb index b9a8964439..4a8ee1423f 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb @@ -46,9 +46,9 @@ do_configure () { echo 'CONFIG_TLS=openssl' >>wpa_supplicant/.config elif ${@ bb.utils.contains('PACKAGECONFIG', 'gnutls', 'true', 'false', d) }; then echo 'CONFIG_TLS=gnutls' >>wpa_supplicant/.config - sed -i -e 's/\(^CONFIG_DPP=\)/#\1/' \ - -e 's/\(^CONFIG_EAP_PWD=\)/#\1/' \ - -e 's/\(^CONFIG_SAE=\)/#\1/' wpa_supplicant/.config + sed -i -e 's/\(^CONFIG_DPP=\)/#\1/' \ + -e 's/\(^CONFIG_EAP_PWD=\)/#\1/' \ + -e 's/\(^CONFIG_SAE=\)/#\1/' wpa_supplicant/.config fi # For rebuild From patchwork Fri Nov 28 01:36:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Miaoqing Pan X-Patchwork-Id: 75505 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 08D96D111A8 for ; Fri, 28 Nov 2025 01:38:26 +0000 (UTC) Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.6995.1764293898390205756 for ; Thu, 27 Nov 2025 17:38:18 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@qualcomm.com header.s=qcppdkim1 header.b=l36zrZ5r; dkim=pass header.i=@oss.qualcomm.com header.s=google header.b=XbSmj4b+; spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: oss.qualcomm.com, ip: 205.220.168.131, mailfrom: miaoqing.pan@oss.qualcomm.com) Received: from pps.filterd (m0279866.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 5ARIet5o2388046 for ; Fri, 28 Nov 2025 01:38:18 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=qcppdkim1; bh=cyecsarF/Qv hHuvrrp1UoOProX4bE2EUd8rVNKZqgwg=; b=l36zrZ5rkvvkojNGV+Wn53u2WJk 0vuXdG3E3XiKQpjmRs7LcGmRGN/yxW3816IPMiKaT9Hf45FlAHQCZ0vRoV2klUm+ fVF/2pFoX0G6u90PZo4OOwXQyIJBeixay8cXdAwgPalc6k4hKoMqsVY8UKe8FIXX VBBjvLiMgZB65EGIWHQXVEQ/J5lhIIaHEY37L1gOn66LvFrzppz6OYk4Kx+3SBEX lvbz16bYW2NuqvQ1tEh9BE4sz5l+oPdwOmj4cCwOzZzvqR6xAbVovU08YOSs+RTj XG7rTpKFtV0SBeHohNk+uo5eIl9XD6coAjSkRgN2xRIlu/iFV888KdGIGcQ== Received: from mail-pj1-f69.google.com (mail-pj1-f69.google.com [209.85.216.69]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4ap7n8ksyt-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Fri, 28 Nov 2025 01:38:17 +0000 (GMT) Received: by mail-pj1-f69.google.com with SMTP id 98e67ed59e1d1-340ad9349b3so1981269a91.1 for ; Thu, 27 Nov 2025 17:38:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1764293897; x=1764898697; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=cyecsarF/QvhHuvrrp1UoOProX4bE2EUd8rVNKZqgwg=; b=XbSmj4b+Yr9eUQbo+aoVkowe2Pk3FPym8B5xM8sNHkNAdSwqFY/zv50oyliBW0G7Hp hfALEMUpnZv8lJqcBrkxRV+GQLPHKxj7YZxqMvpOr+5m80wJn+08Dan0UP/ghAiwoucR OIBHlxCmvvCAVmoOIbr4M5EHpqPHgAEv5i52smOD+HEWojjg/w+LR3JzKaFADZEFAww6 nh+kUqC8j6rgfiY/TJHkcHOCwJ0JLzji3SnKp4uezrqXTosD3zxjPZyi6gVz6LjCA/qB vkN+nPVXkFSEuuBLhFIn6dLrTEcqJ7n5SmRCRj2SEjzz48dpAwv2NE4iVbvEABNmU54U IeFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764293897; x=1764898697; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=cyecsarF/QvhHuvrrp1UoOProX4bE2EUd8rVNKZqgwg=; b=rLL7DYfjGcWuXrtkw4PqpUCr//X8ypbN7afKVQBDfAmK0hdZEkTbYTTBbbvQ9R/0dv