All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version.
@ 2013-12-08  8:18 Yaniv Mahani
  2013-12-08  8:18 ` [PATCH 2/8] hostap-daemon-wl18xx: " Yaniv Mahani
                   ` (8 more replies)
  0 siblings, 9 replies; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- Build wpa-supplicant from TI_Openlink ol_r8.a8.08
- Add missing includes for building with libnl3.
- Adjusted configuration files, and added p2p conf.

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
This set of patches should allow integration of WiLink-8 into meta-arago.
It should replace the set of 14 patches previously submitted for review.


Note :
Wilink-6 is currently not supported with the latest meta-arago builds.
ECS have decided not to support Wilink-6 in the core SDK also in the future.
Therefore any Wilink-6 broken recipes should not be a concern, as we will clean them up on a different set of patches.

wifi-direct-demo, battleship, wpa-gui-e applications will shortly be removed as well.

Yaniv

 .../wpa-supplicant/wpa-supplicant-wl18xx/defconfig |  164 ++++--
 ....a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} |    6 +-
 .../wpa-supplicant/wpa-supplicant.inc              |    3 +
 .../wpa-supplicant/p2p_supplicant.conf             |   14 +
 .../wpa-supplicant/wpa_supplicant.conf             |  674 +-------------------
 5 files changed, 164 insertions(+), 697 deletions(-)
 rename meta-arago-extras/recipes-connectivity/wpa-supplicant/{wpa-supplicant-wl18xx_r8.a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} (88%)
 create mode 100755 meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf

diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
index b982e2a..f357b79 100755
--- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
@@ -39,18 +39,6 @@
 #LIBS = -lssl
 ###############################################################################
 
-#CC=$(CROSS_COMPILE)gcc
-#CFLAGS += -DCONFIG_LIBNL20
-#CPPFLAGS += -DCONFIG_LIBNL20
-#LIBS += -L$(NFSROOT)/lib -lnl
-#LIBS_p += -L$(NFSROOT)/lib
-#LIBDIR = $(NFSROOT)/lib
-#BINDIR = $(NFSROOT)/usr/sbin
-
-CONFIG_WAPI=y
-CONFIG_LIBNL20=y
-NEED_BGSCAN=y
-CONFIG_BGSCAN_LEARN=y
 
 # Driver interface for Host AP driver
 #CONFIG_DRIVER_HOSTAP=y
@@ -75,7 +63,7 @@ CONFIG_BGSCAN_LEARN=y
 #CONFIG_DRIVER_ATMEL=y
 
 # Driver interface for old Broadcom driver
-# Please note that the newer Broadcom driver ("hybrid Linux driver") supportsBG
+# Please note that the newer Broadcom driver ("hybrid Linux driver") supports
 # Linux wireless extensions and does not need (or even work) with the old
 # driver wrapper. Use CONFIG_DRIVER_WEXT=y with that driver.
 #CONFIG_DRIVER_BROADCOM=y
@@ -90,16 +78,22 @@ CONFIG_BGSCAN_LEARN=y
 #CONFIG_DRIVER_RALINK=y
 
 # Driver interface for generic Linux wireless extensions
-CONFIG_DRIVER_WEXT=y
+# Note: WEXT is deprecated in the current Linux kernel version and no new
+# functionality is added to it. nl80211-based interface is the new
+# replacement for WEXT and its use allows wpa_supplicant to properly control
+# the driver to improve existing functionality like roaming and to support new
+# functionality.
+#CONFIG_DRIVER_WEXT=y
 
 # Driver interface for Linux drivers using the nl80211 kernel interface
 CONFIG_DRIVER_NL80211=y
+CONFIG_LIBNL32=y
 
 # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
 #CONFIG_DRIVER_BSD=y
 #CFLAGS += -I/usr/local/include
 #LIBS += -L/usr/local/lib
-#LIBS_p += -L/usr/local/libBG
+#LIBS_p += -L/usr/local/lib
 #LIBS_c += -L/usr/local/lib
 
 # Driver interface for Windows NDIS
@@ -121,13 +115,8 @@ CONFIG_DRIVER_NL80211=y
 # Driver interface for development testing
 #CONFIG_DRIVER_TEST=y
 
-# Include client MLME (management frame processing) for test driver
-# This can be used to test MLME operations in hostapd with the test interface.
-# space.
-#CONFIG_CLIENT_MLME=y
-
 # Driver interface for wired Ethernet drivers
-CONFIG_DRIVER_WIRED=y
+#CONFIG_DRIVER_WIRED=y
 
 # Driver interface for the Broadcom RoboSwitch family
 #CONFIG_DRIVER_ROBOSWITCH=y
@@ -163,7 +152,7 @@ CONFIG_EAP_TTLS=y
 # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
 # the OpenSSL library must be patched (openssl-0.9.8d-tls-extensions.patch)
 # to add the needed functions.
-#CONFIG_EAP_FAST=y
+CONFIG_EAP_FAST=y
 
 # EAP-GTC
 CONFIG_EAP_GTC=y
@@ -172,11 +161,14 @@ CONFIG_EAP_GTC=y
 CONFIG_EAP_OTP=y
 
 # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
-#CONFIG_EAP_SIM=y
+CONFIG_EAP_SIM=y
 
 # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
 #CONFIG_EAP_PSK=y
 
+# EAP-pwd (secure authentication using only a password)
+CONFIG_EAP_PWD=y
+
 # EAP-PAX
 #CONFIG_EAP_PAX=y
 
@@ -208,6 +200,11 @@ CONFIG_EAP_LEAP=y
 CONFIG_WPS=y
 # Enable WSC 2.0 support
 CONFIG_WPS2=y
+# Enable WPS external registrar functionality
+#CONFIG_WPS_ER=y
+# Disable credentials for an open network by default when acting as a WPS
+# registrar.
+#CONFIG_WPS_REG_DISABLE_OPEN=y
 
 # EAP-IKEv2
 #CONFIG_EAP_IKEV2=y
@@ -224,7 +221,10 @@ CONFIG_SMARTCARD=y
 # Enable this if EAP-SIM or EAP-AKA is included
 #CONFIG_PCSC=y
 
-# Development testingBG
+# Support HT overrides (disable HT/HT40, mask MCS rates, etc.)
+#CONFIG_HT_OVERRIDES=y
+
+# Development testing
 #CONFIG_EAPOL_TEST=y
 
 # Select control interface backend for external programs, e.g, wpa_cli:
@@ -242,6 +242,10 @@ CONFIG_CTRL_IFACE=y
 # the resulting binary.
 #CONFIG_READLINE=y
 
+# Include internal line edit mode in wpa_cli. This can be used as a replacement
+# for GNU Readline to provide limited command line editing and history support.
+CONFIG_WPA_CLI_EDIT=y
+
 # Remove debugging code that is printing out debug message to stdout.
 # This can be used to reduce the size of the wpa_supplicant considerably
 # if debugging code is not needed. The size reduction can be around 35%
@@ -295,13 +299,16 @@ CONFIG_BACKEND=file
 # unix = UNIX/POSIX like systems (default)
 # win32 = Windows systems
 # none = Empty template
-#CONFIG_OS=unix
+CONFIG_OS=unix
 
 # Select event loop implementation
 # eloop = select() loop (default)
 # eloop_win = Windows events and WaitForMultipleObject() loop
 # eloop_none = Empty template
-#CONFIG_ELOOP=eloop
+CONFIG_ELOOP=eloop
+
+# Should we use poll instead of select? Select is used by default.
+#CONFIG_ELOOP_POLL=y
 
 # Select layer 2 packet implementation
 # linux = Linux packet socket (default)
@@ -310,7 +317,7 @@ CONFIG_BACKEND=file
 # winpcap = WinPcap with receive thread
 # ndis = Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y)
 # none = Empty template
-#CONFIG_L2_PACKET=linux
+CONFIG_L2_PACKET=linux
 
 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
 CONFIG_PEERKEY=y
@@ -323,18 +330,24 @@ CONFIG_PEERKEY=y
 
 # Select TLS implementation
 # openssl = OpenSSL (default)
-# gnutls = GnuTLS (needed for TLS/IA, see also CONFIG_GNUTLS_EXTRA)
+# gnutls = GnuTLS
 # internal = Internal TLSv1 implementation (experimental)
 # none = Empty template
 #CONFIG_TLS=openssl
 
-# Whether to enable TLS/IA support, which is required for EAP-TTLSv1.
-# You need CONFIG_TLS=gnutls for this to have any effect. Please note that
-# even though the core GnuTLS library is released under LGPL, this extra
-# library uses GPL and as such, the terms of GPL apply to the combination
-# of wpa_supplicant and GnuTLS if this option is enabled. BSD license may not
-# apply for distribution of the resulting binary.
-#CONFIG_GNUTLS_EXTRA=y
+# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
+# can be enabled to get a stronger construction of messages when block ciphers
+# are used. It should be noted that some existing TLS v1.0 -based
+# implementation may not be compatible with TLS v1.1 message (ClientHello is
+# sent prior to negotiating which version will be used)
+#CONFIG_TLSV11=y
+
+# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
+# can be enabled to enable use of stronger crypto algorithms. It should be
+# noted that some existing TLS v1.0 -based implementation may not be compatible
+# with TLS v1.2 message (ClientHello is sent prior to negotiating which version
+# will be used)
+#CONFIG_TLSV12=y
 
 # If CONFIG_TLS=internal is used, additional library and include paths are
 # needed for LibTomMath. Alternatively, an integrated, minimal version of
@@ -360,14 +373,14 @@ CONFIG_PEERKEY=y
 
 # Add support for old DBus control interface
 # (fi.epitest.hostap.WPASupplicant)
-CONFIG_CTRL_IFACE_DBUS=y
+#CONFIG_CTRL_IFACE_DBUS=y
 
 # Add support for new DBus control interface
 # (fi.w1.hostap.wpa_supplicant1)
-CONFIG_CTRL_IFACE_DBUS_NEW=y
+#CONFIG_CTRL_IFACE_DBUS_NEW=y
 
 # Add introspection support for new DBus control interface
-CONFIG_CTRL_IFACE_DBUS_INTRO=y
+#CONFIG_CTRL_IFACE_DBUS_INTRO=y
 
 # Add support for loading EAP methods dynamically as shared libraries.
 # When this option is enabled, each EAP method can be either included
@@ -394,7 +407,22 @@ CONFIG_CTRL_IFACE_DBUS_INTRO=y
 #CONFIG_IEEE80211R=y
 
 # Add support for writing debug log to a file (/tmp/wpa_supplicant-log-#.txt)
-CONFIG_DEBUG_FILE=y
+#CONFIG_DEBUG_FILE=y
+
+# Send debug messages to syslog instead of stdout
+#CONFIG_DEBUG_SYSLOG=y
+# Set syslog facility for debug messages
+#CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON
+
+# Add support for sending all debug messages (regardless of debug verbosity)
+# to the Linux kernel tracing facility. This helps debug the entire stack by
+# making it easy to record everything happening from the driver up into the
+# same file, e.g., using trace-cmd.
+#CONFIG_DEBUG_LINUX_TRACING=y
+
+# Add support for writing debug log to Android logcat instead of standard
+# output
+CONFIG_ANDROID_LOG=y
 
 # Enable privilege separation (see README 'Privilege separation' for details)
 #CONFIG_PRIVSEP=y
@@ -407,7 +435,7 @@ CONFIG_DEBUG_FILE=y
 # This tracks use of memory allocations and other registrations and reports
 # incorrect use with a backtrace of call (or allocation) location.
 #CONFIG_WPA_TRACE=y
-# For BSD, comment out these.
+# For BSD, uncomment these.
 #LIBS += -lexecinfo
 #LIBS_p += -lexecinfo
 #LIBS_c += -lexecinfo
@@ -416,15 +444,63 @@ CONFIG_DEBUG_FILE=y
 # This enables use of libbfd to get more detailed symbols for the backtraces
 # generated by CONFIG_WPA_TRACE=y.
 #CONFIG_WPA_TRACE_BFD=y
-# For BSD, comment out these.
+# For BSD, uncomment these.
 #LIBS += -lbfd -liberty -lz
 #LIBS_p += -lbfd -liberty -lz
 #LIBS_c += -lbfd -liberty -lz
 
-# for p2p
+# wpa_supplicant depends on strong random number generation being available
+# from the operating system. os_get_random() function is used to fetch random
+# data when needed, e.g., for key generation. On Linux and BSD systems, this
+# works by reading /dev/urandom. It should be noted that the OS entropy pool
+# needs to be properly initialized before wpa_supplicant is started. This is
+# important especially on embedded devices that do not have a hardware random
+# number generator and may by default start up with minimal entropy available
+# for random number generation.
+#
+# As a safety net, wpa_supplicant is by default trying to internally collect
+# additional entropy for generating random data to mix in with the data fetched
+# from the OS. This by itself is not considered to be very strong, but it may
+# help in cases where the system pool is not initialized properly. However, it
+# is very strongly recommended that the system pool is initialized with enough
+# entropy either by using hardware assisted random number generator or by
+# storing state over device reboots.
+#
+# wpa_supplicant can be configured to maintain its own entropy store over
+# restarts to enhance random number generation. This is not perfect, but it is
+# much more secure than using the same sequence of random numbers after every
+# reboot. This can be enabled with -e<entropy file> command line option. The
+# specified file needs to be readable and writable by wpa_supplicant.
+#
+# If the os_get_random() is known to provide strong random data (e.g., on
+# Linux/BSD, the board in question is known to have reliable source of random
+# data from /dev/urandom), the internal wpa_supplicant random pool can be
+# disabled. This will save some in binary size and CPU use. However, this
+# should only be considered for builds that are known to be used on devices
+# that meet the requirements described above.
+#CONFIG_NO_RANDOM_POOL=y
+
+# IEEE 802.11n (High Throughput) support (mainly for AP mode)
+CONFIG_IEEE80211N=y
+
+# Interworking (IEEE 802.11u)
+# This can be used to enable functionality to improve interworking with
+# external networks (GAS/ANQP to learn more about the networks and network
+# selection based on available credentials).
+CONFIG_INTERWORKING=y
+
+# Hotspot 2.0
+CONFIG_HS20=y
+
+# Disable roaming in wpa_supplicant
+#CONFIG_NO_ROAMING=y
+
+# Enable P2P
 CONFIG_P2P=y
 CONFIG_AP=y
 
-# IEEE 802.11n (High Throughput) support
-CONFIG_IEEE80211N=y
+# bgscan
+NEED_BGSCAN=y
+CONFIG_BGSCAN_LEARN=y
+CONFIG_BGSCAN_SIMPLE=y
 
diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
similarity index 88%
rename from meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
rename to meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
index f6c4f70..ec7a0c7 100644
--- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
@@ -10,9 +10,9 @@ LIC_FILES_CHKSUM = "file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e \
 
 FILESEXTRAPATHS_append := "${THISDIR}/wpa-supplicant:"
 
-# Tag: ol_r8.a6.01
-SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
-PR = "r2+gitr${SRCPV}"
+# Tag: ol_r8.a8.08
+SRCREV = "257ab333aad993b4be81808524bc0d939c276058"
+PR_append = "a+gitr${SRCPV}"
 
 # Add ti to the PV to indicate that this is a TI modify version of wpa-supplicant.
 PV = "2.0-devel-ti"
diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
index 2d8970f..9678b1b 100644
--- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
@@ -21,6 +21,7 @@ SRC_URI = "git://github.com/TI-OpenLink/hostap.git;protocol=git \
            file://defaults-sane \
            file://wpa-supplicant.sh \
            file://wpa_supplicant.conf \
+           file://p2p_supplicant.conf \
            file://wpa_supplicant.conf-sane \
            file://99_wpa_supplicant \
            file://wpa_supplicant.conf \
@@ -55,6 +56,7 @@ do_install () {
 	install -d ${D}${sysconfdir}/default
 	install -m 600 ${WORKDIR}/defaults-sane ${D}${sysconfdir}/default/wpa
 	install -m 600 ${WORKDIR}/wpa_supplicant.conf-sane ${D}${sysconfdir}/wpa_supplicant.conf
+	install -m 600 ${WORKDIR}/p2p_supplicant.conf ${D}${sysconfdir}/p2p_supplicant.conf
 
 	if grep -q ^CONFIG_CTRL_IFACE_DBUS=y .config || grep -q ^CONFIG_CTRL_IFACE_DBUS_NEW=y .config; then
 		install -d ${D}/${sysconfdir}/dbus-1/system.d
@@ -104,6 +106,7 @@ pkg_postinst_wpa-supplicant () {
 do_configure () {
 	install -m 0755 ${WORKDIR}/defconfig .config
 	echo "CFLAGS += -I${STAGING_INCDIR}" >> .config
+	echo "CFLAGS += -I${STAGING_INCDIR}/libnl3/" >> .config
 	echo "LIBS += -L${STAGING_LIBDIR}" >> .config
 	echo "LIBS_p += -L${STAGING_LIBDIR}" >> .config
 	if [ "${@base_contains('COMBINED_FEATURES', 'madwifi', 1, 0, d)}" = "1" ]; then
diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
new file mode 100755
index 0000000..2de8730
--- /dev/null
+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
@@ -0,0 +1,14 @@
+ctrl_interface=/var/run/wpa_supplicant
+update_config=0
+device_name=TI-SITARA-P2P
+device_type=1-0050F204-1
+config_methods=virtual_push_button physical_display keypad
+p2p_go_intent=0
+country=US
+##p2p_pref_chan=115:36 115:40
+driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
+p2p_go_max_inactivity=60
+p2p_go_ht40=1
+p2p_multi_chan=1
+disassoc_low_ack=1
+concurrent_sched_scan=1
diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
index f0c993d..f144a38 100644
--- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
@@ -1,19 +1,4 @@
-##### Example wpa_supplicant configuration file ###############################
-#
-# This file describes configuration file format and lists all available option.
-# Please also take a look at simpler configuration examples in 'examples'
-# subdirectory.
-#
-# Empty lines and lines starting with # are ignored
-
-# NOTE! This file may contain password information and should probably be made
-# readable only by root user on multiuser systems.
-
-# Note: All file paths in this configuration file should use full (absolute,
-# not relative to working directory) path in order to allow working directory
-# to be changed. This can happen if wpa_supplicant is run in the background.
-
-# Whether to allow wpa_supplicant to update (overwrite) configuration
+##### wpa_supplicant configuration file template #####
 #
 # This option can be used to allow wpa_supplicant to overwrite configuration
 # file whenever configuration is changed (e.g., new network block is added with
@@ -21,59 +6,8 @@
 # wpa_cli/wpa_gui to be able to store the configuration changes permanently.
 # Please note that overwriting configuration file will remove the comments from
 # it.
-#update_config=1
-
-# global configuration (shared by all network blocks)
-#
-# Parameters for the control interface. If this is specified, wpa_supplicant
-# will open a control interface that is available for external programs to
-# manage wpa_supplicant. The meaning of this string depends on which control
-# interface mechanism is used. For all cases, the existance of this parameter
-# in configuration is used to determine whether the control interface is
-# enabled.
-#
-# For UNIX domain sockets (default on Linux and BSD): This is a directory that
-# will be created for UNIX domain sockets for listening to requests from
-# external programs (CLI/GUI, etc.) for status information and configuration.
-# The socket file will be named based on the interface name, so multiple
-# wpa_supplicant processes can be run at the same time if more than one
-# interface is used.
-# /var/run/wpa_supplicant is the recommended directory for sockets and by
-# default, wpa_cli will use it when trying to connect with wpa_supplicant.
-#
-# Access control for the control interface can be configured by setting the
-# directory to allow only members of a group to use sockets. This way, it is
-# possible to run wpa_supplicant as root (since it needs to change network
-# configuration and open raw sockets) and still allow GUI/CLI components to be
-# run as non-root users. However, since the control interface can be used to
-# change the network configuration, this access needs to be protected in many
-# cases. By default, wpa_supplicant is configured to use gid 0 (root). If you
-# want to allow non-root users to use the control interface, add a new group
-# and change this value to match with that group. Add users that should have
-# control interface access to this group. If this variable is commented out or
-# not included in the configuration file, group will not be changed from the
-# value it got by default when the directory or socket was created.
-#
-# When configuring both the directory and group, use following format:
-# DIR=/var/run/wpa_supplicant GROUP=wheel
-# DIR=/var/run/wpa_supplicant GROUP=0
-# (group can be either group name or gid)
-#
-# For UDP connections (default on Windows): The value will be ignored. This
-# variable is just used to select that the control interface is to be created.
-# The value can be set to, e.g., udp (ctrl_interface=udp)
-#
-# For Windows Named Pipe: This value can be used to set the security descriptor
-# for controlling access to the control interface. Security descriptor can be
-# set using Security Descriptor String Format (see http://msdn.microsoft.com/
-# library/default.asp?url=/library/en-us/secauthz/security/
-# security_descriptor_string_format.asp). The descriptor string needs to be
-# prefixed with SDDL=. For example, ctrl_interface=SDDL=D: would set an empty
-# DACL (which will reject all connections). See README-Windows.txt for more
-# information about SDDL string format.
-#
+update_config=1
 ctrl_interface=/var/run/wpa_supplicant
-
 # IEEE 802.1X/EAPOL version
 # wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines
 # EAPOL version 2. However, there are many APs that do not handle the new
@@ -82,14 +16,15 @@ ctrl_interface=/var/run/wpa_supplicant
 # to 1 by default. This configuration value can be used to set it to the new
 # version (2).
 eapol_version=1
-
 # AP scanning/selection
 # By default, wpa_supplicant requests driver to perform AP scanning and then
 # uses the scan results to select a suitable AP. Another alternative is to
 # allow the driver to take care of AP scanning and selection and use
 # wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association
 # information from the driver.
-# 1: wpa_supplicant initiates scanning and AP selection
+# 1: wpa_supplicant initiates scanning and AP selection; if no APs matching to
+#    the currently enabled networks are found, a new network (IBSS or AP mode
+#    operation) may be initialized (if configured) (default)
 # 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
 #    parameters (e.g., WPA IE generation); this mode can also be used with
 #    non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
@@ -102,589 +37,28 @@ eapol_version=1
 #    the driver reports successful association; each network block should have
 #    explicit security policy (i.e., only one option in the lists) for
 #    key_mgmt, pairwise, group, proto variables
+# When using IBSS or AP mode, ap_scan=2 mode can force the new network to be
+# created immediately regardless of scan results. ap_scan=1 mode will first try
+# to scan for existing networks and only if no matches with the enabled
+# networks are found, a new IBSS or AP mode network is created.
 ap_scan=1
-
 # EAP fast re-authentication
 # By default, fast re-authentication is enabled for all EAP methods that
 # support it. This variable can be used to disable fast re-authentication.
 # Normally, there is no need to disable this.
 fast_reauth=1
-
-# OpenSSL Engine support
-# These options can be used to load OpenSSL engines.
-# The two engines that are supported currently are shown below:
-# They are both from the opensc project (http://www.opensc.org/)
-# By default no engines are loaded.
-# make the opensc engine available
-#opensc_engine_path=/usr/lib/opensc/engine_opensc.so
-# make the pkcs11 engine available
-#pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
-# configure the path to the pkcs11 module required by the pkcs11 engine
-#pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
-
-# Dynamic EAP methods
-# If EAP methods were built dynamically as shared object files, they need to be
-# loaded here before being used in the network blocks. By default, EAP methods
-# are included statically in the build, so these lines are not needed
-#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_tls.so
-#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_md5.so
-
-# Driver interface parameters
-# This field can be used to configure arbitrary driver interace parameters. The
-# format is specific to the selected driver interface. This field is not used
-# in most cases.
-#driver_param="field=value"
-
-# Maximum lifetime for PMKSA in seconds; default 43200
-#dot11RSNAConfigPMKLifetime=43200
-# Threshold for reauthentication (percentage of PMK lifetime); default 70
-#dot11RSNAConfigPMKReauthThreshold=70
-# Timeout for security association negotiation in seconds; default 60
-#dot11RSNAConfigSATimeout=60
-
-# network block
-#
-# Each network (usually AP's sharing the same SSID) is configured as a separate
-# block in this configuration file. The network blocks are in preference order
-# (the first match is used).
-#
-# network block fields:
-#
-# disabled:
-#	0 = this network can be used (default)
-#	1 = this network block is disabled (can be enabled through ctrl_iface,
-#	    e.g., with wpa_cli or wpa_gui)
-#
-# id_str: Network identifier string for external scripts. This value is passed
-#	to external action script through wpa_cli as WPA_ID_STR environment
-#	variable to make it easier to do network specific configuration.
-#
-# ssid: SSID (mandatory); either as an ASCII string with double quotation or
-#	as hex string; network name
-#
-# scan_ssid:
-#	0 = do not scan this SSID with specific Probe Request frames (default)
-#	1 = scan with SSID-specific Probe Request frames (this can be used to
-#	    find APs that do not accept broadcast SSID or use multiple SSIDs;
-#	    this will add latency to scanning, so enable this only when needed)
-#
-# bssid: BSSID (optional); if set, this network block is used only when
-#	associating with the AP using the configured BSSID
-#
-# priority: priority group (integer)
-# By default, all networks will get same priority group (0). If some of the
-# networks are more desirable, this field can be used to change the order in
-# which wpa_supplicant goes through the networks when selecting a BSS. The
-# priority groups will be iterated in decreasing priority (i.e., the larger the
-# priority value, the sooner the network is matched against the scan results).
-# Within each priority group, networks will be selected based on security
-# policy, signal strength, etc.
-# Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not
-# using this priority to select the order for scanning. Instead, they try the
-# networks in the order that used in the configuration file.
-#
-# mode: IEEE 802.11 operation mode
-# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default)
-# 1 = IBSS (ad-hoc, peer-to-peer)
-# Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP)
-# and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
-# to be set to 2 for IBSS. WPA-None requires following network block options:
-# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
-# both), and psk must also be set.
-#
-# proto: list of accepted protocols
-# WPA = WPA/IEEE 802.11i/D3.0
-# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
-# If not set, this defaults to: WPA RSN
-#
-# key_mgmt: list of accepted authenticated key management protocols
-# WPA-PSK = WPA pre-shared key (this requires 'psk' field)
-# WPA-EAP = WPA using EAP authentication (this can use an external
-#	program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
-# IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
-#	generated WEP keys
-# NONE = WPA is not used; plaintext or static WEP could be used
-# If not set, this defaults to: WPA-PSK WPA-EAP
-#
-# auth_alg: list of allowed IEEE 802.11 authentication algorithms
-# OPEN = Open System authentication (required for WPA/WPA2)
-# SHARED = Shared Key authentication (requires static WEP keys)
-# LEAP = LEAP/Network EAP (only used with LEAP)
-# If not set, automatic selection is used (Open System with LEAP enabled if
-# LEAP is allowed as one of the EAP methods).
-#
-# pairwise: list of accepted pairwise (unicast) ciphers for WPA
-# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
-# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
-# NONE = Use only Group Keys (deprecated, should not be included if APs support
-#	pairwise keys)
-# If not set, this defaults to: CCMP TKIP
-#
-# group: list of accepted group (broadcast/multicast) ciphers for WPA
-# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
-# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
-# WEP104 = WEP (Wired Equivalent Privacy) with 104-bit key
-# WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE 802.11]
-# If not set, this defaults to: CCMP TKIP WEP104 WEP40
-#
-# psk: WPA preshared key; 256-bit pre-shared key
-# The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
-# 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
-# generated using the passphrase and SSID). ASCII passphrase must be between
-# 8 and 63 characters (inclusive).
-# This field is not needed, if WPA-EAP is used.
-# Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys
-# from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
-# startup and reconfiguration time can be optimized by generating the PSK only
-# only when the passphrase or SSID has actually changed.
-#
-# eapol_flags: IEEE 802.1X/EAPOL options (bit field)
-# Dynamic WEP key required for non-WPA mode
-# bit0 (1): require dynamically generated unicast WEP key
-# bit1 (2): require dynamically generated broadcast WEP key
-# 	(3 = require both keys; default)
-# Note: When using wired authentication, eapol_flags must be set to 0 for the
-# authentication to be completed successfully.
-#
-# proactive_key_caching:
-# Enable/disable opportunistic PMKSA caching for WPA2.
-# 0 = disabled (default)
-# 1 = enabled
-#
-# wep_key0..3: Static WEP key (ASCII in double quotation, e.g. "abcde" or
-# hex without quotation, e.g., 0102030405)
-# wep_tx_keyidx: Default WEP key index (TX) (0..3)
-#
-# peerkey: Whether PeerKey negotiation for direct links (IEEE 802.11e DLS) is
-# allowed. This is only used with RSN/WPA2.
-# 0 = disabled (default)
-# 1 = enabled
-#peerkey=1
-#
-# Following fields are only used with internal EAP implementation.
-# eap: space-separated list of accepted EAP methods
-#	MD5 = EAP-MD5 (unsecure and does not generate keying material ->
-#			cannot be used with WPA; to be used as a Phase 2 method
-#			with EAP-PEAP or EAP-TTLS)
-#       MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
-#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
-#       OTP = EAP-OTP (cannot be used separately with WPA; to be used
-#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
-#       GTC = EAP-GTC (cannot be used separately with WPA; to be used
-#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
-#	TLS = EAP-TLS (client and server certificate)
-#	PEAP = EAP-PEAP (with tunnelled EAP authentication)
-#	TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
-#			 authentication)
-#	If not set, all compiled in methods are allowed.
-#
-# identity: Identity string for EAP
-# anonymous_identity: Anonymous identity string for EAP (to be used as the
-#	unencrypted identity with EAP types that support different tunnelled
-#	identity, e.g., EAP-TTLS)
-# password: Password string for EAP
-# ca_cert: File path to CA certificate file (PEM/DER). This file can have one
-#	or more trusted CA certificates. If ca_cert and ca_path are not
-#	included, server certificate will not be verified. This is insecure and
-#	a trusted CA certificate should always be configured when using
-#	EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
-#	change when wpa_supplicant is run in the background.
-#	On Windows, trusted CA certificates can be loaded from the system
-#	certificate store by setting this to cert_store://<name>, e.g.,
-#	ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT".
-#	Note that when running wpa_supplicant as an application, the user
-#	certificate store (My user account) is used, whereas computer store
-#	(Computer account) is used when running wpasvc as a service.
-# ca_path: Directory path for CA certificate files (PEM). This path may
-#	contain multiple CA certificates in OpenSSL format. Common use for this
-#	is to point to system trusted CA list which is often installed into
-#	directory like /etc/ssl/certs. If configured, these certificates are
-#	added to the list of trusted CAs. ca_cert may also be included in that
-#	case, but it is not required.
-# client_cert: File path to client certificate file (PEM/DER)
-#	Full path should be used since working directory may change when
-#	wpa_supplicant is run in the background.
-#	Alternatively, a named configuration blob can be used by setting this
-#	to blob://<blob name>.
-# private_key: File path to client private key file (PEM/DER/PFX)
-#	When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
-#	commented out. Both the private key and certificate will be read from
-#	the PKCS#12 file in this case. Full path should be used since working
-#	directory may change when wpa_supplicant is run in the background.
-#	Windows certificate store can be used by leaving client_cert out and
-#	configuring private_key in one of the following formats:
-#	cert://substring_to_match
-#	hash://certificate_thumbprint_in_hex
-#	for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
-#	Note that when running wpa_supplicant as an application, the user
-#	certificate store (My user account) is used, whereas computer store
-#	(Computer account) is used when running wpasvc as a service.
-#	Alternatively, a named configuration blob can be used by setting this
-#	to blob://<blob name>.
-# private_key_passwd: Password for private key file (if left out, this will be
-#	asked through control interface)
-# dh_file: File path to DH/DSA parameters file (in PEM format)
-#	This is an optional configuration file for setting parameters for an
-#	ephemeral DH key exchange. In most cases, the default RSA
-#	authentication does not use this configuration. However, it is possible
-#	setup RSA to use ephemeral DH key exchange. In addition, ciphers with
-#	DSA keys always use ephemeral DH keys. This can be used to achieve
-#	forward secrecy. If the file is in DSA parameters format, it will be
-#	automatically converted into DH params.
-# subject_match: Substring to be matched against the subject of the
-#	authentication server certificate. If this string is set, the server
-#	sertificate is only accepted if it contains this string in the subject.
-#	The subject string is in following format:
-#	/C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com
-# altsubject_match: Semicolon separated string of entries to be matched against
-#	the alternative subject name of the authentication server certificate.
-#	If this string is set, the server sertificate is only accepted if it
-#	contains one of the entries in an alternative subject name extension.
-#	altSubjectName string is in following format: TYPE:VALUE
-#	Example: EMAIL:server@example.com
-#	Example: DNS:server.example.com;DNS:server2.example.com
-#	Following types are supported: EMAIL, DNS, URI
-# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
-#	(string with field-value pairs, e.g., "peapver=0" or
-#	"peapver=1 peaplabel=1")
-#	'peapver' can be used to force which PEAP version (0 or 1) is used.
-#	'peaplabel=1' can be used to force new label, "client PEAP encryption",
-#	to be used during key derivation when PEAPv1 or newer. Most existing
-#	PEAPv1 implementation seem to be using the old label, "client EAP
-#	encryption", and wpa_supplicant is now using that as the default value.
-#	Some servers, e.g., Radiator, may require peaplabel=1 configuration to
-#	interoperate with PEAPv1; see eap_testing.txt for more details.
-#	'peap_outer_success=0' can be used to terminate PEAP authentication on
-#	tunneled EAP-Success. This is required with some RADIUS servers that
-#	implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
-#	Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode)
-#	include_tls_length=1 can be used to force wpa_supplicant to include
-#	TLS Message Length field in all TLS messages even if they are not
-#	fragmented.
-#	sim_min_num_chal=3 can be used to configure EAP-SIM to require three
-#	challenges (by default, it accepts 2 or 3)
-# phase2: Phase2 (inner authentication with TLS tunnel) parameters
-#	(string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
-#	"autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
-# Following certificate/private key fields are used in inner Phase2
-# authentication when using EAP-TTLS or EAP-PEAP.
-# ca_cert2: File path to CA certificate file. This file can have one or more
-#	trusted CA certificates. If ca_cert2 and ca_path2 are not included,
-#	server certificate will not be verified. This is insecure and a trusted
-#	CA certificate should always be configured.
-# ca_path2: Directory path for CA certificate files (PEM)
-# client_cert2: File path to client certificate file
-# private_key2: File path to client private key file
-# private_key2_passwd: Password for private key file
-# dh_file2: File path to DH/DSA parameters file (in PEM format)
-# subject_match2: Substring to be matched against the subject of the
-#	authentication server certificate.
-# altsubject_match2: Substring to be matched against the alternative subject
-#	name of the authentication server certificate.
-#
-# fragment_size: Maximum EAP fragment size in bytes (default 1398).
-#	This value limits the fragment size for EAP methods that support
-#	fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
-#	small enough to make the EAP messages fit in MTU of the network
-#	interface used for EAPOL. The default value is suitable for most
-#	cases.
-#
-# EAP-PSK variables:
-# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
-# nai: user NAI
-#
-# EAP-PAX variables:
-# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
-#
-# EAP-SAKE variables:
-# eappsk: 32-byte (256-bit, 64 hex digits) pre-shared key in hex format
-#	(this is concatenation of Root-Secret-A and Root-Secret-B)
-# nai: user NAI (PEERID)
-#
-# EAP-GPSK variables:
-# eappsk: Pre-shared key in hex format (at least 128 bits, i.e., 32 hex digits)
-# nai: user NAI (ID_Client)
-#
-# EAP-FAST variables:
-# pac_file: File path for the PAC entries. wpa_supplicant will need to be able
-#	to create this file and write updates to it when PAC is being
-#	provisioned or refreshed. Full path to the file should be used since
-#	working directory may change when wpa_supplicant is run in the
-#	background. Alternatively, a named configuration blob can be used by
-#	setting this to blob://<blob name>
-# phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST
-#	credentials (PAC)
-#
-# wpa_supplicant supports number of "EAP workarounds" to work around
-# interoperability issues with incorrectly behaving authentication servers.
-# These are enabled by default because some of the issues are present in large
-# number of authentication servers. Strict EAP conformance mode can be
-# configured by disabling workarounds with eap_workaround=0.
-
-# Example blocks:
-
-# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
-network={
-	ssid="simple"
-	psk="very secret passphrase"
-	priority=5
-}
-
-# Same as previous, but request SSID-specific scanning (for APs that reject
-# broadcast SSID)
-network={
-	ssid="second ssid"
-	scan_ssid=1
-	psk="very secret passphrase"
-	priority=2
-}
-
-# Only WPA-PSK is used. Any valid cipher combination is accepted.
-network={
-	ssid="example"
-	proto=WPA
-	key_mgmt=WPA-PSK
-	pairwise=CCMP TKIP
-	group=CCMP TKIP WEP104 WEP40
-	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
-	priority=2
-}
-
-# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
-# or WEP40 as the group cipher will not be accepted.
-network={
-	ssid="example"
-	proto=RSN
-	key_mgmt=WPA-EAP
-	pairwise=CCMP TKIP
-	group=CCMP TKIP
-	eap=TLS
-	identity="user@example.com"
-	ca_cert="/etc/cert/ca.pem"
-	client_cert="/etc/cert/user.pem"
-	private_key="/etc/cert/user.prv"
-	private_key_passwd="password"
-	priority=1
-}
-
-# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
-# (e.g., Radiator)
-network={
-	ssid="example"
-	key_mgmt=WPA-EAP
-	eap=PEAP
-	identity="user@example.com"
-	password="foobar"
-	ca_cert="/etc/cert/ca.pem"
-	phase1="peaplabel=1"
-	phase2="auth=MSCHAPV2"
-	priority=10
-}
-
-# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
-# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
-network={
-	ssid="example"
-	key_mgmt=WPA-EAP
-	eap=TTLS
-	identity="user@example.com"
-	anonymous_identity="anonymous@example.com"
-	password="foobar"
-	ca_cert="/etc/cert/ca.pem"
-	priority=2
-}
-
-# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
-# use. Real identity is sent only within an encrypted TLS tunnel.
-network={
-	ssid="example"
-	key_mgmt=WPA-EAP
-	eap=TTLS
-	identity="user@example.com"
-	anonymous_identity="anonymous@example.com"
-	password="foobar"
-	ca_cert="/etc/cert/ca.pem"
-	phase2="auth=MSCHAPV2"
-}
-
-# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
-# authentication.
-network={
-	ssid="example"
-	key_mgmt=WPA-EAP
-	eap=TTLS
-	# Phase1 / outer authentication
-	anonymous_identity="anonymous@example.com"
-	ca_cert="/etc/cert/ca.pem"
-	# Phase 2 / inner authentication
-	phase2="autheap=TLS"
-	ca_cert2="/etc/cert/ca2.pem"
-	client_cert2="/etc/cer/user.pem"
-	private_key2="/etc/cer/user.prv"
-	private_key2_passwd="password"
-	priority=2
-}
-
-# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
-# group cipher.
-network={
-	ssid="example"
-	bssid=00:11:22:33:44:55
-	proto=WPA RSN
-	key_mgmt=WPA-PSK WPA-EAP
-	pairwise=CCMP
-	group=CCMP
-	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
-}
-
-# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
-# and all valid ciphers.
-network={
-	ssid=00010203
-	psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
-}
-
-
-# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using
-# EAP-TLS for authentication and key generation; require both unicast and
-# broadcast WEP keys.
-network={
-	ssid="1x-test"
-	key_mgmt=IEEE8021X
-	eap=TLS
-	identity="user@example.com"
-	ca_cert="/etc/cert/ca.pem"
-	client_cert="/etc/cert/user.pem"
-	private_key="/etc/cert/user.prv"
-	private_key_passwd="password"
-	eapol_flags=3
-}
-
-
-# LEAP with dynamic WEP keys
-network={
-	ssid="leap-example"
-	key_mgmt=IEEE8021X
-	eap=LEAP
-	identity="user"
-	password="foobar"
-}
-
-# Plaintext connection (no WPA, no IEEE 802.1X)
-network={
-	ssid="plaintext-test"
-	key_mgmt=NONE
-}
-
-
-# Shared WEP key connection (no WPA, no IEEE 802.1X)
-network={
-	ssid="static-wep-test"
-	key_mgmt=NONE
-	wep_key0="abcde"
-	wep_key1=0102030405
-	wep_key2="1234567890123"
-	wep_tx_keyidx=0
-	priority=5
-}
-
-
-# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key
-# IEEE 802.11 authentication
-network={
-	ssid="static-wep-test2"
-	key_mgmt=NONE
-	wep_key0="abcde"
-	wep_key1=0102030405
-	wep_key2="1234567890123"
-	wep_tx_keyidx=0
-	priority=5
-	auth_alg=SHARED
-}
-
-
-# IBSS/ad-hoc network with WPA-None/TKIP.
-network={
-	ssid="test adhoc"
-	mode=1
-	proto=WPA
-	key_mgmt=WPA-NONE
-	pairwise=NONE
-	group=TKIP
-	psk="secret passphrase"
-}
-
-
-# Catch all example that allows more or less all configuration modes
-network={
-	ssid="example"
-	scan_ssid=1
-	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
-	pairwise=CCMP TKIP
-	group=CCMP TKIP WEP104 WEP40
-	psk="very secret passphrase"
-	eap=TTLS PEAP TLS
-	identity="user@example.com"
-	password="foobar"
-	ca_cert="/etc/cert/ca.pem"
-	client_cert="/etc/cert/user.pem"
-	private_key="/etc/cert/user.prv"
-	private_key_passwd="password"
-	phase1="peaplabel=0"
-}
-
-# Example of EAP-TLS with smartcard (openssl engine)
-network={
-	ssid="example"
-	key_mgmt=WPA-EAP
-	eap=TLS
-	proto=RSN
-	pairwise=CCMP TKIP
-	group=CCMP TKIP
-	identity="user@example.com"
-	ca_cert="/etc/cert/ca.pem"
-	client_cert="/etc/cert/user.pem"
-
-	engine=1
-
-	# The engine configured here must be available. Look at
-	# OpenSSL engine support in the global section.
-	# The key available through the engine must be the private key
-	# matching the client certificate configured above.
-
-	# use the opensc engine
-	#engine_id="opensc"
-	#key_id="45"
-
-	# use the pkcs11 engine
-	engine_id="pkcs11"
-	key_id="id_45"
-
-	# Optional PIN configuration; this can be left out and PIN will be
-	# asked through the control interface
-	pin="1234"
-}
-
-# Example configuration showing how to use an inlined blob as a CA certificate
-# data instead of using external file
-network={
-	ssid="example"
-	key_mgmt=WPA-EAP
-	eap=TTLS
-	identity="user@example.com"
-	anonymous_identity="anonymous@example.com"
-	password="foobar"
-	ca_cert="blob://exampleblob"
-	priority=20
-}
-
-blob-base64-exampleblob={
-SGVsbG8gV29ybGQhCg==
-}
-
-
-# Wildcard match for SSID (plaintext APs only). This example select any
-# open AP regardless of its SSID.
-network={
-	key_mgmt=NONE
-}
+device_name=Blaze
+manufacturer=TI
+model_name=Wilink
+model_number=wl18xx
+serial_number=12345
+driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
+# Timeout in seconds to detect STA inactivity (default: 300 seconds)
+#
+# This timeout value is used in P2P GO mode to clean up
+# inactive stations.
+p2p_go_max_inactivity=60
+p2p_go_ht40=1
+p2p_multi_chan=1
+disassoc_low_ack=1
+concurrent_sched_scan=1
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 2/8] hostap-daemon-wl18xx: Update recipe to ol_r8.a8.08 version
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-08  8:18 ` [PATCH 3/8] wlconf : " Yaniv Mahani
                   ` (7 subsequent siblings)
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- Build hostap-daemon from TI_Openlink ol_r8.a8.08
- Add missing includes for building with libnl3.
- Adjusted configuration files.

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 ...d-change-conf-file-for-better-oob-startup.patch | 1089 +++++++++++++++++++-
 ...8.a6.01.bb => hostap-daemon-wl18xx_r8.a8.08.bb} |    6 +-
 .../hostap/hostap-daemon/defconfig                 |   42 +-
 .../recipes-connectivity/hostap/hostap.inc         |    3 +-
 4 files changed, 1101 insertions(+), 39 deletions(-)
 rename meta-arago-extras/recipes-connectivity/hostap/{hostap-daemon-wl18xx_r8.a6.01.bb => hostap-daemon-wl18xx_r8.a8.08.bb} (84%)

diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx/0001-hostapd-change-conf-file-for-better-oob-startup.patch b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx/0001-hostapd-change-conf-file-for-better-oob-startup.patch
index 824d250..aee4531 100644
--- a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx/0001-hostapd-change-conf-file-for-better-oob-startup.patch
+++ b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx/0001-hostapd-change-conf-file-for-better-oob-startup.patch
@@ -1,40 +1,1093 @@
-From f7c1b9d4e18dc650dd0b9da97a91f27f6a4bb5b7 Mon Sep 17 00:00:00 2001
-From: Eyal Reizer <eyalr@ti.com>
-Date: Sun, 17 Mar 2013 07:18:55 -0700
-Subject: [PATCH] hostapd: change conf file for better sdk out of box startup
+From 0649cc8f954a957a32180dc714ab4226503c5a66 Mon Sep 17 00:00:00 2001
+From: Yaniv Mahani <yanivma@ti.com>
+Date: Wed, 27 Nov 2013 13:43:55 +0200
+Subject: [PATCH] hostapd change conf file for better oob startup
 
-Change the default channel to 6 and change the ssid to a more
-meaningful name.
-
-Upstream-status: inappropriate [SDK specific patch]
-
-Signed-off-by: Eyal Reizer <eyalr@ti.com>
+Changed some of the default parameters
 ---
- hostapd/hostapd.conf |    4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
+ hostapd/hostapd.conf |  726 +++++++-------------------------------------------
+ 1 file changed, 89 insertions(+), 637 deletions(-)
 
 diff --git a/hostapd/hostapd.conf b/hostapd/hostapd.conf
-index f71a881..00843aa 100644
+index f26f310..162fc28 100644
 --- a/hostapd/hostapd.conf
 +++ b/hostapd/hostapd.conf
-@@ -83,7 +83,7 @@ ctrl_interface_group=0
+@@ -1,9 +1,23 @@
+ ##### hostapd configuration file ##############################################
+ # Empty lines and lines starting with # are ignored
++#
++# Copyright (C) {2011} Texas Instruments Incorporated - http://www.ti.com/
++#
++# Licensed under the Apache License, Version 2.0 (the "License");
++# you may not use this file except in compliance with the License.
++# You may obtain a copy of the License at
++#
++# 	http://www.apache.org/licenses/LICENSE-2.0
++#
++# Unless required by applicable law or agreed to in writing, software
++# distributed under the License is distributed on an "AS IS" BASIS,
++# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
++# See the License for the specific language governing permissions and
++# limitations under the License.
+
+ # AP netdevice name (without 'ap' postfix, i.e., wlan0 uses wlan0ap for
+ # management frames); ath0 for madwifi
+-interface=wlan0
++interface=wlan1
+
+ # In case of madwifi, atheros, and nl80211 driver interfaces, an additional
+ # configuration parameter, bridge, may be used to notify hostapd if the
+@@ -22,7 +36,7 @@ interface=wlan0
+ # default: hostap). nl80211 is used with all Linux mac80211 drivers.
+ # Use driver=none if building hostapd as a standalone RADIUS server that does
+ # not control any wireless/wired driver.
+-# driver=hostap
++driver=nl80211
+
+ # hostapd event logger configuration
+ #
+@@ -50,10 +64,8 @@ logger_syslog=-1
+ logger_syslog_level=2
+ logger_stdout=-1
+ logger_stdout_level=2
+-
+ # Dump file for state information (on SIGUSR1)
+-dump_file=/tmp/hostapd.dump
+-
++dump_file=/var/run/hostapd.dump
+ # Interface for separate control program. If this is specified, hostapd
+ # will create this directory and a UNIX domain socket for listening to requests
+ # from external programs (CLI/GUI, etc.) for status information and
+@@ -63,7 +75,6 @@ dump_file=/tmp/hostapd.dump
+ # /var/run/hostapd is the recommended directory for sockets and by default,
+ # hostapd_cli will use it when trying to connect with hostapd.
+ ctrl_interface=/var/run/hostapd
+-
+ # Access control for the control interface can be configured by setting the
+ # directory to allow only members of a group to use sockets. This way, it is
+ # possible to run hostapd as root (since it needs to change network
+@@ -77,13 +88,12 @@ ctrl_interface=/var/run/hostapd
+ #
+ # This variable can be a group name or gid.
+ #ctrl_interface_group=wheel
+-ctrl_interface_group=0
+-
+
  ##### IEEE 802.11 related configuration #######################################
  