GTrSirxqfbaep+rcP2yO0Q+ZIrL9ae+HplHsdeTdy+qgFSB8rhCQNkcFydoV0Dsv8hwB HcQSm90PGOXSqT34mpipNlD9yFI7gBfmney4wyIGDHw9G/NyYSvmJRnn/cMh+3Ts4sOl Skk7Nl8V8FVNB8cCr/rEcImr26fguc5eATy7MV7ujYMyGyqRUY1PVpTUB9POYGPEQVxR uuwCq7/rsvSrtRbNlAt9e6GydD70JaK668bIg1wcosdCWpPvoisHAL2HQJS16upnw15A ZTcg== X-Gm-Message-State: AOJu0Yxcc6MWXi0g8iQeTd189Ji8YtBMK2Nevlhp9sOyA4t7sWp2uE3E XKgOgv3wt2J1akHoj0VMrgQo0KxnBl+6xzrqdX9ZLNErN5DUzEAqlkO1AoNXU/jyD54UCDZ7qzj mCTtowtu3jYHdaXy5SfOE2aU1mhgZF/pIgb77swTI+y+EzEaxb7PRc6mOdEYA2uxpkFKE0MUUP5 0BVKP+MKb2aGLCLL5qXw== X-Gm-Gg: ASbGncuYuUdw7fZdMqVKl3HYLj2M1XbQnv7JkRkI5+9JYNCFCCG613y3S5WChgbNp+o 5SQMS7C7Baro+60em5t31XgWB9SPNHdItrGF4Mo1B7FFJY246Jp9WQhzcAhB5uQZ09TsZmQoZpu XboIgdbVw5al4l/ViCY/vkr+uG2oINgAb9nVrMnFpbJceejQMZ3sqAL/t+Ye18g9H4K6C4FLpGV 4Z/f2DQtwt2STxA8YZYkC0+muHecYY33tNFphbmF6AzAEH6rAxNZcuC57EfXopxvmcFBofbb5pP 6nBYEzVOoqsyq0oDHwxNNfh9DK0lUVTR0b72/7XGAcRIzOpkwhC/wVNDIu0GKmNJeP8i0+CdqKT C8EKg20NAgNbb68HZSQ9b6A+nzLjFzwj6bwWqU2gv4NZLrGEaWyKxvGWQ9/C5tkr6h/14 X-Received: by 2002:a17:90b:3fc3:b0:343:60ab:ca8e with SMTP id 98e67ed59e1d1-34733f14df2mr30009603a91.17.1764293896908; Thu, 27 Nov 2025 17:38:16 -0800 (PST) X-Google-Smtp-Source: AGHT+IF+oX3T5P1Ix8bpfOdefyFZ72u6XJSwZsjkIq23c555Aaay9BccpRgbpY1eaWij+4K/4Dh5WA== X-Received: by 2002:a17:90b:3fc3:b0:343:60ab:ca8e with SMTP id 98e67ed59e1d1-34733f14df2mr30009578a91.17.1764293896396; Thu, 27 Nov 2025 17:38:16 -0800 (PST) Received: from Z2-SFF-G9-MQ.ap.qualcomm.com (i-global052.qualcomm.com. [199.106.103.52]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3477b732e5dsm2943858a91.10.2025.11.27.17.37.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 17:37:54 -0800 (PST) From: Miaoqing Pan To: openembedded-core@lists.openembedded.org Cc: dmitry.baryshkov@oss.qualcomm.com, Miaoqing Pan Subject: [PATCH v3 3/4] wpa-supplicant: enable 802.11be support Date: Fri, 28 Nov 2025 09:36:27 +0800 Message-Id: <20251128013628.2187455-4-miaoqing.pan@oss.qualcomm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> References: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> MIME-Version: 1.0 X-Proofpoint-GUID: ROpmnaA67oxPZef0LF_tZKn-y8URqGX2 X-Authority-Analysis: v=2.4 cv=AufjHe9P c=1 sm=1 tr=0 ts=6928fd09 cx=c_pps a=vVfyC5vLCtgYJKYeQD43oA==:117 a=b9+bayejhc3NMeqCNyeLQQ==:17 a=6UeiqGixMTsA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=EUspDBNiAAAA:8 a=TNsu8Qfd1aDV9B-InT4A:9 a=rl5im9kqc5Lf4LNbBjHf:22 X-Proofpoint-ORIG-GUID: ROpmnaA67oxPZef0LF_tZKn-y8URqGX2 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMTI4MDAxMCBTYWx0ZWRfX1RhNHCJy/igU tHIIcwWd76UgvsZDlxK96zs7yPN9KLp9Cr4LlETO+vRWeLySS16YNJpiyPwbjyZLITrSRmEGh5v 51RyAzOeNxlF8N8HzJ28i0yEZoaLQ2rewbo4M96la1NIsFpk4hJR6zzVlYuUVvYcMmWvg8hB8YX QWRbIBOYskufuD1YcLPHOPLuWgVkeLU4lTHzB7yuwUhNkstTJGdrggJSTs4YoGFcd4NfsxzcC6h 0shxaLslVOWpXbTyqhGk4WeSd+LjvyHC0Y5AGeTd+OtZ4+Zz4ry9ExYM3VY0bkhALp8SoNymeNt WZNLcfeRkC0Hg4TFIRJkh8UTU/a0bDJcOafb9t7oQC4eumsKNrFhJHJ6ZLioohRfxwqZqYNZY6d