  # SSID to be used in IEEE 802.11 management frames
 -ssid=test
 +ssid=TexasInstruments_0001
- 
++
+ # Alternative formats for configuring SSID
+ # (double quoted string, hexdump, printf-escaped string)
+ #ssid2="test"
+@@ -93,27 +103,25 @@ ssid=test
  # Country code (ISO/IEC 3166-1). Used to set regulatory domain.
  # Set as needed to indicate country in which device is operating.
-@@ -107,7 +107,7 @@ hw_mode=g
+ # This can limit available channels and transmit power.
+-#country_code=US
++country_code=US
+
+ # Enable IEEE 802.11d. This advertises the country_code and the set of allowed
+ # channels and transmit power levels based on the regulatory limits. The
+ # country_code setting must be configured with the correct country for
+ # IEEE 802.11d functions.
+ # (default: 0 = disabled)
+-#ieee80211d=1
++ieee80211d=1
+
+ # Operation mode (a = IEEE 802.11a, b = IEEE 802.11b, g = IEEE 802.11g,
+ # Default: IEEE 802.11b
+ hw_mode=g
+-
+ # Channel number (IEEE 802.11)
+ # (default: 0, i.e., not set)
+ # Please note that some drivers do not use this value from hostapd and the
  # channel will need to be configured separately with iwconfig.
  # When set to 0, automatic channel selection will be engaged. A channel
  # will be selected from the desired hw_mode.
 -channel=1
-+channel=6
- 
+-
++channel=11
  # Automatic channel selection (ACS) whitelist
  # (default: not set)
+ # Allow only these channels in automatic channel selection
+@@ -123,39 +131,34 @@ channel=1
+ # (default: not set)
+ # Don't allow these channels in automatic channel selection
+ # acs_blacklist=1 2 3 4 5 6 7 8 9 10 11
+-
+ # Sync channel to previous operational APs
+ # (default: 0)
+ # Set to 1 in order to sync the channel of the current AP to the
+ # channel of an operational radio on the same PHY. Note that this
+ # applies to the 40Mhz operating channel (primary + secondary)
+-#ap_channel_sync=0
++ap_channel_sync=1
+
+ # Beacon interval in kus (1.024 ms) (default: 100; range 15..65535)
+ beacon_int=100
+-
+ # DTIM (delivery traffic information message) period (range 1..255):
+ # number of beacons between DTIMs (1 = every beacon includes DTIM element)
+ # (default: 2)
+ dtim_period=2
+-
+ # Maximum number of stations allowed in station table. New stations will be
+ # rejected after the station table is full. IEEE 802.11 has a limit of 2007
+ # different association IDs, so this number should not be larger than that.
+ # (default: 2007)
+-max_num_sta=255
+-
++max_num_sta=10
+ # RTS/CTS threshold; 2347 = disabled (default); range 0..2347
+ # If this field is not included in hostapd.conf, hostapd will not control
+ # RTS threshold and 'iwconfig wlan# rts <val>' can be used to set it.
+-rts_threshold=2347
++#rts_threshold=2347
+
+ # Fragmentation threshold; 2346 = disabled (default); range 256..2346
+ # If this field is not included in hostapd.conf, hostapd will not control
+ # fragmentation threshold and 'iwconfig wlan# frag <val>' can be used to set
+ # it.
+-fragm_threshold=2346
+-
++#fragm_threshold=2346
+ # Rate configuration
+ # Default is to enable all rates supported by the hardware. This configuration
+ # item allows this list be filtered so that only the listed rates will be left
+@@ -167,14 +170,14 @@ fragm_threshold=2346
+ # default: use the most common supported rate setting for the selected
+ # hw_mode (i.e., this line can be removed from configuration file in most
+ # cases)
+-#supported_rates=10 20 55 110 60 90 120 180 240 360 480 540
+-
++supported_rates=10 20 55 110 60 90 120 180 240 360 480 540
+ # Basic rate set configuration
+ # List of rates (in 100 kbps) that are included in the basic rate set.
+ # If this item is not included, usually reasonable default set is used.
+ #basic_rates=10 20
+ #basic_rates=10 20 55 110
+ #basic_rates=60 120 240
++basic_rates=10 20 55 110 60 120 240
+
+ # Short Preamble
+ # This parameter can be used to enable optional use of short preamble for
+@@ -185,8 +188,7 @@ fragm_threshold=2346
+ # disabled (and enabled when such STAs disassociate) dynamically.
+ # 0 = do not allow use of short preamble (default)
+ # 1 = allow use of short preamble
+-#preamble=1
+-
++preamble=1
+ # Station MAC address -based authentication
+ # Please note that this kind of access control requires a driver that uses
+ # hostapd to take care of management frame processing and as such, this can be
+@@ -195,7 +197,6 @@ fragm_threshold=2346
+ # 1 = deny unless in accept list
+ # 2 = use external RADIUS server (accept/deny lists are searched first)
+ macaddr_acl=0
+-
+ # Accept/deny lists are read from separate files (containing list of
+ # MAC addresses, one per line). Use absolute path name to make sure that the
+ # files can be read on SIGHUP configuration reloads.
+@@ -209,7 +210,6 @@ macaddr_acl=0
+ # bit 0 = Open System Authentication
+ # bit 1 = Shared Key Authentication (requires WEP)
+ auth_algs=3
+-
+ # Send empty SSID in beacons and ignore probe request frames that do not
+ # specify full SSID, i.e., require stations to know SSID.
+ # default: disabled (0)
+@@ -219,14 +219,12 @@ auth_algs=3
+ #     with some clients that do not support empty SSID) and ignore probe
+ #     requests for broadcast SSID
+ ignore_broadcast_ssid=0
+-
+ # Additional vendor specfic elements for Beacon and Probe Response frames
+ # This parameter can be used to add additional vendor specific element(s) into
+ # the end of the Beacon and Probe Response frames. The format for these
+ # element(s) is a hexdump of the raw information elements (id+len+payload for
+ # one or more elements)
+ #vendor_elements=dd0411223301
+-
+ # TX queue parameters (EDCF / bursting)
+ # tx_queue_<queue name>_<param>
+ # queues: data0, data1, data2, data3, after_beacon, beacon
+@@ -243,31 +241,31 @@ ignore_broadcast_ssid=0
+ # to the clients.
+ #
+ # Low priority / AC_BK = background
+-#tx_queue_data3_aifs=7
+-#tx_queue_data3_cwmin=15
+-#tx_queue_data3_cwmax=1023
+-#tx_queue_data3_burst=0
++tx_queue_data3_aifs=7
++tx_queue_data3_cwmin=15
++tx_queue_data3_cwmax=1023
++tx_queue_data3_burst=0
+ # Note: for IEEE 802.11b mode: cWmin=31 cWmax=1023 burst=0
+ #
+ # Normal priority / AC_BE = best effort
+-#tx_queue_data2_aifs=3
+-#tx_queue_data2_cwmin=15
+-#tx_queue_data2_cwmax=63
+-#tx_queue_data2_burst=0
++tx_queue_data2_aifs=3
++tx_queue_data2_cwmin=15
++tx_queue_data2_cwmax=63
++tx_queue_data2_burst=0
+ # Note: for IEEE 802.11b mode: cWmin=31 cWmax=127 burst=0
+ #
+ # High priority / AC_VI = video
+-#tx_queue_data1_aifs=1
+-#tx_queue_data1_cwmin=7
+-#tx_queue_data1_cwmax=15
+-#tx_queue_data1_burst=3.0
++tx_queue_data1_aifs=1
++tx_queue_data1_cwmin=7
++tx_queue_data1_cwmax=15
++tx_queue_data1_burst=3.0
+ # Note: for IEEE 802.11b mode: cWmin=15 cWmax=31 burst=6.0
+ #
+ # Highest priority / AC_VO = voice
+-#tx_queue_data0_aifs=1
+-#tx_queue_data0_cwmin=3
+-#tx_queue_data0_cwmax=7
+-#tx_queue_data0_burst=1.5
++tx_queue_data0_aifs=1
++tx_queue_data0_cwmin=3
++tx_queue_data0_cwmax=7
++tx_queue_data0_burst=1.5
+ # Note: for IEEE 802.11b mode: cWmin=7 cWmax=15 burst=3.3
+
+ # 802.1D Tag (= UP) to AC mappings
+@@ -298,42 +296,42 @@ ignore_broadcast_ssid=0
+ # note - here cwMin and cmMax are in exponent form. the actual cw value used
+ # will be (2^n)-1 where n is the value given here
+ #
+-wmm_enabled=1
++wme_enabled=1
+ #
+ # WMM-PS Unscheduled Automatic Power Save Delivery [U-APSD]
+ # Enable this flag if U-APSD supported outside hostapd (eg., Firmware/driver)
+-#uapsd_advertisement_enabled=1
++uapsd_advertisement_enabled=1
+ #
+ # Low priority / AC_BK = background
+-wmm_ac_bk_cwmin=4
+-wmm_ac_bk_cwmax=10
+-wmm_ac_bk_aifs=7
+-wmm_ac_bk_txop_limit=0
+-wmm_ac_bk_acm=0
++wme_ac_bk_cwmin=4
++wme_ac_bk_cwmax=10
++wme_ac_bk_aifs=7
++wme_ac_bk_txop_limit=0
++wme_ac_bk_acm=0
+ # Note: for IEEE 802.11b mode: cWmin=5 cWmax=10
+ #
+ # Normal priority / AC_BE = best effort
+-wmm_ac_be_aifs=3
+-wmm_ac_be_cwmin=4
+-wmm_ac_be_cwmax=10
+-wmm_ac_be_txop_limit=0
+-wmm_ac_be_acm=0
++wme_ac_be_aifs=3
++wme_ac_be_cwmin=4
++wme_ac_be_cwmax=10
++wme_ac_be_txop_limit=0
++wme_ac_be_acm=0
+ # Note: for IEEE 802.11b mode: cWmin=5 cWmax=7
+ #
+ # High priority / AC_VI = video
+-wmm_ac_vi_aifs=2
+-wmm_ac_vi_cwmin=3
+-wmm_ac_vi_cwmax=4
+-wmm_ac_vi_txop_limit=94
+-wmm_ac_vi_acm=0
++wme_ac_vi_aifs=2
++wme_ac_vi_cwmin=3
++wme_ac_vi_cwmax=4
++wme_ac_vi_txop_limit=94
++wme_ac_vi_acm=0
+ # Note: for IEEE 802.11b mode: cWmin=4 cWmax=5 txop_limit=188
+ #
+ # Highest priority / AC_VO = voice
+-wmm_ac_vo_aifs=2
+-wmm_ac_vo_cwmin=2
+-wmm_ac_vo_cwmax=3
+-wmm_ac_vo_txop_limit=47
+-wmm_ac_vo_acm=0
++wme_ac_vo_aifs=2
++wme_ac_vo_cwmin=2
++wme_ac_vo_cwmax=3
++wme_ac_vo_txop_limit=47
++wme_ac_vo_acm=0
+ # Note: for IEEE 802.11b mode: cWmin=3 cWmax=4 burst=102
+
+ # Static WEP key configuration
+@@ -353,7 +351,6 @@ wmm_ac_vo_acm=0
+ #wep_key1="vwxyz"
+ #wep_key2=0102030405060708090a0b0c0d
+ #wep_key3=".2.4.6.8.0.23"
+-
+ # Station inactivity limit
+ #
+ # If a station does not send anything in ap_max_inactivity seconds, an
+@@ -369,7 +366,7 @@ wmm_ac_vo_acm=0
+ # disassociation frame is not sent immediately without first polling
+ # the STA with a data frame.
+ # default: 300 (i.e., 5 minutes)
+-#ap_max_inactivity=300
++ap_max_inactivity=10000
+ #
+ # The inactivity polling can be disabled to disconnect stations based on
+ # inactivity timeout so that idle stations are more likely to be disconnected
+@@ -380,7 +377,7 @@ wmm_ac_vo_acm=0
+ # Disassociate stations based on excessive transmission failures or other
+ # indications of connection loss. This depends on the driver capabilities and
+ # may not be available with all drivers.
+-#disassoc_low_ack=1
++disassoc_low_ack=1
+
+ # Maximum allowed Listen Interval (how many Beacon periods STAs are allowed to
+ # remain asleep). Default: 65535 (no limit apart from field size)
+@@ -400,14 +397,13 @@ wmm_ac_vo_acm=0
+ # Client isolation can be used to prevent low-level bridging of frames between
+ # associated stations in the BSS. By default, this bridging is allowed.
+ #ap_isolate=1
+-
+ ##### IEEE 802.11n related configuration ######################################
+
+ # ieee80211n: Whether IEEE 802.11n (HT) is enabled
+ # 0 = disabled (default)
+ # 1 = enabled
+ # Note: You will also need to enable WMM for full HT functionality.
+-#ieee80211n=1
++ieee80211n=1
+
+ # ht_capab: HT capabilities (list of flags)
+ # LDPC coding capability: [LDPC] = supported
+@@ -442,162 +438,10 @@ wmm_ac_vo_acm=0
+ # DSSS/CCK Mode in 40 MHz: [DSSS_CCK-40] = allowed (not allowed if not set)
+ # PSMP support: [PSMP] (disabled if not set)
+ # L-SIG TXOP protection support: [LSIG-TXOP-PROT] (disabled if not set)
+-#ht_capab=[HT40-][SHORT-GI-20][SHORT-GI-40]
++ht_capab=[SHORT-GI-20][GF]
+
+ # Require stations to support HT PHY (reject association if they do not)
+ #require_ht=1
+-
+-##### IEEE 802.11ac related configuration #####################################
+-
+-# ieee80211ac: Whether IEEE 802.11ac (VHT) is enabled
+-# 0 = disabled (default)
+-# 1 = enabled
+-# Note: You will also need to enable WMM for full VHT functionality.
+-#ieee80211ac=1
+-
+-# vht_capab: VHT capabilities (list of flags)
+-#
+-# vht_max_mpdu_len: [MAX-MPDU-7991] [MAX-MPDU-11454]
+-# Indicates maximum MPDU length
+-# 0 = 3895 octets (default)
+-# 1 = 7991 octets
+-# 2 = 11454 octets
+-# 3 = reserved
+-#
+-# supported_chan_width: [VHT160] [VHT160-80PLUS80]
+-# Indicates supported Channel widths
+-# 0 = 160 MHz & 80+80 channel widths are not supported (default)
+-# 1 = 160 MHz channel width is supported
+-# 2 = 160 MHz & 80+80 channel widths are supported
+-# 3 = reserved
+-#
+-# Rx LDPC coding capability: [RXLDPC]
+-# Indicates support for receiving LDPC coded pkts
+-# 0 = Not supported (default)
+-# 1 = Supported
+-#
+-# Short GI for 80 MHz: [SHORT-GI-80]
+-# Indicates short GI support for reception of packets transmitted with TXVECTOR
+-# params format equal to VHT and CBW = 80Mhz
+-# 0 = Not supported (default)
+-# 1 = Supported
+-#
+-# Short GI for 160 MHz: [SHORT-GI-160]
+-# Indicates short GI support for reception of packets transmitted with TXVECTOR
+-# params format equal to VHT and CBW = 160Mhz
+-# 0 = Not supported (default)
+-# 1 = Supported
+-#
+-# Tx STBC: [TX-STBC-2BY1]
+-# Indicates support for the transmission of at least 2x1 STBC
+-# 0 = Not supported (default)
+-# 1 = Supported
+-#
+-# Rx STBC: [RX-STBC-1] [RX-STBC-12] [RX-STBC-123] [RX-STBC-1234]
+-# Indicates support for the reception of PPDUs using STBC
+-# 0 = Not supported (default)
+-# 1 = support of one spatial stream
+-# 2 = support of one and two spatial streams
+-# 3 = support of one, two and three spatial streams
+-# 4 = support of one, two, three and four spatial streams
+-# 5,6,7 = reserved
+-#
+-# SU Beamformer Capable: [SU-BEAMFORMER]
+-# Indicates support for operation as a single user beamformer
+-# 0 = Not supported (default)
+-# 1 = Supported
+-#
+-# SU Beamformee Capable: [SU-BEAMFORMEE]
+-# Indicates support for operation as a single user beamformee
+-# 0 = Not supported (default)
+-# 1 = Supported
+-#
+-# Compressed Steering Number of Beamformer Antennas Supported: [BF-ANTENNA-2]
+-#   Beamformee's capability indicating the maximum number of beamformer
+-#   antennas the beamformee can support when sending compressed beamforming
+-#   feedback
+-# If SU beamformer capable, set to maximum value minus 1
+-# else reserved (default)
+-#
+-# Number of Sounding Dimensions: [SOUNDING-DIMENSION-2]
+-# Beamformer's capability indicating the maximum value of the NUM_STS parameter
+-# in the TXVECTOR of a VHT NDP
+-# If SU beamformer capable, set to maximum value minus 1
+-# else reserved (default)
+-#
+-# MU Beamformer Capable: [MU-BEAMFORMER]
+-# Indicates support for operation as an MU beamformer
+-# 0 = Not supported or sent by Non-AP STA (default)
+-# 1 = Supported
+-#
+-# MU Beamformee Capable: [MU-BEAMFORMEE]
+-# Indicates support for operation as an MU beamformee
+-# 0 = Not supported or sent by AP (default)
+-# 1 = Supported
+-#
+-# VHT TXOP PS: [VHT-TXOP-PS]
+-# Indicates whether or not the AP supports VHT TXOP Power Save Mode
+-#  or whether or not the STA is in VHT TXOP Power Save mode
+-# 0 = VHT AP doesnt support VHT TXOP PS mode (OR) VHT Sta not in VHT TXOP PS
+-#  mode
+-# 1 = VHT AP supports VHT TXOP PS mode (OR) VHT Sta is in VHT TXOP power save
+-#  mode
+-#
+-# +HTC-VHT Capable: [HTC-VHT]
+-# Indicates whether or not the STA supports receiving a VHT variant HT Control
+-# field.
+-# 0 = Not supported (default)
+-# 1 = supported
+-#
+-# Maximum A-MPDU Length Exponent: [MAX-A-MPDU-LEN-EXP0]..[MAX-A-MPDU-LEN-EXP7]
+-# Indicates the maximum length of A-MPDU pre-EOF padding that the STA can recv
+-# This field is an integer in the range of 0 to 7.
+-# The length defined by this field is equal to
+-# 2 pow(13 + Maximum A-MPDU Length Exponent) -1 octets
+-#
+-# VHT Link Adaptation Capable: [VHT-LINK-ADAPT2] [VHT-LINK-ADAPT3]
+-# Indicates whether or not the STA supports link adaptation using VHT variant
+-# HT Control field
+-# If +HTC-VHTcapable is 1
+-#  0 = (no feedback) if the STA does not provide VHT MFB (default)
+-#  1 = reserved
+-#  2 = (Unsolicited) if the STA provides only unsolicited VHT MFB
+-#  3 = (Both) if the STA can provide VHT MFB in response to VHT MRQ and if the
+-#      STA provides unsolicited VHT MFB
+-# Reserved if +HTC-VHTcapable is 0
+-#
+-# Rx Antenna Pattern Consistency: [RX-ANTENNA-PATTERN]
+-# Indicates the possibility of Rx antenna pattern change
+-# 0 = Rx antenna pattern might change during the lifetime of an association
+-# 1 = Rx antenna pattern does not change during the lifetime of an association
+-#
+-# Tx Antenna Pattern Consistency: [TX-ANTENNA-PATTERN]
+-# Indicates the possibility of Tx antenna pattern change
+-# 0 = Tx antenna pattern might change during the lifetime of an association
+-# 1 = Tx antenna pattern does not change during the lifetime of an association
+-#vht_capab=[SHORT-GI-80][HTC-VHT]
+-#
+-# Require stations to support VHT PHY (reject association if they do not)
+-#require_vht=1
+-
+-# 0 = 20 or 40 MHz operating Channel width
+-# 1 = 80 MHz channel width
+-# 2 = 160 MHz channel width
+-# 3 = 80+80 MHz channel width
+-#vht_oper_chwidth=1
+-#
+-# center freq = 5 GHz + (5 * index)
+-# So index 42 gives center freq 5.210 GHz
+-# which is channel 42 in 5G band
+-#
+-#vht_oper_centr_freq_seg0_idx=42
+-#
+-# center freq = 5 GHz + (5 * index)
+-# So index 159 gives center freq 5.795 GHz
+-# which is channel 159 in 5G band
+-#
+-#vht_oper_centr_freq_seg1_idx=159
+-
+ ##### IEEE 802.1X-2004 related configuration ##################################
+
+ # Require IEEE 802.1X authorization
+@@ -625,11 +469,10 @@ wmm_ac_vo_acm=0
+ #wep_key_len_broadcast=5
+ #wep_key_len_unicast=5
+ # Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once)
+-#wep_rekey_period=300
+-
++wep_rekey_period=0
+ # EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if
+ # only broadcast keys are used)
+-eapol_key_index_workaround=0
++#eapol_key_index_workaround=0
+
+ # EAP reauthentication period in seconds (default: 3600 seconds; 0 = disable
+ # reauthentication).
+@@ -640,7 +483,6 @@ eapol_key_index_workaround=0
+ # mechanism used in wired authentication, but it also requires that the port
+ # is only used by one station.
+ #use_pae_group_addr=1
+-
+ ##### Integrated EAP server ###################################################
+
+ # Optionally, hostapd can be configured to use an integrated EAP server
+@@ -651,8 +493,7 @@ eapol_key_index_workaround=0
+ # Use integrated EAP server instead of external RADIUS authentication
+ # server. This is also needed if hostapd is configured to act as a RADIUS
+ # authentication server.
+-eap_server=0
+-
++eap_server=1
+ # Path for EAP server user database
+ # If SQLite support is included, this can be set to "sqlite:/path/to/sqlite.db"
+ # to use SQLite database instead of a text file.
+@@ -757,21 +598,12 @@ eap_server=0
+ # connect. Note: This is only used with EAP-TTLS and EAP-FAST. If any other
+ # EAP method is enabled, the peer will be allowed to connect without TNC.
+ #tnc=1
+-
+-
+-##### IEEE 802.11f - Inter-Access Point Protocol (IAPP) #######################
+-
+-# Interface to be used for IAPP broadcast packets
+-#iapp_interface=eth0
+-
+-
+ ##### RADIUS client configuration #############################################
+ # for IEEE 802.1X with external Authentication Server, IEEE 802.11
+ # authentication with external ACL for MAC addresses, and accounting
+
+ # The own IP address of the access point (used as NAS-IP-Address)
+ own_ip_addr=127.0.0.1
+-
+ # Optional NAS-Identifier string for RADIUS messages. When used, this should be
+ # a unique to the NAS within the scope of the RADIUS server. For example, a
+ # fully qualified domain name can be used here.
+@@ -922,8 +754,6 @@ own_ip_addr=127.0.0.1
+
+ # Use IPv6 with RADIUS server (IPv4 will also be supported using IPv6 API)
+ #radius_server_ipv6=1
+-
+-
+ ##### WPA/IEEE 802.11i configuration ##########################################
+
+ # Enable WPA. Setting this variable configures the AP to require WPA (either
+@@ -982,23 +812,18 @@ own_ip_addr=127.0.0.1
+ #wpa_pairwise=TKIP CCMP
+ # Pairwise cipher for RSN/WPA2 (default: use wpa_pairwise value)
+ #rsn_pairwise=CCMP
+-
+ # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
+ # seconds. (dot11RSNAConfigGroupRekeyTime)
+-#wpa_group_rekey=600
+-
++wpa_group_rekey=0
+ # Rekey GTK when any STA that possesses the current GTK is leaving the BSS.
+ # (dot11RSNAConfigGroupRekeyStrict)
+ #wpa_strict_rekey=1
+-
+ # Time interval for rekeying GMK (master key used internally to generate GTKs
+ # (in seconds).
+-#wpa_gmk_rekey=86400
+-
++wpa_gmk_rekey=0
+ # Maximum lifetime for PTK in seconds. This can be used to enforce rekeying of
+ # PTK to mitigate some attacks against TKIP deficiencies.
+-#wpa_ptk_rekey=600
+-
++wpa_ptk_rekey=0
+ # Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
+ # roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
+ # authentication and key handshake before actually associating with a new AP.
+@@ -1050,55 +875,6 @@ own_ip_addr=127.0.0.1
+ # 0 = disabled (default)
+ # 1 = enabled
+ #okc=1
+-
+-
+-##### IEEE 802.11r configuration ##############################################
+-
+-# Mobility Domain identifier (dot11FTMobilityDomainID, MDID)
+-# MDID is used to indicate a group of APs (within an ESS, i.e., sharing the
+-# same SSID) between which a STA can use Fast BSS Transition.
+-# 2-octet identifier as a hex string.
+-#mobility_domain=a1b2
+-
+-# PMK-R0 Key Holder identifier (dot11FTR0KeyHolderID)
+-# 1 to 48 octet identifier.
+-# This is configured with nas_identifier (see RADIUS client section above).
+-
+-# Default lifetime of the PMK-RO in minutes; range 1..65535
+-# (dot11FTR0KeyLifetime)
+-#r0_key_lifetime=10000
+-
+-# PMK-R1 Key Holder identifier (dot11FTR1KeyHolderID)
+-# 6-octet identifier as a hex string.
+-#r1_key_holder=000102030405
+-
+-# Reassociation deadline in time units (TUs / 1.024 ms; range 1000..65535)
+-# (dot11FTReassociationDeadline)
+-#reassociation_deadline=1000
+-
+-# List of R0KHs in the same Mobility Domain
+-# format: <MAC address> <NAS Identifier> <128-bit key as hex string>
+-# This list is used to map R0KH-ID (NAS Identifier) to a destination MAC
+-# address when requesting PMK-R1 key from the R0KH that the STA used during the
+-# Initial Mobility Domain Association.
+-#r0kh=02:01:02:03:04:05 r0kh-1.example.com 000102030405060708090a0b0c0d0e0f
+-#r0kh=02:01:02:03:04:06 r0kh-2.example.com 00112233445566778899aabbccddeeff
+-# And so on.. One line per R0KH.
+-
+-# List of R1KHs in the same Mobility Domain
+-# format: <MAC address> <R1KH-ID> <128-bit key as hex string>
+-# This list is used to map R1KH-ID to a destination MAC address when sending
+-# PMK-R1 key from the R0KH. This is also the list of authorized R1KHs in the MD
+-# that can request PMK-R1 keys.
+-#r1kh=02:01:02:03:04:05 02:11:22:33:44:55 000102030405060708090a0b0c0d0e0f
+-#r1kh=02:01:02:03:04:06 02:11:22:33:44:66 00112233445566778899aabbccddeeff
+-# And so on.. One line per R1KH.
+-
+-# Whether PMK-R1 push is enabled at R0KH
+-# 0 = do not push PMK-R1 to all configured R1KHs (default)
+-# 1 = push PMK-R1 to all configured R1KHs whenever a new PMK-R0 is derived
+-#pmk_r1_push=1
+-
+ ##### Neighbor table ##########################################################
+ # Maximum number of entries kept in AP table (either for neigbor table or for
+ # detecting Overlapping Legacy BSS Condition). The oldest entry will be
+@@ -1106,36 +882,29 @@ own_ip_addr=127.0.0.1
+ # limit. Note! WFA certification for IEEE 802.11g requires that OLBC is
+ # enabled, so this field should not be set to 0 when using IEEE 802.11g.
+ # default: 255
+-#ap_table_max_size=255
+-
++ap_table_max_size=255
+ # Number of seconds of no frames received after which entries may be deleted
+ # from the AP table. Since passive scanning is not usually performed frequently
+ # this should not be set to very small value. In addition, there is no
+ # guarantee that every scan cycle will receive beacon frames from the
+ # neighboring APs.
+ # default: 60
+-#ap_table_expiration_time=3600
+-
+-
++ap_table_expiration_time=60
+ ##### Wi-Fi Protected Setup (WPS) #############################################
+-
+ # WPS state
+ # 0 = WPS disabled (default)
+ # 1 = WPS enabled, not configured
+ # 2 = WPS enabled, configured
+-#wps_state=2
+-
++wps_state=2
+ # AP can be configured into a locked state where new WPS Registrar are not
+ # accepted, but previously authorized Registrars (including the internal one)
+ # can continue to add new Enrollees.
+-#ap_setup_locked=1
+-
++ap_setup_locked=1
+ # Universally Unique IDentifier (UUID; see RFC 4122) of the device
+ # This value is used as the UUID for the internal WPS Registrar. If the AP
+ # is also using UPnP, this value should be set to the device's UPnP UUID.
+ # If not configured, UUID will be generated based on the local MAC address.
+-#uuid=12345678-9abc-def0-1234-56789abcdef0
+-
++uuid=12345678-9abc-def0-1234-56789abcdef0
+ # Note: If wpa_psk_file is set, WPS is used to generate random, per-device PSKs
+ # that will be appended to the wpa_psk_file. If wpa_psk_file is not set, the
+ # default PSK (wpa_psk/wpa_passphrase) will be delivered to Enrollees. Use of
+@@ -1149,27 +918,21 @@ own_ip_addr=127.0.0.1
+ # pending PIN requests. If the following variable is set, the PIN requests will
+ # be written to the configured file.
+ #wps_pin_requests=/var/run/hostapd_wps_pin_requests
+-
+ # Device Name
+ # User-friendly description of device; up to 32 octets encoded in UTF-8
+-#device_name=Wireless AP
+-
++device_name=Sitara
+ # Manufacturer
+ # The manufacturer of the device (up to 64 ASCII characters)
+-#manufacturer=Company
+-
++manufacturer=TexasInstruments
+ # Model Name
+ # Model of the device (up to 32 ASCII characters)
+-#model_name=WAP
+-
++model_name=TI_Connectivity_module
+ # Model Number
+ # Additional device description (up to 32 ASCII characters)
+-#model_number=123
+-
++model_number=wl18xx
+ # Serial Number
+ # Serial number of the device (up to 32 characters)
+-#serial_number=12345
+-
++serial_number=12345
+ # Primary Device Type
+ # Used format: <categ>-<OUI>-<subcateg>
+ # categ = Category as an integer value
+@@ -1181,8 +944,7 @@ own_ip_addr=127.0.0.1
+ #   1-0050F204-2 (Computer / Server)
+ #   5-0050F204-1 (Storage / NAS)
+ #   6-0050F204-1 (Network Infrastructure / AP)
+-#device_type=6-0050F204-1
+-
++device_type=0-00000000-0
+ # OS Version
+ # 4-octet operating system version number (hex string)
+ #os_version=01020300
+@@ -1192,8 +954,7 @@ own_ip_addr=127.0.0.1
+ # Available methods: usba ethernet label display ext_nfc_token int_nfc_token
+ #	nfc_interface push_button keypad virtual_display physical_display
+ #	virtual_push_button physical_push_button
+-#config_methods=label virtual_display virtual_push_button keypad
+-
++config_methods=virtual_display virtual_push_button keypad
+ # WPS capability discovery workaround for PBC with Windows 7
+ # Windows 7 uses incorrect way of figuring out AP's WPS capabilities by acting
+ # as a Registrar and using M1 from the AP. The config methods attribute in that
+@@ -1228,312 +989,3 @@ own_ip_addr=127.0.0.1
+ # option points to an external file that much contain the WPS Credential
+ # attribute(s) as binary data.
+ #extra_cred=hostapd.cred
+-
+-# Credential processing
+-#   0 = process received credentials internally (default)
+-#   1 = do not process received credentials; just pass them over ctrl_iface to
+-#	external program(s)
+-#   2 = process received credentials internally and pass them over ctrl_iface
+-#	to external program(s)
+-# Note: With wps_cred_processing=1, skip_cred_build should be set to 1 and
+-# extra_cred be used to provide the Credential data for Enrollees.
+-#
+-# wps_cred_processing=1 will disabled automatic updates of hostapd.conf file
+-# both for Credential processing and for marking AP Setup Locked based on
+-# validation failures of AP PIN. An external program is responsible on updating
+-# the configuration appropriately in this case.
+-#wps_cred_processing=0
+-
+-# AP Settings Attributes for M7
+-# By default, hostapd generates the AP Settings Attributes for M7 based on the
+-# current configuration. It is possible to override this by providing a file
+-# with pre-configured attributes. This is similar to extra_cred file format,
+-# but the AP Settings attributes are not encapsulated in a Credential
+-# attribute.
+-#ap_settings=hostapd.ap_settings
+-
+-# WPS UPnP interface
+-# If set, support for external Registrars is enabled.
+-#upnp_iface=br0
+-
+-# Friendly Name (required for UPnP)
+-# Short description for end use. Should be less than 64 characters.
+-#friendly_name=WPS Access Point
+-
+-# Manufacturer URL (optional for UPnP)
+-#manufacturer_url=http://www.example.com/
+-
+-# Model Description (recommended for UPnP)
+-# Long description for end user. Should be less than 128 characters.
+-#model_description=Wireless Access Point
+-
+-# Model URL (optional for UPnP)
+-#model_url=http://www.example.com/model/
+-
+-# Universal Product Code (optional for UPnP)
+-# 12-digit, all-numeric code that identifies the consumer package.
+-#upc=123456789012
+-
+-# WPS RF Bands (a = 5G, b = 2.4G, g = 2.4G, ag = dual band)
+-# This value should be set according to RF band(s) supported by the AP if
+-# hw_mode is not set. For dual band dual concurrent devices, this needs to be
+-# set to ag to allow both RF bands to be advertized.
+-#wps_rf_bands=ag
+-
+-# NFC password token for WPS
+-# These parameters can be used to configure a fixed NFC password token for the
+-# AP. This can be generated, e.g., with nfc_pw_token from wpa_supplicant. When
+-# these parameters are used, the AP is assumed to be deployed with a NFC tag
+-# that includes the matching NFC password token (e.g., written based on the
+-# NDEF record from nfc_pw_token).
+-#
+-#wps_nfc_dev_pw_id: Device Password ID (16..65535)
+-#wps_nfc_dh_pubkey: Hexdump of DH Public Key
+-#wps_nfc_dh_privkey: Hexdump of DH Private Key
+-#wps_nfc_dev_pw: Hexdump of Device Password
+-
+-##### Wi-Fi Direct (P2P) ######################################################
+-
+-# Enable P2P Device management
+-#manage_p2p=1
+-
+-# Allow cross connection
+-#allow_cross_connection=1
+-
+-#### TDLS (IEEE 802.11z-2010) #################################################
+-
+-# Prohibit use of TDLS in this BSS
+-#tdls_prohibit=1
+-
+-# Prohibit use of TDLS Channel Switching in this BSS
+-#tdls_prohibit_chan_switch=1
+-
+-##### IEEE 802.11v-2011 #######################################################
+-
+-# Time advertisement
+-# 0 = disabled (default)
+-# 2 = UTC time at which the TSF timer is 0
+-#time_advertisement=2
+-
+-# Local time zone as specified in 8.3 of IEEE Std 1003.1-2004:
+-# stdoffset[dst[offset][,start[/time],end[/time]]]
+-#time_zone=EST5
+-
+-##### IEEE 802.11u-2011 #######################################################
+-
+-# Enable Interworking service
+-#interworking=1
+-
+-# Access Network Type
+-# 0 = Private network
+-# 1 = Private network with guest access
+-# 2 = Chargeable public network
+-# 3 = Free public network
+-# 4 = Personal device network
+-# 5 = Emergency services only network
+-# 14 = Test or experimental
+-# 15 = Wildcard
+-#access_network_type=0
+-
+-# Whether the network provides connectivity to the Internet
+-# 0 = Unspecified
+-# 1 = Network provides connectivity to the Internet
+-#internet=1
+-
+-# Additional Step Required for Access
+-# Note: This is only used with open network, i.e., ASRA shall ne set to 0 if
+-# RSN is used.
+-#asra=0
+-
+-# Emergency services reachable
+-#esr=0
+-
+-# Unauthenticated emergency service accessible
+-#uesa=0
+-
+-# Venue Info (optional)
+-# The available values are defined in IEEE Std 802.11u-2011, 7.3.1.34.
+-# Example values (group,type):
+-# 0,0 = Unspecified
+-# 1,7 = Convention Center
+-# 1,13 = Coffee Shop
+-# 2,0 = Unspecified Business
+-# 7,1  Private Residence
+-#venue_group=7
+-#venue_type=1
+-
+-# Homogeneous ESS identifier (optional; dot11HESSID)
+-# If set, this shall be identifical to one of the BSSIDs in the homogeneous
+-# ESS and this shall be set to the same value across all BSSs in homogeneous
+-# ESS.
+-#hessid=02:03:04:05:06:07
+-
+-# Roaming Consortium List
+-# Arbitrary number of Roaming Consortium OIs can be configured with each line
+-# adding a new OI to the list. The first three entries are available through
+-# Beacon and Probe Response frames. Any additional entry will be available only
+-# through ANQP queries. Each OI is between 3 and 15 octets and is configured as
+-# a hexstring.
+-#roaming_consortium=021122
+-#roaming_consortium=2233445566
+-
+-# Venue Name information
+-# This parameter can be used to configure one or more Venue Name Duples for
+-# Venue Name ANQP information. Each entry has a two or three character language
+-# code (ISO-639) separated by colon from the venue name string.
+-# Note that venue_group and venue_type have to be set for Venue Name
+-# information to be complete.
+-#venue_name=eng:Example venue
+-#venue_name=fin:Esimerkkipaikka
+-
+-# Network Authentication Type
+-# This parameter indicates what type of network authentication is used in the
+-# network.
+-# format: <network auth type indicator (1-octet hex str)> [redirect URL]
+-# Network Authentication Type Indicator values:
+-# 00 = Acceptance of terms and conditions
+-# 01 = On-line enrollment supported
+-# 02 = http/https redirection
+-# 03 = DNS redirection
+-#network_auth_type=00
+-#network_auth_type=02http://www.example.com/redirect/me/here/
+-
+-# IP Address Type Availability
+-# format: <1-octet encoded value as hex str>
+-# (ipv4_type & 0x3f) << 2 | (ipv6_type & 0x3)
+-# ipv4_type:
+-# 0 = Address type not available
+-# 1 = Public IPv4 address available
+-# 2 = Port-restricted IPv4 address available
+-# 3 = Single NATed private IPv4 address available
+-# 4 = Double NATed private IPv4 address available
+-# 5 = Port-restricted IPv4 address and single NATed IPv4 address available
+-# 6 = Port-restricted IPv4 address and double NATed IPv4 address available
+-# 7 = Availability of the address type is not known
+-# ipv6_type:
+-# 0 = Address type not available
+-# 1 = Address type available
+-# 2 = Availability of the address type not known
+-#ipaddr_type_availability=14
+-
+-# Domain Name
+-# format: <variable-octet str>[,<variable-octet str>]
+-#domain_name=example.com,another.example.com,yet-another.example.com
+-
+-# 3GPP Cellular Network information
+-# format: <MCC1,MNC1>[;<MCC2,MNC2>][;...]
+-#anqp_3gpp_cell_net=244,91;310,026;234,56
+-
+-# NAI Realm information
+-# One or more realm can be advertised. Each nai_realm line adds a new realm to
+-# the set. These parameters provide information for stations using Interworking
+-# network selection to allow automatic connection to a network based on
+-# credentials.
+-# format: <encoding>,<NAI Realm(s)>[,<EAP Method 1>][,<EAP Method 2>][,...]
+-# encoding:
+-#	0 = Realm formatted in accordance with IETF RFC 4282
+-#	1 = UTF-8 formatted character string that is not formatted in
+-#	    accordance with IETF RFC 4282
+-# NAI Realm(s): Semi-colon delimited NAI Realm(s)
+-# EAP Method: <EAP Method>[:<[AuthParam1:Val1]>][<[AuthParam2:Val2]>][...]
+-# AuthParam (Table 8-188 in IEEE Std 802.11-2012):
+-# ID 2 = Non-EAP Inner Authentication Type
+-#	1 = PAP, 2 = CHAP, 3 = MSCHAP, 4 = MSCHAPV2
+-# ID 3 = Inner authentication EAP Method Type
+-# ID 5 = Credential Type
+-#	1 = SIM, 2 = USIM, 3 = NFC Secure Element, 4 = Hardware Token,
+-#	5 = Softoken, 6 = Certificate, 7 = username/password, 9 = Anonymous,
+-#	10 = Vendor Specific
+-#nai_realm=0,example.com;example.net
+-# EAP methods EAP-TLS with certificate and EAP-TTLS/MSCHAPv2 with
+-# username/password
+-#nai_realm=0,example.org,13[5:6],21[2:4][5:7]
+-
+-##### Hotspot 2.0 #############################################################
+-
+-# Enable Hotspot 2.0 support
+-#hs20=1
+-
+-# Disable Downstream Group-Addressed Forwarding (DGAF)
+-# This can be used to configure a network where no group-addressed frames are
+-# allowed. The AP will not forward any group-address frames to the stations and
+-# random GTKs are issued for each station to prevent associated stations from
+-# forging such frames to other stations in the BSS.
+-#disable_dgaf=1
+-
+-# Operator Friendly Name
+-# This parameter can be used to configure one or more Operator Friendly Name
+-# Duples. Each entry has a two or three character language code (ISO-639)
+-# separated by colon from the operator friendly name string.
+-#hs20_oper_friendly_name=eng:Example operator
+-#hs20_oper_friendly_name=fin:Esimerkkioperaattori
+-
+-# Connection Capability
+-# This can be used to advertise what type of IP traffic can be sent through the
+-# hotspot (e.g., due to firewall allowing/blocking protocols/ports).
+-# format: <IP Protocol>:<Port Number>:<Status>
+-# IP Protocol: 1 = ICMP, 6 = TCP, 17 = UDP
+-# Port Number: 0..65535
+-# Status: 0 = Closed, 1 = Open, 2 = Unknown
+-# Each hs20_conn_capab line is added to the list of advertised tuples.
+-#hs20_conn_capab=1:0:2
+-#hs20_conn_capab=6:22:1
+-#hs20_conn_capab=17:5060:0
+-
+-# WAN Metrics
+-# format: <WAN Info>:<DL Speed>:<UL Speed>:<DL Load>:<UL Load>:<LMD>
+-# WAN Info: B0-B1: Link Status, B2: Symmetric Link, B3: At Capabity
+-#    (encoded as two hex digits)
+-#    Link Status: 1 = Link up, 2 = Link down, 3 = Link in test state
+-# Downlink Speed: Estimate of WAN backhaul link current downlink speed in kbps;
+-#	1..4294967295; 0 = unknown
+-# Uplink Speed: Estimate of WAN backhaul link current uplink speed in kbps
+-#	1..4294967295; 0 = unknown
+-# Downlink Load: Current load of downlink WAN connection (scaled to 255 = 100%)
+-# Uplink Load: Current load of uplink WAN connection (scaled to 255 = 100%)
+-# Load Measurement Duration: Duration for measuring downlink/uplink load in
+-# tenths of a second (1..65535); 0 if load cannot be determined
+-#hs20_wan_metrics=01:8000:1000:80:240:3000
+-
+-# Operating Class Indication
+-# List of operating classes the BSSes in this ESS use. The Global operating
+-# classes in Table E-4 of IEEE Std 802.11-2012 Annex E define the values that
+-# can be used in this.
+-# format: hexdump of operating class octets
+-# for example, operating classes 81 (2.4 GHz channels 1-13) and 115 (5 GHz
+-# channels 36-48):
+-#hs20_operating_class=5173
+-
+-##### Multiple BSSID support ##################################################
+-#
+-# Above configuration is using the default interface (wlan#, or multi-SSID VLAN
+-# interfaces). Other BSSIDs can be added by using separator 'bss' with
+-# default interface name to be allocated for the data packets of the new BSS.
+-#
+-# hostapd will generate BSSID mask based on the BSSIDs that are
+-# configured. hostapd will verify that dev_addr & MASK == dev_addr. If this is
+-# not the case, the MAC address of the radio must be changed before starting
+-# hostapd (ifconfig wlan0 hw ether <MAC addr>). If a BSSID is configured for
+-# every secondary BSS, this limitation is not applied at hostapd and other
+-# masks may be used if the driver supports them (e.g., swap the locally
+-# administered bit)
+-#
+-# BSSIDs are assigned in order to each BSS, unless an explicit BSSID is
+-# specified using the 'bssid' parameter.
+-# If an explicit BSSID is specified, it must be chosen such that it:
+-# - results in a valid MASK that covers it and the dev_addr
+-# - is not the same as the MAC address of the radio
+-# - is not the same as any other explicitly specified BSSID
+-#
+-# Please note that hostapd uses some of the values configured for the first BSS
+-# as the defaults for the following BSSes. However, it is recommended that all
+-# BSSes include explicit configuration of all relevant configuration items.
+-#
+-#bss=wlan0_0
+-#ssid=test2
+-# most of the above items can be used here (apart from radio interface specific
+-# items, like channel)
+-
+-#bss=wlan0_1
+-#bssid=00:13:10:95:fe:0b
+-# ...
 -- 
 1.7.9.5
 
diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx_r8.a8.08.bb
similarity index 84%
rename from meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx_r8.a6.01.bb
rename to meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx_r8.a8.08.bb
index e232b32..861c97b 100644
--- a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx_r8.a6.01.bb
+++ b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx_r8.a8.08.bb
@@ -6,7 +6,7 @@ require hostap.inc
 LICENSE = "GPLv2"
 LIC_FILES_CHKSUM = "file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e"
 
-PR_append = "b+gitr${SRCPV}"
+PR_append = "a+gitr${SRCPV}"
 
 FILESEXTRAPATHS_append := "${THISDIR}/hostap-daemon:"
 
@@ -14,8 +14,8 @@ FILESEXTRAPATHS_append := "${THISDIR}/hostap-daemon:"
 # of hostap
 PV = "2.0-devel-ti"
 
-# Tag: ol_r8.a6.01
-SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
+# Tag: ol_r8.a8.08
+SRCREV = "257ab333aad993b4be81808524bc0d939c276058"
 
 PROVIDES += "hostap-daemon"
 RPROVIDES_${PN} += "hostap-daemon"
diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon/defconfig b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon/defconfig
index 6a654c9..ccc0996 100644
--- a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon/defconfig
+++ b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon/defconfig
@@ -10,7 +10,7 @@
 # to override previous values of the variables.
 
 # Driver interface for Host AP driver
-CONFIG_DRIVER_HOSTAP=y
+#CONFIG_DRIVER_HOSTAP=y
 
 # Driver interface for wired authenticator
 #CONFIG_DRIVER_WIRED=y
@@ -21,13 +21,13 @@ CONFIG_DRIVER_HOSTAP=y
 
 # Driver interface for drivers using the nl80211 kernel interface
 CONFIG_DRIVER_NL80211=y
-CONFIG_LIBNL20=y
 # driver_nl80211.c requires a rather new libnl (version 1.1) which may not be
 # shipped with your distribution yet. If that is the case, you need to build
 # newer libnl version and point the hostapd build to use it.
 #LIBNL=/usr/src/libnl
 #CFLAGS += -I$(LIBNL)/include
 #LIBS += -L$(LIBNL)/lib
+CONFIG_LIBNL32=y
 
 # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
 #CONFIG_DRIVER_BSD=y
@@ -40,13 +40,13 @@ CONFIG_LIBNL20=y
 #CONFIG_DRIVER_NONE=y
 
 # IEEE 802.11F/IAPP
-CONFIG_IAPP=y
+#CONFIG_IAPP=y
 
 # WPA2/IEEE 802.11i RSN pre-authentication
-CONFIG_RSN_PREAUTH=y
+#CONFIG_RSN_PREAUTH=y
 
 # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
-CONFIG_PEERKEY=y
+#CONFIG_PEERKEY=y
 
 # IEEE 802.11w (management frame protection)
 # This version is an experimental implementation based on IEEE 802.11w/D1.0
@@ -55,25 +55,25 @@ CONFIG_PEERKEY=y
 #CONFIG_IEEE80211W=y
 
 # Integrated EAP server
-CONFIG_EAP=y
+#CONFIG_EAP=y
 
 # EAP-MD5 for the integrated EAP server
-CONFIG_EAP_MD5=y
+#CONFIG_EAP_MD5=y
 
 # EAP-TLS for the integrated EAP server
-CONFIG_EAP_TLS=y
+#CONFIG_EAP_TLS=y
 
 # EAP-MSCHAPv2 for the integrated EAP server
-CONFIG_EAP_MSCHAPV2=y
+#CONFIG_EAP_MSCHAPV2=y
 
 # EAP-PEAP for the integrated EAP server
-CONFIG_EAP_PEAP=y
+#CONFIG_EAP_PEAP=y
 
 # EAP-GTC for the integrated EAP server
-CONFIG_EAP_GTC=y
+#CONFIG_EAP_GTC=y
 
 # EAP-TTLS for the integrated EAP server
-CONFIG_EAP_TTLS=y
+#CONFIG_EAP_TTLS=y
 
 # EAP-SIM for the integrated EAP server
 #CONFIG_EAP_SIM=y
@@ -111,7 +111,7 @@ CONFIG_WPS=y
 # Enable WSC 2.0 support
 CONFIG_WPS2=y
 # Enable UPnP support for external WPS Registrars
-CONFIG_WPS_UPNP=y
+#CONFIG_WPS_UPNP=y
 
 # EAP-IKEv2
 #CONFIG_EAP_IKEV2=y
@@ -145,11 +145,14 @@ CONFIG_IEEE80211N=y
 # code is not needed.
 #CONFIG_NO_STDOUT_DEBUG=y
 
+# Add support for writing debug log to Android logcat instead of standard output
+CONFIG_ANDROID_LOG=y
+
 # Remove support for RADIUS accounting
 #CONFIG_NO_ACCOUNTING=y
 
 # Remove support for RADIUS
-#CONFIG_NO_RADIUS=y
+CONFIG_NO_RADIUS=y
 
 # Remove support for VLANs
 #CONFIG_NO_VLAN=y
@@ -159,6 +162,12 @@ CONFIG_IEEE80211N=y
 # option.
 #CONFIG_NO_DUMP_STATE=y
 
+# Select wrapper for operatins system and C library specific functions
+# unix = UNIX/POSIX like systems (default)
+# win32 = Windows systems
+# none = Empty template
+CONFIG_OS=unix
+
 # Enable tracing code for developer debugging
 # This tracks use of memory allocations and other registrations and reports
 # incorrect use with a backtrace of call (or allocation) location.
@@ -176,7 +185,6 @@ CONFIG_IEEE80211N=y
 #LIBS += -lbfd -liberty -lz
 #LIBS_p += -lbfd -liberty -lz
 #LIBS_c += -lbfd -liberty -lz
-#
-#
 
-CONFIG_NO_RANDOM_POOL=y
+# Enable AP
+CONFIG_AP=y
diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap.inc b/meta-arago-extras/recipes-connectivity/hostap/hostap.inc
index 8f6488b..9be2585 100644
--- a/meta-arago-extras/recipes-connectivity/hostap/hostap.inc
+++ b/meta-arago-extras/recipes-connectivity/hostap/hostap.inc
@@ -11,7 +11,7 @@ DEPENDS = "libnl openssl"
 # default
 DEFAULT_PREFERENCE = "-1"
 
-PR = "r4"
+PR = "r5"
 
 inherit update-rc.d
 INITSCRIPT_NAME="hostapd"
@@ -28,6 +28,7 @@ S = "${WORKDIR}/git/hostapd"
 do_configure() {
 	install -m 0644 ${WORKDIR}/defconfig ${S}/.config
 	echo "CFLAGS += -I${STAGING_INCDIR}" >> .config
+        echo "CFLAGS += -I${STAGING_INCDIR}/libnl3/" >> .config
 	echo "LIBS += -L${STAGING_LIBDIR}" >> .config
 }
 
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 3/8] wlconf : Update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
  2013-12-08  8:18 ` [PATCH 2/8] hostap-daemon-wl18xx: " Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-08  8:18 ` [PATCH 4/8] ti-wifi-utils-wl18xx: " Yaniv Mahani
                   ` (6 subsequent siblings)
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- Added missing default configuration file.

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 .../{wlconf_r8.a6.01.bb => wlconf_r8.a8.08.bb}     |    7 ++++---
 1 files changed, 4 insertions(+), 3 deletions(-)
 rename meta-arago-extras/recipes-connectivity/wlconf/{wlconf_r8.a6.01.bb => wlconf_r8.a8.08.bb} (88%)

diff --git a/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a8.08.bb
similarity index 88%
rename from meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a6.01.bb
rename to meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a8.08.bb
index 8076350..f4adc18 100644
--- a/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a6.01.bb
+++ b/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a8.08.bb
@@ -2,11 +2,11 @@ DESCRIPTION = "Configuration utility for TI wireless drivers"
 LICENSE = "GPLv2"
 LIC_FILES_CHKSUM = "file://README;beginline=1;endline=21;md5=adc05a1903d3f107f85c90328e3a9438"
 
-PR ="r2"
+PR ="r0"
 PR_append = "+gitr${SRCPV}"
 
-# Tag: ol_r8.a6.01
-SRCREV = "214dfbdf97cc390b0020c4ea9331a1cf82240a64"
+# Tag: ol_r8.a8.08
+SRCREV = "c976584589981c9ab8741d1819a5019e17cac13b"
 SRC_URI = "git://github.com/TI-OpenLink/18xx-ti-utils.git"
 
 S = "${WORKDIR}/git/wlconf"
@@ -21,6 +21,7 @@ do_install() {
 	install -m 0755 wlconf ${D}${bindir}/wlconf/
 	install -m 0755 dictionary.txt ${D}${bindir}/wlconf/
 	install -m 0755 struct.bin ${D}${bindir}/wlconf/
+	install -m 0755 default.conf ${D}${bindir}/wlconf/
 	install -m 0755 wl18xx-conf-default.bin ${D}${bindir}/wlconf/
 	install -m 0755 README ${D}${bindir}/wlconf/
 	install -m 0755 example.conf ${D}${bindir}/wlconf/
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 4/8] ti-wifi-utils-wl18xx: Update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
  2013-12-08  8:18 ` [PATCH 2/8] hostap-daemon-wl18xx: " Yaniv Mahani
  2013-12-08  8:18 ` [PATCH 3/8] wlconf : " Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-08  8:18 ` [PATCH 5/8] wl18xx-firmware: update " Yaniv Mahani
                   ` (5 subsequent siblings)
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- Updated firmware name.
- Added required makefile parameter to support libnl3 compilation.

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 ...8.a6.01.bb => ti-wifi-utils-wl18xx_r8.a8.08.bb} |   13 ++++++++-----
 1 files changed, 8 insertions(+), 5 deletions(-)
 rename meta-arago-extras/recipes-devtools/ti-wifi-utils/{ti-wifi-utils-wl18xx_r8.a6.01.bb => ti-wifi-utils-wl18xx_r8.a8.08.bb} (68%)

diff --git a/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl18xx_r8.a8.08.bb
similarity index 68%
rename from meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl18xx_r8.a6.01.bb
rename to meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl18xx_r8.a8.08.bb
index eab94fa..601b203 100644
--- a/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl18xx_r8.a6.01.bb
+++ b/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl18xx_r8.a8.08.bb
@@ -3,12 +3,12 @@ LICENSE = "BSD"
 LIC_FILES_CHKSUM = "file://COPYING;md5=4725015cb0be7be389cf06deeae3683d"
 
 DEPENDS = "libnl"
-RDEPENDS_${PN} = "ti-compat-wireless-wl12xx wl12xx-firmware"
+RDEPENDS_${PN} = "wl18xx-firmware"
 
-PR ="r3+gitr${SRCPV}"
+PR ="r0+gitr${SRCPV}"
 
-# Tag: ol_r8.a6.01
-SRCREV = "214dfbdf97cc390b0020c4ea9331a1cf82240a64"
+#Tag: ol_r8.a8.08
+SRCREV = "9627cb09b9de32b8ffcc32d3ce3e275b7c56d8e4"
 SRC_URI = "git://github.com/TI-OpenLink/18xx-ti-utils.git \
 "
 
@@ -20,7 +20,10 @@ RCONFLICTS_${PN} +=  "ti-wifi-utils"
 S = "${WORKDIR}/git"
 
 export CROSS_COMPILE = "${TARGET_PREFIX}"
-CFLAGS += " -DCONFIG_LIBNL20"
+
+EXTRA_OEMAKE = 'CFLAGS="${CFLAGS} -I${STAGING_INCDIR}/libnl3/ -DCONFIG_LIBNL32 " \
+		LDFLAGS="${LDFLAGS} -L${STAGING_LIBDIR}" \
+		NLVER=3'
 
 do_install() {
     install -d ${D}${bindir}
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 5/8] wl18xx-firmware: update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
                   ` (2 preceding siblings ...)
  2013-12-08  8:18 ` [PATCH 4/8] ti-wifi-utils-wl18xx: " Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-08  8:18 ` [PATCH 6/8] arago-prefs: update default value for am335x and am43x for WILINK-8 Yaniv Mahani
                   ` (4 subsequent siblings)
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 ...are_r8.a6.01.bb => wl18xx-firmware_r8.a8.08.bb} |    8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)
 rename meta-arago-extras/recipes-bsp/wl18xx-firmware/{wl18xx-firmware_r8.a6.01.bb => wl18xx-firmware_r8.a8.08.bb} (76%)

diff --git a/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a6.01.bb b/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a8.08.bb
similarity index 76%
rename from meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a6.01.bb
rename to meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a8.08.bb
index 4b3f22a..759bf47 100644
--- a/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a6.01.bb
+++ b/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a8.08.bb
@@ -1,18 +1,18 @@
 DESCRIPTION = "Firmware files for use with TI wl18xx"
 LICENSE = "TI-TSPA"
-LIC_FILES_CHKSUM = "file://LICENCE;md5=b28122fd6678e89fd3a8d4bc80922969"
+LIC_FILES_CHKSUM = "file://LICENCE;md5=4977a0fe767ee17765ae63c435a32a9e"
 
 PACKAGE_ARCH = "all"
 
-PR = "r2+gitr${SRCPV}"
+PR = "r0+gitr${SRCPV}"
 
 PROVIDES += "wl12xx-firmware"
 RPROVIDES_${PN} += "wl12xx-firmware"
 RREPLACES_${PN} += "wl12xx-firmware"
 RCONFLICTS_${PN} += "wl12xx-firmware"
 
-# Tag: ol_r8.a6.01
-SRCREV = "1c0f45f0e8aec0823175f7ac977908888c424aa1"
+# Tag: ol_r8.a8.08
+SRCREV = "8e7f455e726f2bf92c568286a5cca510d7718dc1"
 SRC_URI = "git://github.com/TI-OpenLink/wl18xx_fw.git;protocol=git \
            file://Makefile \
           "
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 6/8] arago-prefs: update default value for am335x and am43x for WILINK-8
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
                   ` (3 preceding siblings ...)
  2013-12-08  8:18 ` [PATCH 5/8] wl18xx-firmware: update " Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-08  8:18 ` [PATCH 7/8] arago-tisdk-connectivity: Restored connectivity modules compilation Yaniv Mahani
                   ` (3 subsequent siblings)
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- Also change the default supported WILINK version

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 .../conf/distro/include/arago-prefs.inc            |    5 ++++-
 1 files changed, 4 insertions(+), 1 deletions(-)

diff --git a/meta-arago-distro/conf/distro/include/arago-prefs.inc b/meta-arago-distro/conf/distro/include/arago-prefs.inc
index 7d9afe7..412fa3a 100644
--- a/meta-arago-distro/conf/distro/include/arago-prefs.inc
+++ b/meta-arago-distro/conf/distro/include/arago-prefs.inc
@@ -99,7 +99,10 @@ PREFERRED_VERSION_bluez-hcidump = "2.2"
 PREFERRED_VERSION_bash = "3.2.48"
 PREFERRED_VERSION_gettext = "0.16.1"
 
-WILINK_VERSION = "WILINK-6"
+WILINK_VERSION = "WILINK-8"
+# For AM335x & AM43x Wilink 8 is now the default version to be used
+WILINK_VERSION_ti33x = "WILINK-8"
+WILINK_VERSION_ti43x = "WILINK-8"
 PREFERRED_PROVIDER_wl12xx-firmware = "${@base_contains('WILINK_VERSION','WILINK-8','wl18xx-firmware','wl12xx-firmware',d)}"
 PREFERRED_PROVIDER_ti-compat-wireless-wl12xx = "${@base_contains('WILINK_VERSION','WILINK-8','ti-compat-wireless-wl18xx','ti-compat-wireless-wl12xx',d)}"
 PREFERRED_PROVIDER_hostap-daemon = "${@base_contains('WILINK_VERSION','WILINK-8','hostap-daemon-wl18xx','hostap-daemon',d)}"
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 7/8] arago-tisdk-connectivity: Restored connectivity modules compilation
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
                   ` (4 preceding siblings ...)
  2013-12-08  8:18 ` [PATCH 6/8] arago-prefs: update default value for am335x and am43x for WILINK-8 Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-08  8:18 ` [PATCH 8/8] crda: Removed redundant recipe Yaniv Mahani
                   ` (2 subsequent siblings)
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- Modules compatibility issues with libnl were fixed.
- Removed unused components

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 .../packagegroup-arago-tisdk-connectivity.bb       |   17 ++++++-----------
 1 files changed, 6 insertions(+), 11 deletions(-)

diff --git a/meta-arago-distro/recipes-core/packagegroups/packagegroup-arago-tisdk-connectivity.bb b/meta-arago-distro/recipes-core/packagegroups/packagegroup-arago-tisdk-connectivity.bb
index 0aa019d..d7d2ef2 100644
--- a/meta-arago-distro/recipes-core/packagegroups/packagegroup-arago-tisdk-connectivity.bb
+++ b/meta-arago-distro/recipes-core/packagegroups/packagegroup-arago-tisdk-connectivity.bb
@@ -1,6 +1,6 @@
 DESCRIPTION = "Task to install wlan and bluetooth packages into the target FS"
 LICENSE = "MIT"
-PR = "r17"
+PR = "r18"
 
 inherit packagegroup
 
@@ -23,16 +23,12 @@ WLAN_COMMON = "\
     pulseaudio-module-bluetooth-device \
     eventdump \
     ${@base_contains('WILINK_VERSION','WILINK-8','wlconf','',d)} \
+    wpa-supplicant \
+    crda \
+    hostap-daemon \
+    ti-wifi-utils \
 "
-
-# TI/ECS versions of wpa-supplicant/crda/hostap/wifi-utils require older libnl,
-# which no longer exists
-#    wpa-supplicant
-#    crda
-#    hostap-daemon
-#    ti-wifi-utils
 # No bluetooth/bluetooth.h
-#    oppserver
 
 # netperf has non-standard license, needs verifying
 #    netperf
@@ -42,8 +38,7 @@ WLAN_COMMON = "\
 #    ti-compat-bluetooth
 
 FIRMWARE_AND_DRIVERS = "\
-    bt-firmware \
-    bt-enable \
+    "${@base_contains('WILINK_VERSION','WILINK-6',' oppserver bt-firmware bt-enable' , '',d)}"\
     wl12xx-firmware \
 "
 
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* [PATCH 8/8] crda: Removed redundant recipe.
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
                   ` (5 preceding siblings ...)
  2013-12-08  8:18 ` [PATCH 7/8] arago-tisdk-connectivity: Restored connectivity modules compilation Yaniv Mahani
@ 2013-12-08  8:18 ` Yaniv Mahani
  2014-01-14 13:28   ` Cooper Jr., Franklin
  2013-12-09  5:46 ` [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Denys Dmytriyenko
  2014-01-14 13:28 ` Cooper Jr., Franklin
  8 siblings, 1 reply; 18+ messages in thread
From: Yaniv Mahani @ 2013-12-08  8:18 UTC (permalink / raw)
  To: meta-arago

From: Yaniv Machani <yanivma@ti.com>

- crda 1.1.3 from meta-openembedded can be used.

Signed-off-by: Yaniv Machani <yanivma@ti.com>
---
 .../conf/distro/include/arago-prefs.inc            |    2 +-
 .../recipes-connectivity/crda/crda_1.1.1.bb        |   37 --------------------
 2 files changed, 1 insertions(+), 38 deletions(-)
 delete mode 100644 meta-arago-extras/recipes-connectivity/crda/crda_1.1.1.bb

diff --git a/meta-arago-distro/conf/distro/include/arago-prefs.inc b/meta-arago-distro/conf/distro/include/arago-prefs.inc
index 412fa3a..a19e425 100644
--- a/meta-arago-distro/conf/distro/include/arago-prefs.inc
+++ b/meta-arago-distro/conf/distro/include/arago-prefs.inc
@@ -92,7 +92,7 @@ PREFERRED_VERSION_readline-native = "5.2"
 PREFERRED_VERSION_readline-nativesdk = "5.2"
 
 PREFERRED_VERSION_libnl = "3.2.21"
-PREFERRED_VERSION_crda = "1.1.1"
+PREFERRED_VERSION_crda = "1.1.3"
 PREFERRED_VERSION_obex = "0.34"
 PREFERRED_VERSION_bluez4 = "4.101"
 PREFERRED_VERSION_bluez-hcidump = "2.2"
diff --git a/meta-arago-extras/recipes-connectivity/crda/crda_1.1.1.bb b/meta-arago-extras/recipes-connectivity/crda/crda_1.1.1.bb
deleted file mode 100644
index e3880a1..0000000
--- a/meta-arago-extras/recipes-connectivity/crda/crda_1.1.1.bb
+++ /dev/null
@@ -1,37 +0,0 @@
-DESCRIPTION = "Wireless Central Regulatory Domain Agent"
-HOMEPAGE = "http://wireless.kernel.org/en/developers/Regulatory/CRDA"
-SECTION = "base"
-LICENSE = "ISC"
-LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c"
-
-PR = "r0"
-
-DEPENDS = "libgcrypt libnl python-native python-m2crypto-native"
-RDEPENDS_${PN} = "udev"
-
-SRC_URI = "http://wireless.kernel.org/download/crda/${P}.tar.bz2;name=crda \
-           http://wireless.kernel.org/download/wireless-regdb/regulatory.bins/2011.04.28-regulatory.bin;name=reg \
-"
-
-CFLAGS += " -DCONFIG_LIBNL20"
-
-EXTRA_OEMAKE = "MAKEFLAGS="
-do_compile() {
-    oe_runmake all_noverify
-}
-
-do_install() {
-    oe_runmake DESTDIR=${D} install
-    install -d ${D}/usr/lib/crda/
-    install -m 0644 ${WORKDIR}/2011.04.28-regulatory.bin ${D}/usr/lib/crda/regulatory.bin
-}
-
-SRC_URI[crda.md5sum] = "5fc77af68b3e21736b8ef2f8b061c810"
-SRC_URI[crda.sha256sum] = "59b4760da44a8f803caeaaa7fb97e0c6bd3f35f40445b28258e7f14c2fbe13b5"
-SRC_URI[reg.md5sum] = "1535e98bcaba732e2f8e8f62dac6f369"
-SRC_URI[reg.sha256sum] = "bb6ba6f5dcdf7106a19c588b0e4d43ab7af26f6474fe01011a318b3dceaba33b"
-
-FILES_${PN} += "\
-    /lib/udev/rules.d/85-regulatory.rules \
-    /usr/lib/crda/regulatory.bin \
-"
-- 
1.7.9



^ permalink raw reply related	[flat|nested] 18+ messages in thread

* Re: [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
                   ` (6 preceding siblings ...)
  2013-12-08  8:18 ` [PATCH 8/8] crda: Removed redundant recipe Yaniv Mahani
@ 2013-12-09  5:46 ` Denys Dmytriyenko
  2013-12-14  9:40   ` Denys Dmytriyenko
  2014-01-14 13:28 ` Cooper Jr., Franklin
  8 siblings, 1 reply; 18+ messages in thread
From: Denys Dmytriyenko @ 2013-12-09  5:46 UTC (permalink / raw)
  To: Yaniv Mahani; +Cc: meta-arago

Thanks, Yaniv. Please give me a day or so to review your patches. Thanks 
again for submission!

-- 
Denys

On Sun, Dec 08, 2013 at 10:18:09AM +0200, Yaniv Mahani wrote:
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Build wpa-supplicant from TI_Openlink ol_r8.a8.08
> - Add missing includes for building with libnl3.
> - Adjusted configuration files, and added p2p conf.
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
> This set of patches should allow integration of WiLink-8 into meta-arago.
> It should replace the set of 14 patches previously submitted for review.
> 
> 
> Note :
> Wilink-6 is currently not supported with the latest meta-arago builds.
> ECS have decided not to support Wilink-6 in the core SDK also in the future.
> Therefore any Wilink-6 broken recipes should not be a concern, as we will clean them up on a different set of patches.
> 
> wifi-direct-demo, battleship, wpa-gui-e applications will shortly be removed as well.
> 
> Yaniv
> 
>  .../wpa-supplicant/wpa-supplicant-wl18xx/defconfig |  164 ++++--
>  ....a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} |    6 +-
>  .../wpa-supplicant/wpa-supplicant.inc              |    3 +
>  .../wpa-supplicant/p2p_supplicant.conf             |   14 +
>  .../wpa-supplicant/wpa_supplicant.conf             |  674 +-------------------
>  5 files changed, 164 insertions(+), 697 deletions(-)
>  rename meta-arago-extras/recipes-connectivity/wpa-supplicant/{wpa-supplicant-wl18xx_r8.a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} (88%)
>  create mode 100755 meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> 
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
> index b982e2a..f357b79 100755
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
> @@ -39,18 +39,6 @@
>  #LIBS = -lssl
>  ###############################################################################
>  
> -#CC=$(CROSS_COMPILE)gcc
> -#CFLAGS += -DCONFIG_LIBNL20
> -#CPPFLAGS += -DCONFIG_LIBNL20
> -#LIBS += -L$(NFSROOT)/lib -lnl
> -#LIBS_p += -L$(NFSROOT)/lib
> -#LIBDIR = $(NFSROOT)/lib
> -#BINDIR = $(NFSROOT)/usr/sbin
> -
> -CONFIG_WAPI=y
> -CONFIG_LIBNL20=y
> -NEED_BGSCAN=y
> -CONFIG_BGSCAN_LEARN=y
>  
>  # Driver interface for Host AP driver
>  #CONFIG_DRIVER_HOSTAP=y
> @@ -75,7 +63,7 @@ CONFIG_BGSCAN_LEARN=y
>  #CONFIG_DRIVER_ATMEL=y
>  
>  # Driver interface for old Broadcom driver
> -# Please note that the newer Broadcom driver ("hybrid Linux driver") supportsBG
> +# Please note that the newer Broadcom driver ("hybrid Linux driver") supports
>  # Linux wireless extensions and does not need (or even work) with the old
>  # driver wrapper. Use CONFIG_DRIVER_WEXT=y with that driver.
>  #CONFIG_DRIVER_BROADCOM=y
> @@ -90,16 +78,22 @@ CONFIG_BGSCAN_LEARN=y
>  #CONFIG_DRIVER_RALINK=y
>  
>  # Driver interface for generic Linux wireless extensions
> -CONFIG_DRIVER_WEXT=y
> +# Note: WEXT is deprecated in the current Linux kernel version and no new
> +# functionality is added to it. nl80211-based interface is the new
> +# replacement for WEXT and its use allows wpa_supplicant to properly control
> +# the driver to improve existing functionality like roaming and to support new
> +# functionality.
> +#CONFIG_DRIVER_WEXT=y
>  
>  # Driver interface for Linux drivers using the nl80211 kernel interface
>  CONFIG_DRIVER_NL80211=y
> +CONFIG_LIBNL32=y
>  
>  # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
>  #CONFIG_DRIVER_BSD=y
>  #CFLAGS += -I/usr/local/include
>  #LIBS += -L/usr/local/lib
> -#LIBS_p += -L/usr/local/libBG
> +#LIBS_p += -L/usr/local/lib
>  #LIBS_c += -L/usr/local/lib
>  
>  # Driver interface for Windows NDIS
> @@ -121,13 +115,8 @@ CONFIG_DRIVER_NL80211=y
>  # Driver interface for development testing
>  #CONFIG_DRIVER_TEST=y
>  
> -# Include client MLME (management frame processing) for test driver
> -# This can be used to test MLME operations in hostapd with the test interface.
> -# space.
> -#CONFIG_CLIENT_MLME=y
> -
>  # Driver interface for wired Ethernet drivers
> -CONFIG_DRIVER_WIRED=y
> +#CONFIG_DRIVER_WIRED=y
>  
>  # Driver interface for the Broadcom RoboSwitch family
>  #CONFIG_DRIVER_ROBOSWITCH=y
> @@ -163,7 +152,7 @@ CONFIG_EAP_TTLS=y
>  # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
>  # the OpenSSL library must be patched (openssl-0.9.8d-tls-extensions.patch)
>  # to add the needed functions.
> -#CONFIG_EAP_FAST=y
> +CONFIG_EAP_FAST=y
>  
>  # EAP-GTC
>  CONFIG_EAP_GTC=y
> @@ -172,11 +161,14 @@ CONFIG_EAP_GTC=y
>  CONFIG_EAP_OTP=y
>  
>  # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
> -#CONFIG_EAP_SIM=y
> +CONFIG_EAP_SIM=y
>  
>  # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
>  #CONFIG_EAP_PSK=y
>  
> +# EAP-pwd (secure authentication using only a password)
> +CONFIG_EAP_PWD=y
> +
>  # EAP-PAX
>  #CONFIG_EAP_PAX=y
>  
> @@ -208,6 +200,11 @@ CONFIG_EAP_LEAP=y
>  CONFIG_WPS=y
>  # Enable WSC 2.0 support
>  CONFIG_WPS2=y
> +# Enable WPS external registrar functionality
> +#CONFIG_WPS_ER=y
> +# Disable credentials for an open network by default when acting as a WPS
> +# registrar.
> +#CONFIG_WPS_REG_DISABLE_OPEN=y
>  
>  # EAP-IKEv2
>  #CONFIG_EAP_IKEV2=y
> @@ -224,7 +221,10 @@ CONFIG_SMARTCARD=y
>  # Enable this if EAP-SIM or EAP-AKA is included
>  #CONFIG_PCSC=y
>  
> -# Development testingBG
> +# Support HT overrides (disable HT/HT40, mask MCS rates, etc.)
> +#CONFIG_HT_OVERRIDES=y
> +
> +# Development testing
>  #CONFIG_EAPOL_TEST=y
>  
>  # Select control interface backend for external programs, e.g, wpa_cli:
> @@ -242,6 +242,10 @@ CONFIG_CTRL_IFACE=y
>  # the resulting binary.
>  #CONFIG_READLINE=y
>  
> +# Include internal line edit mode in wpa_cli. This can be used as a replacement
> +# for GNU Readline to provide limited command line editing and history support.
> +CONFIG_WPA_CLI_EDIT=y
> +
>  # Remove debugging code that is printing out debug message to stdout.
>  # This can be used to reduce the size of the wpa_supplicant considerably
>  # if debugging code is not needed. The size reduction can be around 35%
> @@ -295,13 +299,16 @@ CONFIG_BACKEND=file
>  # unix = UNIX/POSIX like systems (default)
>  # win32 = Windows systems
>  # none = Empty template
> -#CONFIG_OS=unix
> +CONFIG_OS=unix
>  
>  # Select event loop implementation
>  # eloop = select() loop (default)
>  # eloop_win = Windows events and WaitForMultipleObject() loop
>  # eloop_none = Empty template
> -#CONFIG_ELOOP=eloop
> +CONFIG_ELOOP=eloop
> +
> +# Should we use poll instead of select? Select is used by default.
> +#CONFIG_ELOOP_POLL=y
>  
>  # Select layer 2 packet implementation
>  # linux = Linux packet socket (default)
> @@ -310,7 +317,7 @@ CONFIG_BACKEND=file
>  # winpcap = WinPcap with receive thread
>  # ndis = Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y)
>  # none = Empty template
> -#CONFIG_L2_PACKET=linux
> +CONFIG_L2_PACKET=linux
>  
>  # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
>  CONFIG_PEERKEY=y
> @@ -323,18 +330,24 @@ CONFIG_PEERKEY=y
>  
>  # Select TLS implementation
>  # openssl = OpenSSL (default)
> -# gnutls = GnuTLS (needed for TLS/IA, see also CONFIG_GNUTLS_EXTRA)
> +# gnutls = GnuTLS
>  # internal = Internal TLSv1 implementation (experimental)
>  # none = Empty template
>  #CONFIG_TLS=openssl
>  
> -# Whether to enable TLS/IA support, which is required for EAP-TTLSv1.
> -# You need CONFIG_TLS=gnutls for this to have any effect. Please note that
> -# even though the core GnuTLS library is released under LGPL, this extra
> -# library uses GPL and as such, the terms of GPL apply to the combination
> -# of wpa_supplicant and GnuTLS if this option is enabled. BSD license may not
> -# apply for distribution of the resulting binary.
> -#CONFIG_GNUTLS_EXTRA=y
> +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
> +# can be enabled to get a stronger construction of messages when block ciphers
> +# are used. It should be noted that some existing TLS v1.0 -based
> +# implementation may not be compatible with TLS v1.1 message (ClientHello is
> +# sent prior to negotiating which version will be used)
> +#CONFIG_TLSV11=y
> +
> +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
> +# can be enabled to enable use of stronger crypto algorithms. It should be
> +# noted that some existing TLS v1.0 -based implementation may not be compatible
> +# with TLS v1.2 message (ClientHello is sent prior to negotiating which version
> +# will be used)
> +#CONFIG_TLSV12=y
>  
>  # If CONFIG_TLS=internal is used, additional library and include paths are
>  # needed for LibTomMath. Alternatively, an integrated, minimal version of
> @@ -360,14 +373,14 @@ CONFIG_PEERKEY=y
>  
>  # Add support for old DBus control interface
>  # (fi.epitest.hostap.WPASupplicant)
> -CONFIG_CTRL_IFACE_DBUS=y
> +#CONFIG_CTRL_IFACE_DBUS=y
>  
>  # Add support for new DBus control interface
>  # (fi.w1.hostap.wpa_supplicant1)
> -CONFIG_CTRL_IFACE_DBUS_NEW=y
> +#CONFIG_CTRL_IFACE_DBUS_NEW=y
>  
>  # Add introspection support for new DBus control interface
> -CONFIG_CTRL_IFACE_DBUS_INTRO=y
> +#CONFIG_CTRL_IFACE_DBUS_INTRO=y
>  
>  # Add support for loading EAP methods dynamically as shared libraries.
>  # When this option is enabled, each EAP method can be either included
> @@ -394,7 +407,22 @@ CONFIG_CTRL_IFACE_DBUS_INTRO=y
>  #CONFIG_IEEE80211R=y
>  
>  # Add support for writing debug log to a file (/tmp/wpa_supplicant-log-#.txt)
> -CONFIG_DEBUG_FILE=y
> +#CONFIG_DEBUG_FILE=y
> +
> +# Send debug messages to syslog instead of stdout
> +#CONFIG_DEBUG_SYSLOG=y
> +# Set syslog facility for debug messages
> +#CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON
> +
> +# Add support for sending all debug messages (regardless of debug verbosity)
> +# to the Linux kernel tracing facility. This helps debug the entire stack by
> +# making it easy to record everything happening from the driver up into the
> +# same file, e.g., using trace-cmd.
> +#CONFIG_DEBUG_LINUX_TRACING=y
> +
> +# Add support for writing debug log to Android logcat instead of standard
> +# output
> +CONFIG_ANDROID_LOG=y
>  
>  # Enable privilege separation (see README 'Privilege separation' for details)
>  #CONFIG_PRIVSEP=y
> @@ -407,7 +435,7 @@ CONFIG_DEBUG_FILE=y
>  # This tracks use of memory allocations and other registrations and reports
>  # incorrect use with a backtrace of call (or allocation) location.
>  #CONFIG_WPA_TRACE=y
> -# For BSD, comment out these.
> +# For BSD, uncomment these.
>  #LIBS += -lexecinfo
>  #LIBS_p += -lexecinfo
>  #LIBS_c += -lexecinfo
> @@ -416,15 +444,63 @@ CONFIG_DEBUG_FILE=y
>  # This enables use of libbfd to get more detailed symbols for the backtraces
>  # generated by CONFIG_WPA_TRACE=y.
>  #CONFIG_WPA_TRACE_BFD=y
> -# For BSD, comment out these.
> +# For BSD, uncomment these.
>  #LIBS += -lbfd -liberty -lz
>  #LIBS_p += -lbfd -liberty -lz
>  #LIBS_c += -lbfd -liberty -lz
>  
> -# for p2p
> +# wpa_supplicant depends on strong random number generation being available
> +# from the operating system. os_get_random() function is used to fetch random
> +# data when needed, e.g., for key generation. On Linux and BSD systems, this
> +# works by reading /dev/urandom. It should be noted that the OS entropy pool
> +# needs to be properly initialized before wpa_supplicant is started. This is
> +# important especially on embedded devices that do not have a hardware random
> +# number generator and may by default start up with minimal entropy available
> +# for random number generation.
> +#
> +# As a safety net, wpa_supplicant is by default trying to internally collect
> +# additional entropy for generating random data to mix in with the data fetched
> +# from the OS. This by itself is not considered to be very strong, but it may
> +# help in cases where the system pool is not initialized properly. However, it
> +# is very strongly recommended that the system pool is initialized with enough
> +# entropy either by using hardware assisted random number generator or by
> +# storing state over device reboots.
> +#
> +# wpa_supplicant can be configured to maintain its own entropy store over
> +# restarts to enhance random number generation. This is not perfect, but it is
> +# much more secure than using the same sequence of random numbers after every
> +# reboot. This can be enabled with -e<entropy file> command line option. The
> +# specified file needs to be readable and writable by wpa_supplicant.
> +#
> +# If the os_get_random() is known to provide strong random data (e.g., on
> +# Linux/BSD, the board in question is known to have reliable source of random
> +# data from /dev/urandom), the internal wpa_supplicant random pool can be
> +# disabled. This will save some in binary size and CPU use. However, this
> +# should only be considered for builds that are known to be used on devices
> +# that meet the requirements described above.
> +#CONFIG_NO_RANDOM_POOL=y
> +
> +# IEEE 802.11n (High Throughput) support (mainly for AP mode)
> +CONFIG_IEEE80211N=y
> +
> +# Interworking (IEEE 802.11u)
> +# This can be used to enable functionality to improve interworking with
> +# external networks (GAS/ANQP to learn more about the networks and network
> +# selection based on available credentials).
> +CONFIG_INTERWORKING=y
> +
> +# Hotspot 2.0
> +CONFIG_HS20=y
> +
> +# Disable roaming in wpa_supplicant
> +#CONFIG_NO_ROAMING=y
> +
> +# Enable P2P
>  CONFIG_P2P=y
>  CONFIG_AP=y
>  
> -# IEEE 802.11n (High Throughput) support
> -CONFIG_IEEE80211N=y
> +# bgscan
> +NEED_BGSCAN=y
> +CONFIG_BGSCAN_LEARN=y
> +CONFIG_BGSCAN_SIMPLE=y
>  
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> similarity index 88%
> rename from meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
> rename to meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> index f6c4f70..ec7a0c7 100644
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> @@ -10,9 +10,9 @@ LIC_FILES_CHKSUM = "file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e \
>  
>  FILESEXTRAPATHS_append := "${THISDIR}/wpa-supplicant:"
>  
> -# Tag: ol_r8.a6.01
> -SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
> -PR = "r2+gitr${SRCPV}"
> +# Tag: ol_r8.a8.08
> +SRCREV = "257ab333aad993b4be81808524bc0d939c276058"
> +PR_append = "a+gitr${SRCPV}"
>  
>  # Add ti to the PV to indicate that this is a TI modify version of wpa-supplicant.
>  PV = "2.0-devel-ti"
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
> index 2d8970f..9678b1b 100644
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
> @@ -21,6 +21,7 @@ SRC_URI = "git://github.com/TI-OpenLink/hostap.git;protocol=git \
>             file://defaults-sane \
>             file://wpa-supplicant.sh \
>             file://wpa_supplicant.conf \
> +           file://p2p_supplicant.conf \
>             file://wpa_supplicant.conf-sane \
>             file://99_wpa_supplicant \
>             file://wpa_supplicant.conf \
> @@ -55,6 +56,7 @@ do_install () {
>  	install -d ${D}${sysconfdir}/default
>  	install -m 600 ${WORKDIR}/defaults-sane ${D}${sysconfdir}/default/wpa
>  	install -m 600 ${WORKDIR}/wpa_supplicant.conf-sane ${D}${sysconfdir}/wpa_supplicant.conf
> +	install -m 600 ${WORKDIR}/p2p_supplicant.conf ${D}${sysconfdir}/p2p_supplicant.conf
>  
>  	if grep -q ^CONFIG_CTRL_IFACE_DBUS=y .config || grep -q ^CONFIG_CTRL_IFACE_DBUS_NEW=y .config; then
>  		install -d ${D}/${sysconfdir}/dbus-1/system.d
> @@ -104,6 +106,7 @@ pkg_postinst_wpa-supplicant () {
>  do_configure () {
>  	install -m 0755 ${WORKDIR}/defconfig .config
>  	echo "CFLAGS += -I${STAGING_INCDIR}" >> .config
> +	echo "CFLAGS += -I${STAGING_INCDIR}/libnl3/" >> .config
>  	echo "LIBS += -L${STAGING_LIBDIR}" >> .config
>  	echo "LIBS_p += -L${STAGING_LIBDIR}" >> .config
>  	if [ "${@base_contains('COMBINED_FEATURES', 'madwifi', 1, 0, d)}" = "1" ]; then
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> new file mode 100755
> index 0000000..2de8730
> --- /dev/null
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> @@ -0,0 +1,14 @@
> +ctrl_interface=/var/run/wpa_supplicant
> +update_config=0
> +device_name=TI-SITARA-P2P
> +device_type=1-0050F204-1
> +config_methods=virtual_push_button physical_display keypad
> +p2p_go_intent=0
> +country=US
> +##p2p_pref_chan=115:36 115:40
> +driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
> +p2p_go_max_inactivity=60
> +p2p_go_ht40=1
> +p2p_multi_chan=1
> +disassoc_low_ack=1
> +concurrent_sched_scan=1
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> index f0c993d..f144a38 100644
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> @@ -1,19 +1,4 @@
> -##### Example wpa_supplicant configuration file ###############################
> -#
> -# This file describes configuration file format and lists all available option.
> -# Please also take a look at simpler configuration examples in 'examples'
> -# subdirectory.
> -#
> -# Empty lines and lines starting with # are ignored
> -
> -# NOTE! This file may contain password information and should probably be made
> -# readable only by root user on multiuser systems.
> -
> -# Note: All file paths in this configuration file should use full (absolute,
> -# not relative to working directory) path in order to allow working directory
> -# to be changed. This can happen if wpa_supplicant is run in the background.
> -
> -# Whether to allow wpa_supplicant to update (overwrite) configuration
> +##### wpa_supplicant configuration file template #####
>  #
>  # This option can be used to allow wpa_supplicant to overwrite configuration
>  # file whenever configuration is changed (e.g., new network block is added with
> @@ -21,59 +6,8 @@
>  # wpa_cli/wpa_gui to be able to store the configuration changes permanently.
>  # Please note that overwriting configuration file will remove the comments from
>  # it.
> -#update_config=1
> -
> -# global configuration (shared by all network blocks)
> -#
> -# Parameters for the control interface. If this is specified, wpa_supplicant
> -# will open a control interface that is available for external programs to
> -# manage wpa_supplicant. The meaning of this string depends on which control
> -# interface mechanism is used. For all cases, the existance of this parameter
> -# in configuration is used to determine whether the control interface is
> -# enabled.
> -#
> -# For UNIX domain sockets (default on Linux and BSD): This is a directory that
> -# will be created for UNIX domain sockets for listening to requests from
> -# external programs (CLI/GUI, etc.) for status information and configuration.
> -# The socket file will be named based on the interface name, so multiple
> -# wpa_supplicant processes can be run at the same time if more than one
> -# interface is used.
> -# /var/run/wpa_supplicant is the recommended directory for sockets and by
> -# default, wpa_cli will use it when trying to connect with wpa_supplicant.
> -#
> -# Access control for the control interface can be configured by setting the
> -# directory to allow only members of a group to use sockets. This way, it is
> -# possible to run wpa_supplicant as root (since it needs to change network
> -# configuration and open raw sockets) and still allow GUI/CLI components to be
> -# run as non-root users. However, since the control interface can be used to
> -# change the network configuration, this access needs to be protected in many
> -# cases. By default, wpa_supplicant is configured to use gid 0 (root). If you
> -# want to allow non-root users to use the control interface, add a new group
> -# and change this value to match with that group. Add users that should have
> -# control interface access to this group. If this variable is commented out or
> -# not included in the configuration file, group will not be changed from the
> -# value it got by default when the directory or socket was created.
> -#
> -# When configuring both the directory and group, use following format:
> -# DIR=/var/run/wpa_supplicant GROUP=wheel
> -# DIR=/var/run/wpa_supplicant GROUP=0
> -# (group can be either group name or gid)
> -#
> -# For UDP connections (default on Windows): The value will be ignored. This
> -# variable is just used to select that the control interface is to be created.
> -# The value can be set to, e.g., udp (ctrl_interface=udp)
> -#
> -# For Windows Named Pipe: This value can be used to set the security descriptor
> -# for controlling access to the control interface. Security descriptor can be
> -# set using Security Descriptor String Format (see http://msdn.microsoft.com/
> -# library/default.asp?url=/library/en-us/secauthz/security/
> -# security_descriptor_string_format.asp). The descriptor string needs to be
> -# prefixed with SDDL=. For example, ctrl_interface=SDDL=D: would set an empty
> -# DACL (which will reject all connections). See README-Windows.txt for more
> -# information about SDDL string format.
> -#
> +update_config=1
>  ctrl_interface=/var/run/wpa_supplicant
> -
>  # IEEE 802.1X/EAPOL version
>  # wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines
>  # EAPOL version 2. However, there are many APs that do not handle the new
> @@ -82,14 +16,15 @@ ctrl_interface=/var/run/wpa_supplicant
>  # to 1 by default. This configuration value can be used to set it to the new
>  # version (2).
>  eapol_version=1
> -
>  # AP scanning/selection
>  # By default, wpa_supplicant requests driver to perform AP scanning and then
>  # uses the scan results to select a suitable AP. Another alternative is to
>  # allow the driver to take care of AP scanning and selection and use
>  # wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association
>  # information from the driver.
> -# 1: wpa_supplicant initiates scanning and AP selection
> +# 1: wpa_supplicant initiates scanning and AP selection; if no APs matching to
> +#    the currently enabled networks are found, a new network (IBSS or AP mode
> +#    operation) may be initialized (if configured) (default)
>  # 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
>  #    parameters (e.g., WPA IE generation); this mode can also be used with
>  #    non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
> @@ -102,589 +37,28 @@ eapol_version=1
>  #    the driver reports successful association; each network block should have
>  #    explicit security policy (i.e., only one option in the lists) for
>  #    key_mgmt, pairwise, group, proto variables
> +# When using IBSS or AP mode, ap_scan=2 mode can force the new network to be
> +# created immediately regardless of scan results. ap_scan=1 mode will first try
> +# to scan for existing networks and only if no matches with the enabled
> +# networks are found, a new IBSS or AP mode network is created.
>  ap_scan=1
> -
>  # EAP fast re-authentication
>  # By default, fast re-authentication is enabled for all EAP methods that
>  # support it. This variable can be used to disable fast re-authentication.
>  # Normally, there is no need to disable this.
>  fast_reauth=1
> -
> -# OpenSSL Engine support
> -# These options can be used to load OpenSSL engines.
> -# The two engines that are supported currently are shown below:
> -# They are both from the opensc project (http://www.opensc.org/)
> -# By default no engines are loaded.
> -# make the opensc engine available
> -#opensc_engine_path=/usr/lib/opensc/engine_opensc.so
> -# make the pkcs11 engine available
> -#pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
> -# configure the path to the pkcs11 module required by the pkcs11 engine
> -#pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
> -
> -# Dynamic EAP methods
> -# If EAP methods were built dynamically as shared object files, they need to be
> -# loaded here before being used in the network blocks. By default, EAP methods
> -# are included statically in the build, so these lines are not needed
> -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_tls.so
> -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_md5.so
> -
> -# Driver interface parameters
> -# This field can be used to configure arbitrary driver interace parameters. The
> -# format is specific to the selected driver interface. This field is not used
> -# in most cases.
> -#driver_param="field=value"
> -
> -# Maximum lifetime for PMKSA in seconds; default 43200
> -#dot11RSNAConfigPMKLifetime=43200
> -# Threshold for reauthentication (percentage of PMK lifetime); default 70
> -#dot11RSNAConfigPMKReauthThreshold=70
> -# Timeout for security association negotiation in seconds; default 60
> -#dot11RSNAConfigSATimeout=60
> -
> -# network block
> -#
> -# Each network (usually AP's sharing the same SSID) is configured as a separate
> -# block in this configuration file. The network blocks are in preference order
> -# (the first match is used).
> -#
> -# network block fields:
> -#
> -# disabled:
> -#	0 = this network can be used (default)
> -#	1 = this network block is disabled (can be enabled through ctrl_iface,
> -#	    e.g., with wpa_cli or wpa_gui)
> -#
> -# id_str: Network identifier string for external scripts. This value is passed
> -#	to external action script through wpa_cli as WPA_ID_STR environment
> -#	variable to make it easier to do network specific configuration.
> -#
> -# ssid: SSID (mandatory); either as an ASCII string with double quotation or
> -#	as hex string; network name
> -#
> -# scan_ssid:
> -#	0 = do not scan this SSID with specific Probe Request frames (default)
> -#	1 = scan with SSID-specific Probe Request frames (this can be used to
> -#	    find APs that do not accept broadcast SSID or use multiple SSIDs;
> -#	    this will add latency to scanning, so enable this only when needed)
> -#
> -# bssid: BSSID (optional); if set, this network block is used only when
> -#	associating with the AP using the configured BSSID
> -#
> -# priority: priority group (integer)
> -# By default, all networks will get same priority group (0). If some of the
> -# networks are more desirable, this field can be used to change the order in
> -# which wpa_supplicant goes through the networks when selecting a BSS. The
> -# priority groups will be iterated in decreasing priority (i.e., the larger the
> -# priority value, the sooner the network is matched against the scan results).
> -# Within each priority group, networks will be selected based on security
> -# policy, signal strength, etc.
> -# Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not
> -# using this priority to select the order for scanning. Instead, they try the
> -# networks in the order that used in the configuration file.
> -#
> -# mode: IEEE 802.11 operation mode
> -# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default)
> -# 1 = IBSS (ad-hoc, peer-to-peer)
> -# Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP)
> -# and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
> -# to be set to 2 for IBSS. WPA-None requires following network block options:
> -# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
> -# both), and psk must also be set.
> -#
> -# proto: list of accepted protocols
> -# WPA = WPA/IEEE 802.11i/D3.0
> -# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
> -# If not set, this defaults to: WPA RSN
> -#
> -# key_mgmt: list of accepted authenticated key management protocols
> -# WPA-PSK = WPA pre-shared key (this requires 'psk' field)
> -# WPA-EAP = WPA using EAP authentication (this can use an external
> -#	program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
> -# IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
> -#	generated WEP keys
> -# NONE = WPA is not used; plaintext or static WEP could be used
> -# If not set, this defaults to: WPA-PSK WPA-EAP
> -#
> -# auth_alg: list of allowed IEEE 802.11 authentication algorithms
> -# OPEN = Open System authentication (required for WPA/WPA2)
> -# SHARED = Shared Key authentication (requires static WEP keys)
> -# LEAP = LEAP/Network EAP (only used with LEAP)
> -# If not set, automatic selection is used (Open System with LEAP enabled if
> -# LEAP is allowed as one of the EAP methods).
> -#
> -# pairwise: list of accepted pairwise (unicast) ciphers for WPA
> -# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
> -# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
> -# NONE = Use only Group Keys (deprecated, should not be included if APs support
> -#	pairwise keys)
> -# If not set, this defaults to: CCMP TKIP
> -#
> -# group: list of accepted group (broadcast/multicast) ciphers for WPA
> -# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
> -# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
> -# WEP104 = WEP (Wired Equivalent Privacy) with 104-bit key
> -# WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE 802.11]
> -# If not set, this defaults to: CCMP TKIP WEP104 WEP40
> -#
> -# psk: WPA preshared key; 256-bit pre-shared key
> -# The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
> -# 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
> -# generated using the passphrase and SSID). ASCII passphrase must be between
> -# 8 and 63 characters (inclusive).
> -# This field is not needed, if WPA-EAP is used.
> -# Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys
> -# from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
> -# startup and reconfiguration time can be optimized by generating the PSK only
> -# only when the passphrase or SSID has actually changed.
> -#
> -# eapol_flags: IEEE 802.1X/EAPOL options (bit field)
> -# Dynamic WEP key required for non-WPA mode
> -# bit0 (1): require dynamically generated unicast WEP key
> -# bit1 (2): require dynamically generated broadcast WEP key
> -# 	(3 = require both keys; default)
> -# Note: When using wired authentication, eapol_flags must be set to 0 for the
> -# authentication to be completed successfully.
> -#
> -# proactive_key_caching:
> -# Enable/disable opportunistic PMKSA caching for WPA2.
> -# 0 = disabled (default)
> -# 1 = enabled
> -#
> -# wep_key0..3: Static WEP key (ASCII in double quotation, e.g. "abcde" or
> -# hex without quotation, e.g., 0102030405)
> -# wep_tx_keyidx: Default WEP key index (TX) (0..3)
> -#
> -# peerkey: Whether PeerKey negotiation for direct links (IEEE 802.11e DLS) is
> -# allowed. This is only used with RSN/WPA2.
> -# 0 = disabled (default)
> -# 1 = enabled
> -#peerkey=1
> -#
> -# Following fields are only used with internal EAP implementation.
> -# eap: space-separated list of accepted EAP methods
> -#	MD5 = EAP-MD5 (unsecure and does not generate keying material ->
> -#			cannot be used with WPA; to be used as a Phase 2 method
> -#			with EAP-PEAP or EAP-TTLS)
> -#       MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
> -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> -#       OTP = EAP-OTP (cannot be used separately with WPA; to be used
> -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> -#       GTC = EAP-GTC (cannot be used separately with WPA; to be used
> -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> -#	TLS = EAP-TLS (client and server certificate)
> -#	PEAP = EAP-PEAP (with tunnelled EAP authentication)
> -#	TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
> -#			 authentication)
> -#	If not set, all compiled in methods are allowed.
> -#
> -# identity: Identity string for EAP
> -# anonymous_identity: Anonymous identity string for EAP (to be used as the
> -#	unencrypted identity with EAP types that support different tunnelled
> -#	identity, e.g., EAP-TTLS)
> -# password: Password string for EAP
> -# ca_cert: File path to CA certificate file (PEM/DER). This file can have one
> -#	or more trusted CA certificates. If ca_cert and ca_path are not
> -#	included, server certificate will not be verified. This is insecure and
> -#	a trusted CA certificate should always be configured when using
> -#	EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
> -#	change when wpa_supplicant is run in the background.
> -#	On Windows, trusted CA certificates can be loaded from the system
> -#	certificate store by setting this to cert_store://<name>, e.g.,
> -#	ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT".
> -#	Note that when running wpa_supplicant as an application, the user
> -#	certificate store (My user account) is used, whereas computer store
> -#	(Computer account) is used when running wpasvc as a service.
> -# ca_path: Directory path for CA certificate files (PEM). This path may
> -#	contain multiple CA certificates in OpenSSL format. Common use for this
> -#	is to point to system trusted CA list which is often installed into
> -#	directory like /etc/ssl/certs. If configured, these certificates are
> -#	added to the list of trusted CAs. ca_cert may also be included in that
> -#	case, but it is not required.
> -# client_cert: File path to client certificate file (PEM/DER)
> -#	Full path should be used since working directory may change when
> -#	wpa_supplicant is run in the background.
> -#	Alternatively, a named configuration blob can be used by setting this
> -#	to blob://<blob name>.
> -# private_key: File path to client private key file (PEM/DER/PFX)
> -#	When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
> -#	commented out. Both the private key and certificate will be read from
> -#	the PKCS#12 file in this case. Full path should be used since working
> -#	directory may change when wpa_supplicant is run in the background.
> -#	Windows certificate store can be used by leaving client_cert out and
> -#	configuring private_key in one of the following formats:
> -#	cert://substring_to_match
> -#	hash://certificate_thumbprint_in_hex
> -#	for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
> -#	Note that when running wpa_supplicant as an application, the user
> -#	certificate store (My user account) is used, whereas computer store
> -#	(Computer account) is used when running wpasvc as a service.
> -#	Alternatively, a named configuration blob can be used by setting this
> -#	to blob://<blob name>.
> -# private_key_passwd: Password for private key file (if left out, this will be
> -#	asked through control interface)
> -# dh_file: File path to DH/DSA parameters file (in PEM format)
> -#	This is an optional configuration file for setting parameters for an
> -#	ephemeral DH key exchange. In most cases, the default RSA
> -#	authentication does not use this configuration. However, it is possible
> -#	setup RSA to use ephemeral DH key exchange. In addition, ciphers with
> -#	DSA keys always use ephemeral DH keys. This can be used to achieve
> -#	forward secrecy. If the file is in DSA parameters format, it will be
> -#	automatically converted into DH params.
> -# subject_match: Substring to be matched against the subject of the
> -#	authentication server certificate. If this string is set, the server
> -#	sertificate is only accepted if it contains this string in the subject.
> -#	The subject string is in following format:
> -#	/C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com
> -# altsubject_match: Semicolon separated string of entries to be matched against
> -#	the alternative subject name of the authentication server certificate.
> -#	If this string is set, the server sertificate is only accepted if it
> -#	contains one of the entries in an alternative subject name extension.
> -#	altSubjectName string is in following format: TYPE:VALUE
> -#	Example: EMAIL:server@example.com
> -#	Example: DNS:server.example.com;DNS:server2.example.com
> -#	Following types are supported: EMAIL, DNS, URI
> -# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
> -#	(string with field-value pairs, e.g., "peapver=0" or
> -#	"peapver=1 peaplabel=1")
> -#	'peapver' can be used to force which PEAP version (0 or 1) is used.
> -#	'peaplabel=1' can be used to force new label, "client PEAP encryption",
> -#	to be used during key derivation when PEAPv1 or newer. Most existing
> -#	PEAPv1 implementation seem to be using the old label, "client EAP
> -#	encryption", and wpa_supplicant is now using that as the default value.
> -#	Some servers, e.g., Radiator, may require peaplabel=1 configuration to
> -#	interoperate with PEAPv1; see eap_testing.txt for more details.
> -#	'peap_outer_success=0' can be used to terminate PEAP authentication on
> -#	tunneled EAP-Success. This is required with some RADIUS servers that
> -#	implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
> -#	Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode)
> -#	include_tls_length=1 can be used to force wpa_supplicant to include
> -#	TLS Message Length field in all TLS messages even if they are not
> -#	fragmented.
> -#	sim_min_num_chal=3 can be used to configure EAP-SIM to require three
> -#	challenges (by default, it accepts 2 or 3)
> -# phase2: Phase2 (inner authentication with TLS tunnel) parameters
> -#	(string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
> -#	"autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
> -# Following certificate/private key fields are used in inner Phase2
> -# authentication when using EAP-TTLS or EAP-PEAP.
> -# ca_cert2: File path to CA certificate file. This file can have one or more
> -#	trusted CA certificates. If ca_cert2 and ca_path2 are not included,
> -#	server certificate will not be verified. This is insecure and a trusted
> -#	CA certificate should always be configured.
> -# ca_path2: Directory path for CA certificate files (PEM)
> -# client_cert2: File path to client certificate file
> -# private_key2: File path to client private key file
> -# private_key2_passwd: Password for private key file
> -# dh_file2: File path to DH/DSA parameters file (in PEM format)
> -# subject_match2: Substring to be matched against the subject of the
> -#	authentication server certificate.
> -# altsubject_match2: Substring to be matched against the alternative subject
> -#	name of the authentication server certificate.
> -#
> -# fragment_size: Maximum EAP fragment size in bytes (default 1398).
> -#	This value limits the fragment size for EAP methods that support
> -#	fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
> -#	small enough to make the EAP messages fit in MTU of the network
> -#	interface used for EAPOL. The default value is suitable for most
> -#	cases.
> -#
> -# EAP-PSK variables:
> -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
> -# nai: user NAI
> -#
> -# EAP-PAX variables:
> -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
> -#
> -# EAP-SAKE variables:
> -# eappsk: 32-byte (256-bit, 64 hex digits) pre-shared key in hex format
> -#	(this is concatenation of Root-Secret-A and Root-Secret-B)
> -# nai: user NAI (PEERID)
> -#
> -# EAP-GPSK variables:
> -# eappsk: Pre-shared key in hex format (at least 128 bits, i.e., 32 hex digits)
> -# nai: user NAI (ID_Client)
> -#
> -# EAP-FAST variables:
> -# pac_file: File path for the PAC entries. wpa_supplicant will need to be able
> -#	to create this file and write updates to it when PAC is being
> -#	provisioned or refreshed. Full path to the file should be used since
> -#	working directory may change when wpa_supplicant is run in the
> -#	background. Alternatively, a named configuration blob can be used by
> -#	setting this to blob://<blob name>
> -# phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST
> -#	credentials (PAC)
> -#
> -# wpa_supplicant supports number of "EAP workarounds" to work around
> -# interoperability issues with incorrectly behaving authentication servers.
> -# These are enabled by default because some of the issues are present in large
> -# number of authentication servers. Strict EAP conformance mode can be
> -# configured by disabling workarounds with eap_workaround=0.
> -
> -# Example blocks:
> -
> -# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
> -network={
> -	ssid="simple"
> -	psk="very secret passphrase"
> -	priority=5
> -}
> -
> -# Same as previous, but request SSID-specific scanning (for APs that reject
> -# broadcast SSID)
> -network={
> -	ssid="second ssid"
> -	scan_ssid=1
> -	psk="very secret passphrase"
> -	priority=2
> -}
> -
> -# Only WPA-PSK is used. Any valid cipher combination is accepted.
> -network={
> -	ssid="example"
> -	proto=WPA
> -	key_mgmt=WPA-PSK
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP WEP104 WEP40
> -	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
> -	priority=2
> -}
> -
> -# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
> -# or WEP40 as the group cipher will not be accepted.
> -network={
> -	ssid="example"
> -	proto=RSN
> -	key_mgmt=WPA-EAP
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP
> -	eap=TLS
> -	identity="user@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -	private_key="/etc/cert/user.prv"
> -	private_key_passwd="password"
> -	priority=1
> -}
> -
> -# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
> -# (e.g., Radiator)
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=PEAP
> -	identity="user@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	phase1="peaplabel=1"
> -	phase2="auth=MSCHAPV2"
> -	priority=10
> -}
> -
> -# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
> -# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	identity="user@example.com"
> -	anonymous_identity="anonymous@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	priority=2
> -}
> -
> -# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
> -# use. Real identity is sent only within an encrypted TLS tunnel.
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	identity="user@example.com"
> -	anonymous_identity="anonymous@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	phase2="auth=MSCHAPV2"
> -}
> -
> -# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
> -# authentication.
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	# Phase1 / outer authentication
> -	anonymous_identity="anonymous@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	# Phase 2 / inner authentication
> -	phase2="autheap=TLS"
> -	ca_cert2="/etc/cert/ca2.pem"
> -	client_cert2="/etc/cer/user.pem"
> -	private_key2="/etc/cer/user.prv"
> -	private_key2_passwd="password"
> -	priority=2
> -}
> -
> -# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
> -# group cipher.
> -network={
> -	ssid="example"
> -	bssid=00:11:22:33:44:55
> -	proto=WPA RSN
> -	key_mgmt=WPA-PSK WPA-EAP
> -	pairwise=CCMP
> -	group=CCMP
> -	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
> -}
> -
> -# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
> -# and all valid ciphers.
> -network={
> -	ssid=00010203
> -	psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
> -}
> -
> -
> -# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using
> -# EAP-TLS for authentication and key generation; require both unicast and
> -# broadcast WEP keys.
> -network={
> -	ssid="1x-test"
> -	key_mgmt=IEEE8021X
> -	eap=TLS
> -	identity="user@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -	private_key="/etc/cert/user.prv"
> -	private_key_passwd="password"
> -	eapol_flags=3
> -}
> -
> -
> -# LEAP with dynamic WEP keys
> -network={
> -	ssid="leap-example"
> -	key_mgmt=IEEE8021X
> -	eap=LEAP
> -	identity="user"
> -	password="foobar"
> -}
> -
> -# Plaintext connection (no WPA, no IEEE 802.1X)
> -network={
> -	ssid="plaintext-test"
> -	key_mgmt=NONE
> -}
> -
> -
> -# Shared WEP key connection (no WPA, no IEEE 802.1X)
> -network={
> -	ssid="static-wep-test"
> -	key_mgmt=NONE
> -	wep_key0="abcde"
> -	wep_key1=0102030405
> -	wep_key2="1234567890123"
> -	wep_tx_keyidx=0
> -	priority=5
> -}
> -
> -
> -# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key
> -# IEEE 802.11 authentication
> -network={
> -	ssid="static-wep-test2"
> -	key_mgmt=NONE
> -	wep_key0="abcde"
> -	wep_key1=0102030405
> -	wep_key2="1234567890123"
> -	wep_tx_keyidx=0
> -	priority=5
> -	auth_alg=SHARED
> -}
> -
> -
> -# IBSS/ad-hoc network with WPA-None/TKIP.
> -network={
> -	ssid="test adhoc"
> -	mode=1
> -	proto=WPA
> -	key_mgmt=WPA-NONE
> -	pairwise=NONE
> -	group=TKIP
> -	psk="secret passphrase"
> -}
> -
> -
> -# Catch all example that allows more or less all configuration modes
> -network={
> -	ssid="example"
> -	scan_ssid=1
> -	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP WEP104 WEP40
> -	psk="very secret passphrase"
> -	eap=TTLS PEAP TLS
> -	identity="user@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -	private_key="/etc/cert/user.prv"
> -	private_key_passwd="password"
> -	phase1="peaplabel=0"
> -}
> -
> -# Example of EAP-TLS with smartcard (openssl engine)
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TLS
> -	proto=RSN
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP
> -	identity="user@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -
> -	engine=1
> -
> -	# The engine configured here must be available. Look at
> -	# OpenSSL engine support in the global section.
> -	# The key available through the engine must be the private key
> -	# matching the client certificate configured above.
> -
> -	# use the opensc engine
> -	#engine_id="opensc"
> -	#key_id="45"
> -
> -	# use the pkcs11 engine
> -	engine_id="pkcs11"
> -	key_id="id_45"
> -
> -	# Optional PIN configuration; this can be left out and PIN will be
> -	# asked through the control interface
> -	pin="1234"
> -}
> -
> -# Example configuration showing how to use an inlined blob as a CA certificate
> -# data instead of using external file
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	identity="user@example.com"
> -	anonymous_identity="anonymous@example.com"
> -	password="foobar"
> -	ca_cert="blob://exampleblob"
> -	priority=20
> -}
> -
> -blob-base64-exampleblob={
> -SGVsbG8gV29ybGQhCg==
> -}
> -
> -
> -# Wildcard match for SSID (plaintext APs only). This example select any
> -# open AP regardless of its SSID.
> -network={
> -	key_mgmt=NONE
> -}
> +device_name=Blaze
> +manufacturer=TI
> +model_name=Wilink
> +model_number=wl18xx
> +serial_number=12345
> +driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
> +# Timeout in seconds to detect STA inactivity (default: 300 seconds)
> +#
> +# This timeout value is used in P2P GO mode to clean up
> +# inactive stations.
> +p2p_go_max_inactivity=60
> +p2p_go_ht40=1
> +p2p_multi_chan=1
> +disassoc_low_ack=1
> +concurrent_sched_scan=1
> -- 
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version.
  2013-12-09  5:46 ` [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Denys Dmytriyenko
@ 2013-12-14  9:40   ` Denys Dmytriyenko
  0 siblings, 0 replies; 18+ messages in thread
From: Denys Dmytriyenko @ 2013-12-14  9:40 UTC (permalink / raw)
  To: Yaniv Mahani, meta-arago