bfAxZYitRoCLuMBIMxAPJ3ihEz13GQ== X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2025-11-25_02,2025-11-27_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 priorityscore=1501 bulkscore=0 suspectscore=0 adultscore=0 phishscore=0 spamscore=0 impostorscore=0 lowpriorityscore=0 clxscore=1015 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510240001 definitions=main-2511280010 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 28 Nov 2025 01:38:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/226876 wpa_supplicant has supported IEEE 802.11be (Wi-Fi 7) for over three years. With growing market demand for Wi-Fi 7, it is now an appropriate time to enable IEEE 802.11be Extremely High Throughput (EHT) support, mainly for AP mode. This implementation conforms to IEEE Std 802.11be-2024, which was approved by the IEEE SA Standards Board on September 26, 2024 and officially published on July 22, 2025. Signed-off-by: Miaoqing Pan --- .../wpa-supplicant/wpa-supplicant/defconfig | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig index 52befd8f15..1dd7540574 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig @@ -507,10 +507,7 @@ CONFIG_IEEE80211AX=y # IEEE 802.11be EHT support (mainly for AP mode) # CONFIG_IEEE80211AX is mandatory for setting CONFIG_IEEE80211BE. -# Note: This is experimental and work in progress. The definitions are still -# subject to change and this should not be expected to interoperate with the -# final IEEE 802.11be version. -#CONFIG_IEEE80211BE=y +CONFIG_IEEE80211BE=y # Wireless Network Management (IEEE Std 802.11v-2011) # Note: This is experimental and not complete implementation. From patchwork Fri Nov 28 01:36:28 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Miaoqing Pan X-Patchwork-Id: 75506 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 09AD1CFD2F6 for ; Fri, 28 Nov 2025 01:38:56 +0000 (UTC) Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7002.1764293933719667297 for ; Thu, 27 Nov 2025 17:38:53 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@qualcomm.com header.s=qcppdkim1 header.b=aIAcjSEr; dkim=pass header.i=@oss.qualcomm.com header.s=google header.b=UvRYmGFL; spf=permerror, err=parse error for token &{10 18 %{ir}.%{v}.%{d}.spf.has.pphosted.com}: invalid domain name (domain: oss.qualcomm.com, ip: 205.220.168.131, mailfrom: miaoqing.pan@oss.qualcomm.com) Received: from pps.filterd (m0279865.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 5ARAW6PQ914009 for ; Fri, 28 Nov 2025 01:38:53 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:date:from:in-reply-to:message-id :mime-version:references:subject:to; s=qcppdkim1; bh=KtiQ1sOkweM Z3cPrkGEbZMhHWjbt+ZYu2WjECg8FrWo=; b=aIAcjSErakJothQMHKxA08iWHXI PXR+J6+hIinw3ZaacIhmNFWaPZWMoLv/Ibfq4PPmf1MhmwYpE1/fCO7uyJrtpCw1 3y0gvHaiMVuUdEGlrFzBGiXx3LTr6/Phn2VaAMzUHaiIAZZpGlOMloEQPwbJJFPd j2k96Pzo/O9/aYPzRKXtg61jdSf7wBRxzmPt0/MUmrbjfETm+Oe7XyYxSyUf1gaE PgYtksxCzIGMDSNMqFh0LdSH2jhQun3QZ3Mil37dQ+RP+EhVQBeBiY8BpAsGcph0 qAT2CVUitKj7bP5yv56g3+pn0qQ7GKfDGtOcozzREHyEXVWurgbliL8pYoA== Received: from mail-pj1-f71.google.com (mail-pj1-f71.google.com [209.85.216.71]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4apmynspcb-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Fri, 28 Nov 2025 01:38:53 +0000 (GMT) Received: by mail-pj1-f71.google.com with SMTP id 98e67ed59e1d1-3438744f11bso2169402a91.2 for ; Thu, 27 Nov 2025 17:38:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1764293932; x=1764898732; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=KtiQ1sOkweMZ3cPrkGEbZMhHWjbt+ZYu2WjECg8FrWo=; b=UvRYmGFLEIA4Ph9uRa2pP8xUOphS62JD0E38DWYZRo3FM+z73uT7T6nXoRuj285FVX D9Lqek2qrXUaEFbtPS3QfL6aMEcYS6C1KsuTZyABJWN0MX1NBxiG20r61fdH5j1tCq8F XaDhWSi9hKDlXK3OdK38PJR1A9rb6UfpEGcKbEhx0Tu6EfgTvSuV8TghVN2Vv655xtgD ttLk3OknrAV5S0q1Pr10d2ksbEXl2mejvlNPjpDjXYDUwSJT7SQGRwkvxyzIbyy3RzBY kYnU/zEW4luLckg3rsQIs6CCDcYjgx2yeymLZhzca2zFFgvw56AyOi1XV9Sh/AGpPA+q HcLA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764293932; x=1764898732; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=KtiQ1sOkweMZ3cPrkGEbZMhHWjbt+ZYu2WjECg8FrWo=; b=HIXCPRKmAdWCGQGBN9Lwn9sByilQNUk9CjKTsLfdOix+W1TsIDun78Wex8WAUDhp2Z ryw3K9RzzZX/v8kWLPRGj4FYc148LCQtbLF0MZKLAZUMLn4GyyZbdpUrWKif46ap1TX/ SWuCh3TfUevAG2Kt1mgOYvoJEADccd4jOzfYkACfgU7LNpT5KTQClzPgEkHxLVgvbeqc 7Z8k42fT4ltAdbhf0wH+gv4Poh32qOQD0ZuiCK1BSIF7GWx7JiKNONb8SOgI7amQdjYQ E7KN7zBOIltxAzoSFgoDpiTPo9fXlFgLK1FX6JuxSeCAOw+nSvvd/qILmsoK4PJHBcc0 xVuA== X-Gm-Message-State: AOJu0YxR6V7SEOMI0Qz0xx+2AVSVjA4cv6hIB+pvkKPTR9iNNuCQcvYN aLJKKWpfVpj4uTjc4hM8TVd2iMR4U5b4tXH60D9ZoSI8Kg1Jqr4FNOG7Kz5Nclxem+4SITYZCZW bo6kRSI0fvDjCYXJ+TjGUecDxQ2SDNVoepPNpbPKhMFVdTlw3qMwyiZ8n4FHmBrj7PmheQbZU50 MEcNyezcZmfwZpLkhslw== X-Gm-Gg: ASbGnct1SN+wkaYEpj9EuOHy1jX9ZpWUE/FKN6otR8PgI9/sho64g8uJbRzQD86Bg8L 8N8duRXgNwWeun/7n6DvH2Yi7N0rOJ6wQqyD8erGdZHr3jpNaTuGYWf60MCTdww/Zt5mTc3pjzc +w2Q1wIXy6dGp4TpkfVIL6Wbdqz62soo+G6KJXRrOcpRcnM7yRGbj1GAlg15aJl6qp+dADDT44x wsbEdSiERczBHzzPXIKkxM5b+j1isiq/snxMDMrSTr3PietHYA+A5U/ATrWJzkw66CpXlqqzMkt upYDRozJJ5ocgM9LD82O5x0OKaq5SdbXvZhrhTiyidiku3Wd4UjBGOnqfAN02SS8bniWJWe95el R11St2Yz+eBLRG0/l34nOve7/VDxncNaWBFz5Up2j7EcfN/Xbw8KzMM+jg/Aa6LCYZXOT X-Received: by 2002:a17:90b:1b42:b0:340:ff7d:c2e with SMTP id 98e67ed59e1d1-34733f22639mr24078754a91.29.1764293932366; Thu, 27 Nov 2025 17:38:52 -0800 (PST) X-Google-Smtp-Source: AGHT+IG+wkr47PFQvTrTryallfwTrNoPbB+w39HMF+2ZcHtaiTvVgg4WV4f/TTegqOXQHvYC4Cw/VA== X-Received: by 2002:a17:90b:1b42:b0:340:ff7d:c2e with SMTP id 98e67ed59e1d1-34733f22639mr24078730a91.29.1764293931885; Thu, 27 Nov 2025 17:38:51 -0800 (PST) Received: from Z2-SFF-G9-MQ.ap.qualcomm.com (i-global052.qualcomm.com. [199.106.103.52]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-3477b732e5dsm2943858a91.10.2025.11.27.17.38.