Sorry for the delay - I didn't forget about the patches, but we are trying to 
make a release now and I didn't have time for anything else. I'll try to 
allocate some time for this as soon as possible. Thatnks.

-- 
Denys


On Mon, Dec 09, 2013 at 12:46:45AM -0500, Denys Dmytriyenko wrote:
> Thanks, Yaniv. Please give me a day or so to review your patches. Thanks 
> again for submission!
> 
> -- 
> Denys
> 
> On Sun, Dec 08, 2013 at 10:18:09AM +0200, Yaniv Mahani wrote:
> > From: Yaniv Machani <yanivma@ti.com>
> > 
> > - Build wpa-supplicant from TI_Openlink ol_r8.a8.08
> > - Add missing includes for building with libnl3.
> > - Adjusted configuration files, and added p2p conf.
> > 
> > Signed-off-by: Yaniv Machani <yanivma@ti.com>
> > ---
> > This set of patches should allow integration of WiLink-8 into meta-arago.
> > It should replace the set of 14 patches previously submitted for review.
> > 
> > 
> > Note :
> > Wilink-6 is currently not supported with the latest meta-arago builds.
> > ECS have decided not to support Wilink-6 in the core SDK also in the future.
> > Therefore any Wilink-6 broken recipes should not be a concern, as we will clean them up on a different set of patches.
> > 
> > wifi-direct-demo, battleship, wpa-gui-e applications will shortly be removed as well.
> > 
> > Yaniv
> > 
> >  .../wpa-supplicant/wpa-supplicant-wl18xx/defconfig |  164 ++++--
> >  ....a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} |    6 +-
> >  .../wpa-supplicant/wpa-supplicant.inc              |    3 +
> >  .../wpa-supplicant/p2p_supplicant.conf             |   14 +
> >  .../wpa-supplicant/wpa_supplicant.conf             |  674 +-------------------
> >  5 files changed, 164 insertions(+), 697 deletions(-)
> >  rename meta-arago-extras/recipes-connectivity/wpa-supplicant/{wpa-supplicant-wl18xx_r8.a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} (88%)
> >  create mode 100755 meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> > 
> > diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
> > index b982e2a..f357b79 100755
> > --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
> > +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx/defconfig
> > @@ -39,18 +39,6 @@
> >  #LIBS = -lssl
> >  ###############################################################################
> >  
> > -#CC=$(CROSS_COMPILE)gcc
> > -#CFLAGS += -DCONFIG_LIBNL20
> > -#CPPFLAGS += -DCONFIG_LIBNL20
> > -#LIBS += -L$(NFSROOT)/lib -lnl
> > -#LIBS_p += -L$(NFSROOT)/lib
> > -#LIBDIR = $(NFSROOT)/lib
> > -#BINDIR = $(NFSROOT)/usr/sbin
> > -
> > -CONFIG_WAPI=y
> > -CONFIG_LIBNL20=y
> > -NEED_BGSCAN=y
> > -CONFIG_BGSCAN_LEARN=y
> >  
> >  # Driver interface for Host AP driver
> >  #CONFIG_DRIVER_HOSTAP=y
> > @@ -75,7 +63,7 @@ CONFIG_BGSCAN_LEARN=y
> >  #CONFIG_DRIVER_ATMEL=y
> >  
> >  # Driver interface for old Broadcom driver
> > -# Please note that the newer Broadcom driver ("hybrid Linux driver") supportsBG
> > +# Please note that the newer Broadcom driver ("hybrid Linux driver") supports
> >  # Linux wireless extensions and does not need (or even work) with the old
> >  # driver wrapper. Use CONFIG_DRIVER_WEXT=y with that driver.
> >  #CONFIG_DRIVER_BROADCOM=y
> > @@ -90,16 +78,22 @@ CONFIG_BGSCAN_LEARN=y
> >  #CONFIG_DRIVER_RALINK=y
> >  
> >  # Driver interface for generic Linux wireless extensions
> > -CONFIG_DRIVER_WEXT=y
> > +# Note: WEXT is deprecated in the current Linux kernel version and no new
> > +# functionality is added to it. nl80211-based interface is the new
> > +# replacement for WEXT and its use allows wpa_supplicant to properly control
> > +# the driver to improve existing functionality like roaming and to support new
> > +# functionality.
> > +#CONFIG_DRIVER_WEXT=y
> >  
> >  # Driver interface for Linux drivers using the nl80211 kernel interface
> >  CONFIG_DRIVER_NL80211=y
> > +CONFIG_LIBNL32=y
> >  
> >  # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
> >  #CONFIG_DRIVER_BSD=y
> >  #CFLAGS += -I/usr/local/include
> >  #LIBS += -L/usr/local/lib
> > -#LIBS_p += -L/usr/local/libBG
> > +#LIBS_p += -L/usr/local/lib
> >  #LIBS_c += -L/usr/local/lib
> >  
> >  # Driver interface for Windows NDIS
> > @@ -121,13 +115,8 @@ CONFIG_DRIVER_NL80211=y
> >  # Driver interface for development testing
> >  #CONFIG_DRIVER_TEST=y
> >  
> > -# Include client MLME (management frame processing) for test driver
> > -# This can be used to test MLME operations in hostapd with the test interface.
> > -# space.
> > -#CONFIG_CLIENT_MLME=y
> > -
> >  # Driver interface for wired Ethernet drivers
> > -CONFIG_DRIVER_WIRED=y
> > +#CONFIG_DRIVER_WIRED=y
> >  
> >  # Driver interface for the Broadcom RoboSwitch family
> >  #CONFIG_DRIVER_ROBOSWITCH=y
> > @@ -163,7 +152,7 @@ CONFIG_EAP_TTLS=y
> >  # functionality needed for EAP-FAST. If EAP-FAST is enabled with OpenSSL,
> >  # the OpenSSL library must be patched (openssl-0.9.8d-tls-extensions.patch)
> >  # to add the needed functions.
> > -#CONFIG_EAP_FAST=y
> > +CONFIG_EAP_FAST=y
> >  
> >  # EAP-GTC
> >  CONFIG_EAP_GTC=y
> > @@ -172,11 +161,14 @@ CONFIG_EAP_GTC=y
> >  CONFIG_EAP_OTP=y
> >  
> >  # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used)
> > -#CONFIG_EAP_SIM=y
> > +CONFIG_EAP_SIM=y
> >  
> >  # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
> >  #CONFIG_EAP_PSK=y
> >  
> > +# EAP-pwd (secure authentication using only a password)
> > +CONFIG_EAP_PWD=y
> > +
> >  # EAP-PAX
> >  #CONFIG_EAP_PAX=y
> >  
> > @@ -208,6 +200,11 @@ CONFIG_EAP_LEAP=y
> >  CONFIG_WPS=y
> >  # Enable WSC 2.0 support
> >  CONFIG_WPS2=y
> > +# Enable WPS external registrar functionality
> > +#CONFIG_WPS_ER=y
> > +# Disable credentials for an open network by default when acting as a WPS
> > +# registrar.
> > +#CONFIG_WPS_REG_DISABLE_OPEN=y
> >  
> >  # EAP-IKEv2
> >  #CONFIG_EAP_IKEV2=y
> > @@ -224,7 +221,10 @@ CONFIG_SMARTCARD=y
> >  # Enable this if EAP-SIM or EAP-AKA is included
> >  #CONFIG_PCSC=y
> >  
> > -# Development testingBG
> > +# Support HT overrides (disable HT/HT40, mask MCS rates, etc.)
> > +#CONFIG_HT_OVERRIDES=y
> > +
> > +# Development testing
> >  #CONFIG_EAPOL_TEST=y
> >  
> >  # Select control interface backend for external programs, e.g, wpa_cli:
> > @@ -242,6 +242,10 @@ CONFIG_CTRL_IFACE=y
> >  # the resulting binary.
> >  #CONFIG_READLINE=y
> >  
> > +# Include internal line edit mode in wpa_cli. This can be used as a replacement
> > +# for GNU Readline to provide limited command line editing and history support.
> > +CONFIG_WPA_CLI_EDIT=y
> > +
> >  # Remove debugging code that is printing out debug message to stdout.
> >  # This can be used to reduce the size of the wpa_supplicant considerably
> >  # if debugging code is not needed. The size reduction can be around 35%
> > @@ -295,13 +299,16 @@ CONFIG_BACKEND=file
> >  # unix = UNIX/POSIX like systems (default)
> >  # win32 = Windows systems
> >  # none = Empty template
> > -#CONFIG_OS=unix
> > +CONFIG_OS=unix
> >  
> >  # Select event loop implementation
> >  # eloop = select() loop (default)
> >  # eloop_win = Windows events and WaitForMultipleObject() loop
> >  # eloop_none = Empty template
> > -#CONFIG_ELOOP=eloop
> > +CONFIG_ELOOP=eloop
> > +
> > +# Should we use poll instead of select? Select is used by default.
> > +#CONFIG_ELOOP_POLL=y
> >  
> >  # Select layer 2 packet implementation
> >  # linux = Linux packet socket (default)
> > @@ -310,7 +317,7 @@ CONFIG_BACKEND=file
> >  # winpcap = WinPcap with receive thread
> >  # ndis = Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y)
> >  # none = Empty template
> > -#CONFIG_L2_PACKET=linux
> > +CONFIG_L2_PACKET=linux
> >  
> >  # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
> >  CONFIG_PEERKEY=y
> > @@ -323,18 +330,24 @@ CONFIG_PEERKEY=y
> >  
> >  # Select TLS implementation
> >  # openssl = OpenSSL (default)
> > -# gnutls = GnuTLS (needed for TLS/IA, see also CONFIG_GNUTLS_EXTRA)
> > +# gnutls = GnuTLS
> >  # internal = Internal TLSv1 implementation (experimental)
> >  # none = Empty template
> >  #CONFIG_TLS=openssl
> >  
> > -# Whether to enable TLS/IA support, which is required for EAP-TTLSv1.
> > -# You need CONFIG_TLS=gnutls for this to have any effect. Please note that
> > -# even though the core GnuTLS library is released under LGPL, this extra
> > -# library uses GPL and as such, the terms of GPL apply to the combination
> > -# of wpa_supplicant and GnuTLS if this option is enabled. BSD license may not
> > -# apply for distribution of the resulting binary.
> > -#CONFIG_GNUTLS_EXTRA=y
> > +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.1)
> > +# can be enabled to get a stronger construction of messages when block ciphers
> > +# are used. It should be noted that some existing TLS v1.0 -based
> > +# implementation may not be compatible with TLS v1.1 message (ClientHello is
> > +# sent prior to negotiating which version will be used)
> > +#CONFIG_TLSV11=y
> > +
> > +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS (v1.2)
> > +# can be enabled to enable use of stronger crypto algorithms. It should be
> > +# noted that some existing TLS v1.0 -based implementation may not be compatible
> > +# with TLS v1.2 message (ClientHello is sent prior to negotiating which version
> > +# will be used)
> > +#CONFIG_TLSV12=y
> >  
> >  # If CONFIG_TLS=internal is used, additional library and include paths are
> >  # needed for LibTomMath. Alternatively, an integrated, minimal version of
> > @@ -360,14 +373,14 @@ CONFIG_PEERKEY=y
> >  
> >  # Add support for old DBus control interface
> >  # (fi.epitest.hostap.WPASupplicant)
> > -CONFIG_CTRL_IFACE_DBUS=y
> > +#CONFIG_CTRL_IFACE_DBUS=y
> >  
> >  # Add support for new DBus control interface
> >  # (fi.w1.hostap.wpa_supplicant1)
> > -CONFIG_CTRL_IFACE_DBUS_NEW=y
> > +#CONFIG_CTRL_IFACE_DBUS_NEW=y
> >  
> >  # Add introspection support for new DBus control interface
> > -CONFIG_CTRL_IFACE_DBUS_INTRO=y
> > +#CONFIG_CTRL_IFACE_DBUS_INTRO=y
> >  
> >  # Add support for loading EAP methods dynamically as shared libraries.
> >  # When this option is enabled, each EAP method can be either included
> > @@ -394,7 +407,22 @@ CONFIG_CTRL_IFACE_DBUS_INTRO=y
> >  #CONFIG_IEEE80211R=y
> >  
> >  # Add support for writing debug log to a file (/tmp/wpa_supplicant-log-#.txt)
> > -CONFIG_DEBUG_FILE=y
> > +#CONFIG_DEBUG_FILE=y
> > +
> > +# Send debug messages to syslog instead of stdout
> > +#CONFIG_DEBUG_SYSLOG=y
> > +# Set syslog facility for debug messages
> > +#CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON
> > +
> > +# Add support for sending all debug messages (regardless of debug verbosity)
> > +# to the Linux kernel tracing facility. This helps debug the entire stack by
> > +# making it easy to record everything happening from the driver up into the
> > +# same file, e.g., using trace-cmd.
> > +#CONFIG_DEBUG_LINUX_TRACING=y
> > +
> > +# Add support for writing debug log to Android logcat instead of standard
> > +# output
> > +CONFIG_ANDROID_LOG=y
> >  
> >  # Enable privilege separation (see README 'Privilege separation' for details)
> >  #CONFIG_PRIVSEP=y
> > @@ -407,7 +435,7 @@ CONFIG_DEBUG_FILE=y
> >  # This tracks use of memory allocations and other registrations and reports
> >  # incorrect use with a backtrace of call (or allocation) location.
> >  #CONFIG_WPA_TRACE=y
> > -# For BSD, comment out these.
> > +# For BSD, uncomment these.
> >  #LIBS += -lexecinfo
> >  #LIBS_p += -lexecinfo
> >  #LIBS_c += -lexecinfo
> > @@ -416,15 +444,63 @@ CONFIG_DEBUG_FILE=y
> >  # This enables use of libbfd to get more detailed symbols for the backtraces
> >  # generated by CONFIG_WPA_TRACE=y.
> >  #CONFIG_WPA_TRACE_BFD=y
> > -# For BSD, comment out these.
> > +# For BSD, uncomment these.
> >  #LIBS += -lbfd -liberty -lz
> >  #LIBS_p += -lbfd -liberty -lz
> >  #LIBS_c += -lbfd -liberty -lz
> >  
> > -# for p2p
> > +# wpa_supplicant depends on strong random number generation being available
> > +# from the operating system. os_get_random() function is used to fetch random
> > +# data when needed, e.g., for key generation. On Linux and BSD systems, this
> > +# works by reading /dev/urandom. It should be noted that the OS entropy pool
> > +# needs to be properly initialized before wpa_supplicant is started. This is
> > +# important especially on embedded devices that do not have a hardware random
> > +# number generator and may by default start up with minimal entropy available
> > +# for random number generation.
> > +#
> > +# As a safety net, wpa_supplicant is by default trying to internally collect
> > +# additional entropy for generating random data to mix in with the data fetched
> > +# from the OS. This by itself is not considered to be very strong, but it may
> > +# help in cases where the system pool is not initialized properly. However, it
> > +# is very strongly recommended that the system pool is initialized with enough
> > +# entropy either by using hardware assisted random number generator or by
> > +# storing state over device reboots.
> > +#
> > +# wpa_supplicant can be configured to maintain its own entropy store over
> > +# restarts to enhance random number generation. This is not perfect, but it is
> > +# much more secure than using the same sequence of random numbers after every
> > +# reboot. This can be enabled with -e<entropy file> command line option. The
> > +# specified file needs to be readable and writable by wpa_supplicant.
> > +#
> > +# If the os_get_random() is known to provide strong random data (e.g., on
> > +# Linux/BSD, the board in question is known to have reliable source of random
> > +# data from /dev/urandom), the internal wpa_supplicant random pool can be
> > +# disabled. This will save some in binary size and CPU use. However, this
> > +# should only be considered for builds that are known to be used on devices
> > +# that meet the requirements described above.
> > +#CONFIG_NO_RANDOM_POOL=y
> > +
> > +# IEEE 802.11n (High Throughput) support (mainly for AP mode)
> > +CONFIG_IEEE80211N=y
> > +
> > +# Interworking (IEEE 802.11u)
> > +# This can be used to enable functionality to improve interworking with
> > +# external networks (GAS/ANQP to learn more about the networks and network
> > +# selection based on available credentials).
> > +CONFIG_INTERWORKING=y
> > +
> > +# Hotspot 2.0
> > +CONFIG_HS20=y
> > +
> > +# Disable roaming in wpa_supplicant
> > +#CONFIG_NO_ROAMING=y
> > +
> > +# Enable P2P
> >  CONFIG_P2P=y
> >  CONFIG_AP=y
> >  
> > -# IEEE 802.11n (High Throughput) support
> > -CONFIG_IEEE80211N=y
> > +# bgscan
> > +NEED_BGSCAN=y
> > +CONFIG_BGSCAN_LEARN=y
> > +CONFIG_BGSCAN_SIMPLE=y
> >  
> > diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> > similarity index 88%
> > rename from meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
> > rename to meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> > index f6c4f70..ec7a0c7 100644
> > --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
> > +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> > @@ -10,9 +10,9 @@ LIC_FILES_CHKSUM = "file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e \
> >  
> >  FILESEXTRAPATHS_append := "${THISDIR}/wpa-supplicant:"
> >  
> > -# Tag: ol_r8.a6.01
> > -SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
> > -PR = "r2+gitr${SRCPV}"
> > +# Tag: ol_r8.a8.08
> > +SRCREV = "257ab333aad993b4be81808524bc0d939c276058"
> > +PR_append = "a+gitr${SRCPV}"
> >  
> >  # Add ti to the PV to indicate that this is a TI modify version of wpa-supplicant.
> >  PV = "2.0-devel-ti"
> > diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
> > index 2d8970f..9678b1b 100644
> > --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
> > +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant.inc
> > @@ -21,6 +21,7 @@ SRC_URI = "git://github.com/TI-OpenLink/hostap.git;protocol=git \
> >             file://defaults-sane \
> >             file://wpa-supplicant.sh \
> >             file://wpa_supplicant.conf \
> > +           file://p2p_supplicant.conf \
> >             file://wpa_supplicant.conf-sane \
> >             file://99_wpa_supplicant \
> >             file://wpa_supplicant.conf \
> > @@ -55,6 +56,7 @@ do_install () {
> >  	install -d ${D}${sysconfdir}/default
> >  	install -m 600 ${WORKDIR}/defaults-sane ${D}${sysconfdir}/default/wpa
> >  	install -m 600 ${WORKDIR}/wpa_supplicant.conf-sane ${D}${sysconfdir}/wpa_supplicant.conf
> > +	install -m 600 ${WORKDIR}/p2p_supplicant.conf ${D}${sysconfdir}/p2p_supplicant.conf
> >  
> >  	if grep -q ^CONFIG_CTRL_IFACE_DBUS=y .config || grep -q ^CONFIG_CTRL_IFACE_DBUS_NEW=y .config; then
> >  		install -d ${D}/${sysconfdir}/dbus-1/system.d
> > @@ -104,6 +106,7 @@ pkg_postinst_wpa-supplicant () {
> >  do_configure () {
> >  	install -m 0755 ${WORKDIR}/defconfig .config
> >  	echo "CFLAGS += -I${STAGING_INCDIR}" >> .config
> > +	echo "CFLAGS += -I${STAGING_INCDIR}/libnl3/" >> .config
> >  	echo "LIBS += -L${STAGING_LIBDIR}" >> .config
> >  	echo "LIBS_p += -L${STAGING_LIBDIR}" >> .config
> >  	if [ "${@base_contains('COMBINED_FEATURES', 'madwifi', 1, 0, d)}" = "1" ]; then
> > diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> > new file mode 100755
> > index 0000000..2de8730
> > --- /dev/null
> > +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> > @@ -0,0 +1,14 @@
> > +ctrl_interface=/var/run/wpa_supplicant
> > +update_config=0
> > +device_name=TI-SITARA-P2P
> > +device_type=1-0050F204-1
> > +config_methods=virtual_push_button physical_display keypad
> > +p2p_go_intent=0
> > +country=US
> > +##p2p_pref_chan=115:36 115:40
> > +driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
> > +p2p_go_max_inactivity=60
> > +p2p_go_ht40=1
> > +p2p_multi_chan=1
> > +disassoc_low_ack=1
> > +concurrent_sched_scan=1
> > diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> > index f0c993d..f144a38 100644
> > --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> > +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> > @@ -1,19 +1,4 @@
> > -##### Example wpa_supplicant configuration file ###############################
> > -#
> > -# This file describes configuration file format and lists all available option.
> > -# Please also take a look at simpler configuration examples in 'examples'
> > -# subdirectory.
> > -#
> > -# Empty lines and lines starting with # are ignored
> > -
> > -# NOTE! This file may contain password information and should probably be made
> > -# readable only by root user on multiuser systems.
> > -
> > -# Note: All file paths in this configuration file should use full (absolute,
> > -# not relative to working directory) path in order to allow working directory
> > -# to be changed. This can happen if wpa_supplicant is run in the background.
> > -
> > -# Whether to allow wpa_supplicant to update (overwrite) configuration
> > +##### wpa_supplicant configuration file template #####
> >  #
> >  # This option can be used to allow wpa_supplicant to overwrite configuration
> >  # file whenever configuration is changed (e.g., new network block is added with
> > @@ -21,59 +6,8 @@
> >  # wpa_cli/wpa_gui to be able to store the configuration changes permanently.
> >  # Please note that overwriting configuration file will remove the comments from
> >  # it.
> > -#update_config=1
> > -
> > -# global configuration (shared by all network blocks)
> > -#
> > -# Parameters for the control interface. If this is specified, wpa_supplicant
> > -# will open a control interface that is available for external programs to
> > -# manage wpa_supplicant. The meaning of this string depends on which control
> > -# interface mechanism is used. For all cases, the existance of this parameter
> > -# in configuration is used to determine whether the control interface is
> > -# enabled.
> > -#
> > -# For UNIX domain sockets (default on Linux and BSD): This is a directory that
> > -# will be created for UNIX domain sockets for listening to requests from
> > -# external programs (CLI/GUI, etc.) for status information and configuration.
> > -# The socket file will be named based on the interface name, so multiple
> > -# wpa_supplicant processes can be run at the same time if more than one
> > -# interface is used.
> > -# /var/run/wpa_supplicant is the recommended directory for sockets and by
> > -# default, wpa_cli will use it when trying to connect with wpa_supplicant.
> > -#
> > -# Access control for the control interface can be configured by setting the
> > -# directory to allow only members of a group to use sockets. This way, it is
> > -# possible to run wpa_supplicant as root (since it needs to change network
> > -# configuration and open raw sockets) and still allow GUI/CLI components to be
> > -# run as non-root users. However, since the control interface can be used to
> > -# change the network configuration, this access needs to be protected in many
> > -# cases. By default, wpa_supplicant is configured to use gid 0 (root). If you
> > -# want to allow non-root users to use the control interface, add a new group
> > -# and change this value to match with that group. Add users that should have
> > -# control interface access to this group. If this variable is commented out or
> > -# not included in the configuration file, group will not be changed from the
> > -# value it got by default when the directory or socket was created.
> > -#
> > -# When configuring both the directory and group, use following format:
> > -# DIR=/var/run/wpa_supplicant GROUP=wheel
> > -# DIR=/var/run/wpa_supplicant GROUP=0
> > -# (group can be either group name or gid)
> > -#
> > -# For UDP connections (default on Windows): The value will be ignored. This
> > -# variable is just used to select that the control interface is to be created.
> > -# The value can be set to, e.g., udp (ctrl_interface=udp)
> > -#
> > -# For Windows Named Pipe: This value can be used to set the security descriptor
> > -# for controlling access to the control interface. Security descriptor can be
> > -# set using Security Descriptor String Format (see http://msdn.microsoft.com/
> > -# library/default.asp?url=/library/en-us/secauthz/security/
> > -# security_descriptor_string_format.asp). The descriptor string needs to be
> > -# prefixed with SDDL=. For example, ctrl_interface=SDDL=D: would set an empty
> > -# DACL (which will reject all connections). See README-Windows.txt for more
> > -# information about SDDL string format.
> > -#
> > +update_config=1
> >  ctrl_interface=/var/run/wpa_supplicant
> > -
> >  # IEEE 802.1X/EAPOL version
> >  # wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines
> >  # EAPOL version 2. However, there are many APs that do not handle the new
> > @@ -82,14 +16,15 @@ ctrl_interface=/var/run/wpa_supplicant
> >  # to 1 by default. This configuration value can be used to set it to the new
> >  # version (2).
> >  eapol_version=1
> > -
> >  # AP scanning/selection
> >  # By default, wpa_supplicant requests driver to perform AP scanning and then
> >  # uses the scan results to select a suitable AP. Another alternative is to
> >  # allow the driver to take care of AP scanning and selection and use
> >  # wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association
> >  # information from the driver.
> > -# 1: wpa_supplicant initiates scanning and AP selection
> > +# 1: wpa_supplicant initiates scanning and AP selection; if no APs matching to
> > +#    the currently enabled networks are found, a new network (IBSS or AP mode
> > +#    operation) may be initialized (if configured) (default)
> >  # 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
> >  #    parameters (e.g., WPA IE generation); this mode can also be used with
> >  #    non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
> > @@ -102,589 +37,28 @@ eapol_version=1
> >  #    the driver reports successful association; each network block should have
> >  #    explicit security policy (i.e., only one option in the lists) for
> >  #    key_mgmt, pairwise, group, proto variables
> > +# When using IBSS or AP mode, ap_scan=2 mode can force the new network to be
> > +# created immediately regardless of scan results. ap_scan=1 mode will first try
> > +# to scan for existing networks and only if no matches with the enabled
> > +# networks are found, a new IBSS or AP mode network is created.
> >  ap_scan=1
> > -
> >  # EAP fast re-authentication
> >  # By default, fast re-authentication is enabled for all EAP methods that
> >  # support it. This variable can be used to disable fast re-authentication.
> >  # Normally, there is no need to disable this.
> >  fast_reauth=1
> > -
> > -# OpenSSL Engine support
> > -# These options can be used to load OpenSSL engines.
> > -# The two engines that are supported currently are shown below:
> > -# They are both from the opensc project (http://www.opensc.org/)
> > -# By default no engines are loaded.
> > -# make the opensc engine available
> > -#opensc_engine_path=/usr/lib/opensc/engine_opensc.so
> > -# make the pkcs11 engine available
> > -#pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
> > -# configure the path to the pkcs11 module required by the pkcs11 engine
> > -#pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
> > -
> > -# Dynamic EAP methods
> > -# If EAP methods were built dynamically as shared object files, they need to be
> > -# loaded here before being used in the network blocks. By default, EAP methods
> > -# are included statically in the build, so these lines are not needed
> > -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_tls.so
> > -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_md5.so
> > -
> > -# Driver interface parameters
> > -# This field can be used to configure arbitrary driver interace parameters. The
> > -# format is specific to the selected driver interface. This field is not used
> > -# in most cases.
> > -#driver_param="field=value"
> > -
> > -# Maximum lifetime for PMKSA in seconds; default 43200
> > -#dot11RSNAConfigPMKLifetime=43200
> > -# Threshold for reauthentication (percentage of PMK lifetime); default 70
> > -#dot11RSNAConfigPMKReauthThreshold=70
> > -# Timeout for security association negotiation in seconds; default 60
> > -#dot11RSNAConfigSATimeout=60
> > -
> > -# network block
> > -#
> > -# Each network (usually AP's sharing the same SSID) is configured as a separate
> > -# block in this configuration file. The network blocks are in preference order
> > -# (the first match is used).
> > -#
> > -# network block fields:
> > -#
> > -# disabled:
> > -#	0 = this network can be used (default)
> > -#	1 = this network block is disabled (can be enabled through ctrl_iface,
> > -#	    e.g., with wpa_cli or wpa_gui)
> > -#
> > -# id_str: Network identifier string for external scripts. This value is passed
> > -#	to external action script through wpa_cli as WPA_ID_STR environment
> > -#	variable to make it easier to do network specific configuration.
> > -#
> > -# ssid: SSID (mandatory); either as an ASCII string with double quotation or
> > -#	as hex string; network name
> > -#
> > -# scan_ssid:
> > -#	0 = do not scan this SSID with specific Probe Request frames (default)
> > -#	1 = scan with SSID-specific Probe Request frames (this can be used to
> > -#	    find APs that do not accept broadcast SSID or use multiple SSIDs;
> > -#	    this will add latency to scanning, so enable this only when needed)
> > -#
> > -# bssid: BSSID (optional); if set, this network block is used only when
> > -#	associating with the AP using the configured BSSID
> > -#
> > -# priority: priority group (integer)
> > -# By default, all networks will get same priority group (0). If some of the
> > -# networks are more desirable, this field can be used to change the order in
> > -# which wpa_supplicant goes through the networks when selecting a BSS. The
> > -# priority groups will be iterated in decreasing priority (i.e., the larger the
> > -# priority value, the sooner the network is matched against the scan results).
> > -# Within each priority group, networks will be selected based on security
> > -# policy, signal strength, etc.
> > -# Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not
> > -# using this priority to select the order for scanning. Instead, they try the
> > -# networks in the order that used in the configuration file.
> > -#
> > -# mode: IEEE 802.11 operation mode
> > -# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default)
> > -# 1 = IBSS (ad-hoc, peer-to-peer)
> > -# Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP)
> > -# and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
> > -# to be set to 2 for IBSS. WPA-None requires following network block options:
> > -# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
> > -# both), and psk must also be set.
> > -#
> > -# proto: list of accepted protocols
> > -# WPA = WPA/IEEE 802.11i/D3.0
> > -# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
> > -# If not set, this defaults to: WPA RSN
> > -#
> > -# key_mgmt: list of accepted authenticated key management protocols
> > -# WPA-PSK = WPA pre-shared key (this requires 'psk' field)
> > -# WPA-EAP = WPA using EAP authentication (this can use an external
> > -#	program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
> > -# IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
> > -#	generated WEP keys
> > -# NONE = WPA is not used; plaintext or static WEP could be used
> > -# If not set, this defaults to: WPA-PSK WPA-EAP
> > -#
> > -# auth_alg: list of allowed IEEE 802.11 authentication algorithms
> > -# OPEN = Open System authentication (required for WPA/WPA2)
> > -# SHARED = Shared Key authentication (requires static WEP keys)
> > -# LEAP = LEAP/Network EAP (only used with LEAP)
> > -# If not set, automatic selection is used (Open System with LEAP enabled if
> > -# LEAP is allowed as one of the EAP methods).
> > -#
> > -# pairwise: list of accepted pairwise (unicast) ciphers for WPA
> > -# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
> > -# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
> > -# NONE = Use only Group Keys (deprecated, should not be included if APs support
> > -#	pairwise keys)
> > -# If not set, this defaults to: CCMP TKIP
> > -#
> > -# group: list of accepted group (broadcast/multicast) ciphers for WPA
> > -# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
> > -# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
> > -# WEP104 = WEP (Wired Equivalent Privacy) with 104-bit key
> > -# WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE 802.11]
> > -# If not set, this defaults to: CCMP TKIP WEP104 WEP40
> > -#
> > -# psk: WPA preshared key; 256-bit pre-shared key
> > -# The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
> > -# 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
> > -# generated using the passphrase and SSID). ASCII passphrase must be between
> > -# 8 and 63 characters (inclusive).
> > -# This field is not needed, if WPA-EAP is used.
> > -# Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys
> > -# from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
> > -# startup and reconfiguration time can be optimized by generating the PSK only
> > -# only when the passphrase or SSID has actually changed.
> > -#
> > -# eapol_flags: IEEE 802.1X/EAPOL options (bit field)
> > -# Dynamic WEP key required for non-WPA mode
> > -# bit0 (1): require dynamically generated unicast WEP key
> > -# bit1 (2): require dynamically generated broadcast WEP key
> > -# 	(3 = require both keys; default)
> > -# Note: When using wired authentication, eapol_flags must be set to 0 for the
> > -# authentication to be completed successfully.
> > -#
> > -# proactive_key_caching:
> > -# Enable/disable opportunistic PMKSA caching for WPA2.
> > -# 0 = disabled (default)
> > -# 1 = enabled
> > -#
> > -# wep_key0..3: Static WEP key (ASCII in double quotation, e.g. "abcde" or
> > -# hex without quotation, e.g., 0102030405)
> > -# wep_tx_keyidx: Default WEP key index (TX) (0..3)
> > -#
> > -# peerkey: Whether PeerKey negotiation for direct links (IEEE 802.11e DLS) is
> > -# allowed. This is only used with RSN/WPA2.
> > -# 0 = disabled (default)
> > -# 1 = enabled
> > -#peerkey=1
> > -#
> > -# Following fields are only used with internal EAP implementation.
> > -# eap: space-separated list of accepted EAP methods
> > -#	MD5 = EAP-MD5 (unsecure and does not generate keying material ->
> > -#			cannot be used with WPA; to be used as a Phase 2 method
> > -#			with EAP-PEAP or EAP-TTLS)
> > -#       MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
> > -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> > -#       OTP = EAP-OTP (cannot be used separately with WPA; to be used
> > -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> > -#       GTC = EAP-GTC (cannot be used separately with WPA; to be used
> > -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> > -#	TLS = EAP-TLS (client and server certificate)
> > -#	PEAP = EAP-PEAP (with tunnelled EAP authentication)
> > -#	TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
> > -#			 authentication)
> > -#	If not set, all compiled in methods are allowed.
> > -#
> > -# identity: Identity string for EAP
> > -# anonymous_identity: Anonymous identity string for EAP (to be used as the
> > -#	unencrypted identity with EAP types that support different tunnelled
> > -#	identity, e.g., EAP-TTLS)
> > -# password: Password string for EAP
> > -# ca_cert: File path to CA certificate file (PEM/DER). This file can have one
> > -#	or more trusted CA certificates. If ca_cert and ca_path are not
> > -#	included, server certificate will not be verified. This is insecure and
> > -#	a trusted CA certificate should always be configured when using
> > -#	EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
> > -#	change when wpa_supplicant is run in the background.
> > -#	On Windows, trusted CA certificates can be loaded from the system
> > -#	certificate store by setting this to cert_store://<name>, e.g.,
> > -#	ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT".
> > -#	Note that when running wpa_supplicant as an application, the user
> > -#	certificate store (My user account) is used, whereas computer store
> > -#	(Computer account) is used when running wpasvc as a service.
> > -# ca_path: Directory path for CA certificate files (PEM). This path may
> > -#	contain multiple CA certificates in OpenSSL format. Common use for this
> > -#	is to point to system trusted CA list which is often installed into
> > -#	directory like /etc/ssl/certs. If configured, these certificates are
> > -#	added to the list of trusted CAs. ca_cert may also be included in that
> > -#	case, but it is not required.
> > -# client_cert: File path to client certificate file (PEM/DER)
> > -#	Full path should be used since working directory may change when
> > -#	wpa_supplicant is run in the background.
> > -#	Alternatively, a named configuration blob can be used by setting this
> > -#	to blob://<blob name>.
> > -# private_key: File path to client private key file (PEM/DER/PFX)
> > -#	When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
> > -#	commented out. Both the private key and certificate will be read from
> > -#	the PKCS#12 file in this case. Full path should be used since working
> > -#	directory may change when wpa_supplicant is run in the background.
> > -#	Windows certificate store can be used by leaving client_cert out and
> > -#	configuring private_key in one of the following formats:
> > -#	cert://substring_to_match
> > -#	hash://certificate_thumbprint_in_hex
> > -#	for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
> > -#	Note that when running wpa_supplicant as an application, the user
> > -#	certificate store (My user account) is used, whereas computer store
> > -#	(Computer account) is used when running wpasvc as a service.
> > -#	Alternatively, a named configuration blob can be used by setting this
> > -#	to blob://<blob name>.
> > -# private_key_passwd: Password for private key file (if left out, this will be
> > -#	asked through control interface)
> > -# dh_file: File path to DH/DSA parameters file (in PEM format)
> > -#	This is an optional configuration file for setting parameters for an
> > -#	ephemeral DH key exchange. In most cases, the default RSA
> > -#	authentication does not use this configuration. However, it is possible
> > -#	setup RSA to use ephemeral DH key exchange. In addition, ciphers with
> > -#	DSA keys always use ephemeral DH keys. This can be used to achieve
> > -#	forward secrecy. If the file is in DSA parameters format, it will be
> > -#	automatically converted into DH params.
> > -# subject_match: Substring to be matched against the subject of the
> > -#	authentication server certificate. If this string is set, the server
> > -#	sertificate is only accepted if it contains this string in the subject.
> > -#	The subject string is in following format:
> > -#	/C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com
> > -# altsubject_match: Semicolon separated string of entries to be matched against
> > -#	the alternative subject name of the authentication server certificate.
> > -#	If this string is set, the server sertificate is only accepted if it
> > -#	contains one of the entries in an alternative subject name extension.
> > -#	altSubjectName string is in following format: TYPE:VALUE
> > -#	Example: EMAIL:server@example.com
> > -#	Example: DNS:server.example.com;DNS:server2.example.com
> > -#	Following types are supported: EMAIL, DNS, URI
> > -# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
> > -#	(string with field-value pairs, e.g., "peapver=0" or
> > -#	"peapver=1 peaplabel=1")
> > -#	'peapver' can be used to force which PEAP version (0 or 1) is used.
> > -#	'peaplabel=1' can be used to force new label, "client PEAP encryption",
> > -#	to be used during key derivation when PEAPv1 or newer. Most existing
> > -#	PEAPv1 implementation seem to be using the old label, "client EAP
> > -#	encryption", and wpa_supplicant is now using that as the default value.
> > -#	Some servers, e.g., Radiator, may require peaplabel=1 configuration to
> > -#	interoperate with PEAPv1; see eap_testing.txt for more details.
> > -#	'peap_outer_success=0' can be used to terminate PEAP authentication on
> > -#	tunneled EAP-Success. This is required with some RADIUS servers that
> > -#	implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
> > -#	Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode)
> > -#	include_tls_length=1 can be used to force wpa_supplicant to include
> > -#	TLS Message Length field in all TLS messages even if they are not
> > -#	fragmented.
> > -#	sim_min_num_chal=3 can be used to configure EAP-SIM to require three
> > -#	challenges (by default, it accepts 2 or 3)
> > -# phase2: Phase2 (inner authentication with TLS tunnel) parameters
> > -#	(string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
> > -#	"autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
> > -# Following certificate/private key fields are used in inner Phase2
> > -# authentication when using EAP-TTLS or EAP-PEAP.
> > -# ca_cert2: File path to CA certificate file. This file can have one or more
> > -#	trusted CA certificates. If ca_cert2 and ca_path2 are not included,
> > -#	server certificate will not be verified. This is insecure and a trusted
> > -#	CA certificate should always be configured.
> > -# ca_path2: Directory path for CA certificate files (PEM)
> > -# client_cert2: File path to client certificate file
> > -# private_key2: File path to client private key file
> > -# private_key2_passwd: Password for private key file
> > -# dh_file2: File path to DH/DSA parameters file (in PEM format)
> > -# subject_match2: Substring to be matched against the subject of the
> > -#	authentication server certificate.
> > -# altsubject_match2: Substring to be matched against the alternative subject
> > -#	name of the authentication server certificate.
> > -#
> > -# fragment_size: Maximum EAP fragment size in bytes (default 1398).
> > -#	This value limits the fragment size for EAP methods that support
> > -#	fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
> > -#	small enough to make the EAP messages fit in MTU of the network
> > -#	interface used for EAPOL. The default value is suitable for most
> > -#	cases.
> > -#
> > -# EAP-PSK variables:
> > -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
> > -# nai: user NAI
> > -#
> > -# EAP-PAX variables:
> > -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
> > -#
> > -# EAP-SAKE variables:
> > -# eappsk: 32-byte (256-bit, 64 hex digits) pre-shared key in hex format
> > -#	(this is concatenation of Root-Secret-A and Root-Secret-B)
> > -# nai: user NAI (PEERID)
> > -#
> > -# EAP-GPSK variables:
> > -# eappsk: Pre-shared key in hex format (at least 128 bits, i.e., 32 hex digits)
> > -# nai: user NAI (ID_Client)
> > -#
> > -# EAP-FAST variables:
> > -# pac_file: File path for the PAC entries. wpa_supplicant will need to be able
> > -#	to create this file and write updates to it when PAC is being
> > -#	provisioned or refreshed. Full path to the file should be used since
> > -#	working directory may change when wpa_supplicant is run in the
> > -#	background. Alternatively, a named configuration blob can be used by
> > -#	setting this to blob://<blob name>
> > -# phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST
> > -#	credentials (PAC)
> > -#
> > -# wpa_supplicant supports number of "EAP workarounds" to work around
> > -# interoperability issues with incorrectly behaving authentication servers.
> > -# These are enabled by default because some of the issues are present in large
> > -# number of authentication servers. Strict EAP conformance mode can be
> > -# configured by disabling workarounds with eap_workaround=0.
> > -
> > -# Example blocks:
> > -
> > -# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
> > -network={
> > -	ssid="simple"
> > -	psk="very secret passphrase"
> > -	priority=5
> > -}
> > -
> > -# Same as previous, but request SSID-specific scanning (for APs that reject
> > -# broadcast SSID)
> > -network={
> > -	ssid="second ssid"
> > -	scan_ssid=1
> > -	psk="very secret passphrase"
> > -	priority=2
> > -}
> > -
> > -# Only WPA-PSK is used. Any valid cipher combination is accepted.
> > -network={
> > -	ssid="example"
> > -	proto=WPA
> > -	key_mgmt=WPA-PSK
> > -	pairwise=CCMP TKIP
> > -	group=CCMP TKIP WEP104 WEP40
> > -	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
> > -	priority=2
> > -}
> > -
> > -# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
> > -# or WEP40 as the group cipher will not be accepted.
> > -network={
> > -	ssid="example"
> > -	proto=RSN
> > -	key_mgmt=WPA-EAP
> > -	pairwise=CCMP TKIP
> > -	group=CCMP TKIP
> > -	eap=TLS
> > -	identity="user@example.com"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	client_cert="/etc/cert/user.pem"
> > -	private_key="/etc/cert/user.prv"
> > -	private_key_passwd="password"
> > -	priority=1
> > -}
> > -
> > -# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
> > -# (e.g., Radiator)
> > -network={
> > -	ssid="example"
> > -	key_mgmt=WPA-EAP
> > -	eap=PEAP
> > -	identity="user@example.com"
> > -	password="foobar"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	phase1="peaplabel=1"
> > -	phase2="auth=MSCHAPV2"
> > -	priority=10
> > -}
> > -
> > -# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
> > -# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
> > -network={
> > -	ssid="example"
> > -	key_mgmt=WPA-EAP
> > -	eap=TTLS
> > -	identity="user@example.com"
> > -	anonymous_identity="anonymous@example.com"
> > -	password="foobar"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	priority=2
> > -}
> > -
> > -# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
> > -# use. Real identity is sent only within an encrypted TLS tunnel.
> > -network={
> > -	ssid="example"
> > -	key_mgmt=WPA-EAP
> > -	eap=TTLS
> > -	identity="user@example.com"
> > -	anonymous_identity="anonymous@example.com"
> > -	password="foobar"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	phase2="auth=MSCHAPV2"
> > -}
> > -
> > -# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
> > -# authentication.
> > -network={
> > -	ssid="example"
> > -	key_mgmt=WPA-EAP
> > -	eap=TTLS
> > -	# Phase1 / outer authentication
> > -	anonymous_identity="anonymous@example.com"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	# Phase 2 / inner authentication
> > -	phase2="autheap=TLS"
> > -	ca_cert2="/etc/cert/ca2.pem"
> > -	client_cert2="/etc/cer/user.pem"
> > -	private_key2="/etc/cer/user.prv"
> > -	private_key2_passwd="password"
> > -	priority=2
> > -}
> > -
> > -# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
> > -# group cipher.
> > -network={
> > -	ssid="example"
> > -	bssid=00:11:22:33:44:55
> > -	proto=WPA RSN
> > -	key_mgmt=WPA-PSK WPA-EAP
> > -	pairwise=CCMP
> > -	group=CCMP
> > -	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
> > -}
> > -
> > -# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
> > -# and all valid ciphers.
> > -network={
> > -	ssid=00010203
> > -	psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
> > -}
> > -
> > -
> > -# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using
> > -# EAP-TLS for authentication and key generation; require both unicast and
> > -# broadcast WEP keys.
> > -network={
> > -	ssid="1x-test"
> > -	key_mgmt=IEEE8021X
> > -	eap=TLS
> > -	identity="user@example.com"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	client_cert="/etc/cert/user.pem"
> > -	private_key="/etc/cert/user.prv"
> > -	private_key_passwd="password"
> > -	eapol_flags=3
> > -}
> > -
> > -
> > -# LEAP with dynamic WEP keys
> > -network={
> > -	ssid="leap-example"
> > -	key_mgmt=IEEE8021X
> > -	eap=LEAP
> > -	identity="user"
> > -	password="foobar"
> > -}
> > -
> > -# Plaintext connection (no WPA, no IEEE 802.1X)
> > -network={
> > -	ssid="plaintext-test"
> > -	key_mgmt=NONE
> > -}
> > -
> > -
> > -# Shared WEP key connection (no WPA, no IEEE 802.1X)
> > -network={
> > -	ssid="static-wep-test"
> > -	key_mgmt=NONE
> > -	wep_key0="abcde"
> > -	wep_key1=0102030405
> > -	wep_key2="1234567890123"
> > -	wep_tx_keyidx=0
> > -	priority=5
> > -}
> > -
> > -
> > -# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key
> > -# IEEE 802.11 authentication
> > -network={
> > -	ssid="static-wep-test2"
> > -	key_mgmt=NONE
> > -	wep_key0="abcde"
> > -	wep_key1=0102030405
> > -	wep_key2="1234567890123"
> > -	wep_tx_keyidx=0
> > -	priority=5
> > -	auth_alg=SHARED
> > -}
> > -
> > -
> > -# IBSS/ad-hoc network with WPA-None/TKIP.
> > -network={
> > -	ssid="test adhoc"
> > -	mode=1
> > -	proto=WPA
> > -	key_mgmt=WPA-NONE
> > -	pairwise=NONE
> > -	group=TKIP
> > -	psk="secret passphrase"
> > -}
> > -
> > -
> > -# Catch all example that allows more or less all configuration modes
> > -network={
> > -	ssid="example"
> > -	scan_ssid=1
> > -	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
> > -	pairwise=CCMP TKIP
> > -	group=CCMP TKIP WEP104 WEP40
> > -	psk="very secret passphrase"
> > -	eap=TTLS PEAP TLS
> > -	identity="user@example.com"
> > -	password="foobar"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	client_cert="/etc/cert/user.pem"
> > -	private_key="/etc/cert/user.prv"
> > -	private_key_passwd="password"
> > -	phase1="peaplabel=0"
> > -}
> > -
> > -# Example of EAP-TLS with smartcard (openssl engine)
> > -network={
> > -	ssid="example"
> > -	key_mgmt=WPA-EAP
> > -	eap=TLS
> > -	proto=RSN
> > -	pairwise=CCMP TKIP
> > -	group=CCMP TKIP
> > -	identity="user@example.com"
> > -	ca_cert="/etc/cert/ca.pem"
> > -	client_cert="/etc/cert/user.pem"
> > -
> > -	engine=1
> > -
> > -	# The engine configured here must be available. Look at
> > -	# OpenSSL engine support in the global section.
> > -	# The key available through the engine must be the private key
> > -	# matching the client certificate configured above.
> > -
> > -	# use the opensc engine
> > -	#engine_id="opensc"
> > -	#key_id="45"
> > -
> > -	# use the pkcs11 engine
> > -	engine_id="pkcs11"
> > -	key_id="id_45"
> > -
> > -	# Optional PIN configuration; this can be left out and PIN will be
> > -	# asked through the control interface
> > -	pin="1234"
> > -}
> > -
> > -# Example configuration showing how to use an inlined blob as a CA certificate
> > -# data instead of using external file
> > -network={
> > -	ssid="example"
> > -	key_mgmt=WPA-EAP
> > -	eap=TTLS
> > -	identity="user@example.com"
> > -	anonymous_identity="anonymous@example.com"
> > -	password="foobar"
> > -	ca_cert="blob://exampleblob"
> > -	priority=20
> > -}
> > -
> > -blob-base64-exampleblob={
> > -SGVsbG8gV29ybGQhCg==
> > -}
> > -
> > -
> > -# Wildcard match for SSID (plaintext APs only). This example select any
> > -# open AP regardless of its SSID.
> > -network={
> > -	key_mgmt=NONE
> > -}
> > +device_name=Blaze
> > +manufacturer=TI
> > +model_name=Wilink
> > +model_number=wl18xx
> > +serial_number=12345
> > +driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
> > +# Timeout in seconds to detect STA inactivity (default: 300 seconds)
> > +#
> > +# This timeout value is used in P2P GO mode to clean up
> > +# inactive stations.
> > +p2p_go_max_inactivity=60
> > +p2p_go_ht40=1
> > +p2p_multi_chan=1
> > +disassoc_low_ack=1
> > +concurrent_sched_scan=1
> > -- 
> > 1.7.9
> > 
> > _______________________________________________
> > meta-arago mailing list
> > meta-arago@arago-project.org
> > http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago
> 