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 17:38:25 -0800 (PST) From: Miaoqing Pan To: openembedded-core@lists.openembedded.org Cc: dmitry.baryshkov@oss.qualcomm.com, Miaoqing Pan Subject: [PATCH v3 4/4] wpa-supplicant: enable OWE support Date: Fri, 28 Nov 2025 09:36:28 +0800 Message-Id: <20251128013628.2187455-5-miaoqing.pan@oss.qualcomm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> References: <20251128013628.2187455-1-miaoqing.pan@oss.qualcomm.com> MIME-Version: 1.0 X-Proofpoint-ORIG-GUID: RnvKQGIiWiNbfMag2Fo_L1c3dKk4fXmm X-Authority-Analysis: v=2.4 cv=QOplhwLL c=1 sm=1 tr=0 ts=6928fd2d cx=c_pps a=UNFcQwm+pnOIJct1K4W+Mw==:117 a=b9+bayejhc3NMeqCNyeLQQ==:17 a=6UeiqGixMTsA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=EUspDBNiAAAA:8 a=kX1YWtxo-AknxJAGEQkA:9 a=uKXjsCUrEbL0IQVhDsJ9:22 X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMTI4MDAxMCBTYWx0ZWRfXza1kCzcQxQf7 tuuKRXHBcQnP1AFVZWePaTlLNSBqtymLjSuQUrXUORm8iRl3hm4wm7PeQneV86EQV/3LA4r1vJe fjNG/ls+EkQtsk+Ydb/llvOxbS0ZDXvlmFlNgS/UCoufhO4g8zdRIMU3RE3BZhGectYZJAqfhfj 6XhqNeB+L5q+IUUCrO/9BfiqymJEtaHCzhN9TccbIW5k3bZp/SjueF4qhXwc0jPZGmuRo6R4h+d RwBzcVNU8gYNuMMFUcwjt4h/85t3YVqtHNc0DGTYitS6j5f/Ee+F+al/Ef0YBLlvzDJcMqjdQwk ITyOPRgiJCA+jEFQwZhpR1NH3Emvdhc2LzPTiMY8IAd+G8xrRocnCNy8rwMwmlk3OWuDg2bfyuj avppQu6ZL6ulc+lx1CI9VYNhsTrfVw== X-Proofpoint-GUID: RnvKQGIiWiNbfMag2Fo_L1c3dKk4fXmm X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.100.49 definitions=2025-11-25_02,2025-11-27_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 malwarescore=0 spamscore=0 lowpriorityscore=0 bulkscore=0 clxscore=1015 priorityscore=1501 suspectscore=0 phishscore=0 adultscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2510240001 definitions=main-2511280010 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 28 Nov 2025 01:38:56 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/226877 Enable Opportunistic Wireless Encryption (OWE) in wpa_supplicant for easier testing and examples by setting CONFIG_OWE=y in defconfig. OWE is standardized in IEEE Std 802.11-2024 and specified by RFC 8110 (updated by RFC 9672). Disable OWE when PACKAGECONFIG selects gnutls to prevent build failures. Signed-off-by: Miaoqing Pan --- .../wpa-supplicant/wpa-supplicant/defconfig | 3 +-- .../recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb | 1 + 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig index 1dd7540574..84ac8ba12c 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/defconfig @@ -635,8 +635,7 @@ CONFIG_BGSCAN_SIMPLE=y #CONFIG_BGSCAN_LEARN=y # Opportunistic Wireless Encryption (OWE) -# Experimental implementation of draft-harkins-owe-07.txt -#CONFIG_OWE=y +CONFIG_OWE=y # Device Provisioning Protocol (DPP) (also known as Wi-Fi Easy Connect) CONFIG_DPP=y diff --git a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb index 4a8ee1423f..971e55150d 100644 --- a/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb +++ b/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant_2.11.bb @@ -48,6 +48,7 @@ do_configure () { echo 'CONFIG_TLS=gnutls' >>wpa_supplicant/.config sed -i -e 's/\(^CONFIG_DPP=\)/#\1/' \ -e 's/\(^CONFIG_EAP_PWD=\)/#\1/' \ + -e 's/\(^CONFIG_OWE=\)/#\1/' \ -e 's/\(^CONFIG_SAE=\)/#\1/' wpa_supplicant/.config fi