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
                   ` (7 preceding siblings ...)
  2013-12-09  5:46 ` [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Denys Dmytriyenko
@ 2014-01-14 13:28 ` Cooper Jr., Franklin
  8 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to
> ol_r8.a8.08 version.
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Build wpa-supplicant from TI_Openlink ol_r8.a8.08
> - Add missing includes for building with libnl3.
> - Adjusted configuration files, and added p2p conf.
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
> This set of patches should allow integration of WiLink-8 into meta-arago.
> It should replace the set of 14 patches previously submitted for review.
> 
> 
> Note :
> Wilink-6 is currently not supported with the latest meta-arago builds.
> ECS have decided not to support Wilink-6 in the core SDK also in the future.
> Therefore any Wilink-6 broken recipes should not be a concern, as we will clean
> them up on a different set of patches.
> 
> wifi-direct-demo, battleship, wpa-gui-e applications will shortly be removed as
> well.
> 
> Yaniv
> 
>  .../wpa-supplicant/wpa-supplicant-wl18xx/defconfig |  164 ++++--
>  ....a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} |    6 +-
>  .../wpa-supplicant/wpa-supplicant.inc              |    3 +
>  .../wpa-supplicant/p2p_supplicant.conf             |   14 +
>  .../wpa-supplicant/wpa_supplicant.conf             |  674 +-------------------
>  5 files changed, 164 insertions(+), 697 deletions(-)  rename meta-arago-
> extras/recipes-connectivity/wpa-supplicant/{wpa-supplicant-
> wl18xx_r8.a6.01.bb => wpa-supplicant-wl18xx_r8.a8.08.bb} (88%)  create
> mode 100755 meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant/p2p_supplicant.conf
> 
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant-wl18xx/defconfig b/meta-arago-extras/recipes-connectivity/wpa-
> supplicant/wpa-supplicant-wl18xx/defconfig
> index b982e2a..f357b79 100755
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-
> wl18xx/defconfig
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplica
> +++ nt-wl18xx/defconfig
> @@ -39,18 +39,6 @@
>  #LIBS = -lssl
> 
> #############################################################
> ##################
> 
> -#CC=$(CROSS_COMPILE)gcc
> -#CFLAGS += -DCONFIG_LIBNL20
> -#CPPFLAGS += -DCONFIG_LIBNL20
> -#LIBS += -L$(NFSROOT)/lib -lnl
> -#LIBS_p += -L$(NFSROOT)/lib
> -#LIBDIR = $(NFSROOT)/lib
> -#BINDIR = $(NFSROOT)/usr/sbin
> -
> -CONFIG_WAPI=y
> -CONFIG_LIBNL20=y
> -NEED_BGSCAN=y
> -CONFIG_BGSCAN_LEARN=y
> 
>  # Driver interface for Host AP driver
>  #CONFIG_DRIVER_HOSTAP=y
> @@ -75,7 +63,7 @@ CONFIG_BGSCAN_LEARN=y
>  #CONFIG_DRIVER_ATMEL=y
> 
>  # Driver interface for old Broadcom driver -# Please note that the newer
> Broadcom driver ("hybrid Linux driver") supportsBG
> +# Please note that the newer Broadcom driver ("hybrid Linux driver")
> +supports
>  # Linux wireless extensions and does not need (or even work) with the old  #
> driver wrapper. Use CONFIG_DRIVER_WEXT=y with that driver.
>  #CONFIG_DRIVER_BROADCOM=y
> @@ -90,16 +78,22 @@ CONFIG_BGSCAN_LEARN=y
> #CONFIG_DRIVER_RALINK=y
> 
>  # Driver interface for generic Linux wireless extensions -
> CONFIG_DRIVER_WEXT=y
> +# Note: WEXT is deprecated in the current Linux kernel version and no
> +new # functionality is added to it. nl80211-based interface is the new
> +# replacement for WEXT and its use allows wpa_supplicant to properly
> +control # the driver to improve existing functionality like roaming and
> +to support new # functionality.
> +#CONFIG_DRIVER_WEXT=y
> 
>  # Driver interface for Linux drivers using the nl80211 kernel interface
> CONFIG_DRIVER_NL80211=y
> +CONFIG_LIBNL32=y
> 
>  # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
> #CONFIG_DRIVER_BSD=y  #CFLAGS += -I/usr/local/include  #LIBS += -
> L/usr/local/lib -#LIBS_p += -L/usr/local/libBG
> +#LIBS_p += -L/usr/local/lib
>  #LIBS_c += -L/usr/local/lib
> 
>  # Driver interface for Windows NDIS
> @@ -121,13 +115,8 @@ CONFIG_DRIVER_NL80211=y  # Driver interface for
> development testing  #CONFIG_DRIVER_TEST=y
> 
> -# Include client MLME (management frame processing) for test driver -# This
> can be used to test MLME operations in hostapd with the test interface.
> -# space.
> -#CONFIG_CLIENT_MLME=y
> -
>  # Driver interface for wired Ethernet drivers -CONFIG_DRIVER_WIRED=y
> +#CONFIG_DRIVER_WIRED=y
> 
>  # Driver interface for the Broadcom RoboSwitch family
> #CONFIG_DRIVER_ROBOSWITCH=y @@ -163,7 +152,7 @@
> CONFIG_EAP_TTLS=y  # functionality needed for EAP-FAST. If EAP-FAST is
> enabled with OpenSSL,  # the OpenSSL library must be patched (openssl-0.9.8d-
> tls-extensions.patch)
>  # to add the needed functions.
> -#CONFIG_EAP_FAST=y
> +CONFIG_EAP_FAST=y
> 
>  # EAP-GTC
>  CONFIG_EAP_GTC=y
> @@ -172,11 +161,14 @@ CONFIG_EAP_GTC=y
>  CONFIG_EAP_OTP=y
> 
>  # EAP-SIM (enable CONFIG_PCSC, if EAP-SIM is used) -#CONFIG_EAP_SIM=y
> +CONFIG_EAP_SIM=y
> 
>  # EAP-PSK (experimental; this is _not_ needed for WPA-PSK)
> #CONFIG_EAP_PSK=y
> 
> +# EAP-pwd (secure authentication using only a password)
> +CONFIG_EAP_PWD=y
> +
>  # EAP-PAX
>  #CONFIG_EAP_PAX=y
> 
> @@ -208,6 +200,11 @@ CONFIG_EAP_LEAP=y
>  CONFIG_WPS=y
>  # Enable WSC 2.0 support
>  CONFIG_WPS2=y
> +# Enable WPS external registrar functionality #CONFIG_WPS_ER=y #
> +Disable credentials for an open network by default when acting as a WPS
> +# registrar.
> +#CONFIG_WPS_REG_DISABLE_OPEN=y
> 
>  # EAP-IKEv2
>  #CONFIG_EAP_IKEV2=y
> @@ -224,7 +221,10 @@ CONFIG_SMARTCARD=y
>  # Enable this if EAP-SIM or EAP-AKA is included  #CONFIG_PCSC=y
> 
> -# Development testingBG
> +# Support HT overrides (disable HT/HT40, mask MCS rates, etc.)
> +#CONFIG_HT_OVERRIDES=y
> +
> +# Development testing
>  #CONFIG_EAPOL_TEST=y
> 
>  # Select control interface backend for external programs, e.g, wpa_cli:
> @@ -242,6 +242,10 @@ CONFIG_CTRL_IFACE=y  # the resulting binary.
>  #CONFIG_READLINE=y
> 
> +# Include internal line edit mode in wpa_cli. This can be used as a
> +replacement # for GNU Readline to provide limited command line editing and
> history support.
> +CONFIG_WPA_CLI_EDIT=y
> +
>  # Remove debugging code that is printing out debug message to stdout.
>  # This can be used to reduce the size of the wpa_supplicant considerably  # if
> debugging code is not needed. The size reduction can be around 35% @@ -
> 295,13 +299,16 @@ CONFIG_BACKEND=file  # unix = UNIX/POSIX like systems
> (default)  # win32 = Windows systems  # none = Empty template -
> #CONFIG_OS=unix
> +CONFIG_OS=unix
> 
>  # Select event loop implementation
>  # eloop = select() loop (default)
>  # eloop_win = Windows events and WaitForMultipleObject() loop  #
> eloop_none = Empty template -#CONFIG_ELOOP=eloop
> +CONFIG_ELOOP=eloop
> +
> +# Should we use poll instead of select? Select is used by default.
> +#CONFIG_ELOOP_POLL=y
> 
>  # Select layer 2 packet implementation
>  # linux = Linux packet socket (default) @@ -310,7 +317,7 @@
> CONFIG_BACKEND=file  # winpcap = WinPcap with receive thread  # ndis =
> Windows NDISUIO (note: requires CONFIG_USE_NDISUIO=y)  # none = Empty
> template -#CONFIG_L2_PACKET=linux
> +CONFIG_L2_PACKET=linux
> 
>  # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS)
> CONFIG_PEERKEY=y @@ -323,18 +330,24 @@ CONFIG_PEERKEY=y
> 
>  # Select TLS implementation
>  # openssl = OpenSSL (default)
> -# gnutls = GnuTLS (needed for TLS/IA, see also CONFIG_GNUTLS_EXTRA)
> +# gnutls = GnuTLS
>  # internal = Internal TLSv1 implementation (experimental)  # none = Empty
> template  #CONFIG_TLS=openssl
> 
> -# Whether to enable TLS/IA support, which is required for EAP-TTLSv1.
> -# You need CONFIG_TLS=gnutls for this to have any effect. Please note that -#
> even though the core GnuTLS library is released under LGPL, this extra -# library
> uses GPL and as such, the terms of GPL apply to the combination -# of
> wpa_supplicant and GnuTLS if this option is enabled. BSD license may not -#
> apply for distribution of the resulting binary.
> -#CONFIG_GNUTLS_EXTRA=y
> +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS
> +(v1.1) # can be enabled to get a stronger construction of messages when
> +block ciphers # are used. It should be noted that some existing TLS
> +v1.0 -based # implementation may not be compatible with TLS v1.1
> +message (ClientHello is # sent prior to negotiating which version will
> +be used) #CONFIG_TLSV11=y
> +
> +# TLS-based EAP methods require at least TLS v1.0. Newer version of TLS
> +(v1.2) # can be enabled to enable use of stronger crypto algorithms. It
> +should be # noted that some existing TLS v1.0 -based implementation may
> +not be compatible # with TLS v1.2 message (ClientHello is sent prior to
> +negotiating which version # will be used) #CONFIG_TLSV12=y
> 
>  # If CONFIG_TLS=internal is used, additional library and include paths are  #
> needed for LibTomMath. Alternatively, an integrated, minimal version of @@ -
> 360,14 +373,14 @@ CONFIG_PEERKEY=y
> 
>  # Add support for old DBus control interface  #
> (fi.epitest.hostap.WPASupplicant) -CONFIG_CTRL_IFACE_DBUS=y
> +#CONFIG_CTRL_IFACE_DBUS=y
> 
>  # Add support for new DBus control interface  #
> (fi.w1.hostap.wpa_supplicant1) -CONFIG_CTRL_IFACE_DBUS_NEW=y
> +#CONFIG_CTRL_IFACE_DBUS_NEW=y
> 
>  # Add introspection support for new DBus control interface -
> CONFIG_CTRL_IFACE_DBUS_INTRO=y
> +#CONFIG_CTRL_IFACE_DBUS_INTRO=y
> 
>  # Add support for loading EAP methods dynamically as shared libraries.
>  # When this option is enabled, each EAP method can be either included @@ -
> 394,7 +407,22 @@ CONFIG_CTRL_IFACE_DBUS_INTRO=y
> #CONFIG_IEEE80211R=y
> 
>  # Add support for writing debug log to a file (/tmp/wpa_supplicant-log-#.txt) -
> CONFIG_DEBUG_FILE=y
> +#CONFIG_DEBUG_FILE=y
> +
> +# Send debug messages to syslog instead of stdout
> +#CONFIG_DEBUG_SYSLOG=y # Set syslog facility for debug messages
> +#CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON
> +
> +# Add support for sending all debug messages (regardless of debug
> +verbosity) # to the Linux kernel tracing facility. This helps debug the
> +entire stack by # making it easy to record everything happening from
> +the driver up into the # same file, e.g., using trace-cmd.
> +#CONFIG_DEBUG_LINUX_TRACING=y
> +
> +# Add support for writing debug log to Android logcat instead of
> +standard # output CONFIG_ANDROID_LOG=y
> 
>  # Enable privilege separation (see README 'Privilege separation' for details)
> #CONFIG_PRIVSEP=y @@ -407,7 +435,7 @@ CONFIG_DEBUG_FILE=y  # This
> tracks use of memory allocations and other registrations and reports  # incorrect
> use with a backtrace of call (or allocation) location.
>  #CONFIG_WPA_TRACE=y
> -# For BSD, comment out these.
> +# For BSD, uncomment these.
>  #LIBS += -lexecinfo
>  #LIBS_p += -lexecinfo
>  #LIBS_c += -lexecinfo
> @@ -416,15 +444,63 @@ CONFIG_DEBUG_FILE=y  # This enables use of libbfd
> to get more detailed symbols for the backtraces  # generated by
> CONFIG_WPA_TRACE=y.
>  #CONFIG_WPA_TRACE_BFD=y
> -# For BSD, comment out these.
> +# For BSD, uncomment these.
>  #LIBS += -lbfd -liberty -lz
>  #LIBS_p += -lbfd -liberty -lz
>  #LIBS_c += -lbfd -liberty -lz
> 
> -# for p2p
> +# wpa_supplicant depends on strong random number generation being
> +available # from the operating system. os_get_random() function is used
> +to fetch random # data when needed, e.g., for key generation. On Linux
> +and BSD systems, this # works by reading /dev/urandom. It should be
> +noted that the OS entropy pool # needs to be properly initialized
> +before wpa_supplicant is started. This is # important especially on
> +embedded devices that do not have a hardware random # number generator
> +and may by default start up with minimal entropy available # for random
> number generation.
> +#
> +# As a safety net, wpa_supplicant is by default trying to internally
> +collect # additional entropy for generating random data to mix in with
> +the data fetched # from the OS. This by itself is not considered to be
> +very strong, but it may # help in cases where the system pool is not
> +initialized properly. However, it # is very strongly recommended that
> +the system pool is initialized with enough # entropy either by using
> +hardware assisted random number generator or by # storing state over device
> reboots.
> +#
> +# wpa_supplicant can be configured to maintain its own entropy store
> +over # restarts to enhance random number generation. This is not
> +perfect, but it is # much more secure than using the same sequence of
> +random numbers after every # reboot. This can be enabled with
> +-e<entropy file> command line option. The # specified file needs to be readable
> and writable by wpa_supplicant.
> +#
> +# If the os_get_random() is known to provide strong random data (e.g.,
> +on # Linux/BSD, the board in question is known to have reliable source
> +of random # data from /dev/urandom), the internal wpa_supplicant random
> +pool can be # disabled. This will save some in binary size and CPU use.
> +However, this # should only be considered for builds that are known to
> +be used on devices # that meet the requirements described above.
> +#CONFIG_NO_RANDOM_POOL=y
> +
> +# IEEE 802.11n (High Throughput) support (mainly for AP mode)
> +CONFIG_IEEE80211N=y
> +
> +# Interworking (IEEE 802.11u)
> +# This can be used to enable functionality to improve interworking with
> +# external networks (GAS/ANQP to learn more about the networks and
> +network # selection based on available credentials).
> +CONFIG_INTERWORKING=y
> +
> +# Hotspot 2.0
> +CONFIG_HS20=y
> +
> +# Disable roaming in wpa_supplicant
> +#CONFIG_NO_ROAMING=y
> +
> +# Enable P2P
>  CONFIG_P2P=y
>  CONFIG_AP=y
> 
> -# IEEE 802.11n (High Throughput) support -CONFIG_IEEE80211N=y
> +# bgscan
> +NEED_BGSCAN=y
> +CONFIG_BGSCAN_LEARN=y
> +CONFIG_BGSCAN_SIMPLE=y
> 
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant-wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/wpa-
> supplicant/wpa-supplicant-wl18xx_r8.a8.08.bb
> similarity index 88%
> rename from meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant-wl18xx_r8.a6.01.bb
> rename to meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant-wl18xx_r8.a8.08.bb
> index f6c4f70..ec7a0c7 100644
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-
> wl18xx_r8.a6.01.bb
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplica
> +++ nt-wl18xx_r8.a8.08.bb
> @@ -10,9 +10,9 @@ LIC_FILES_CHKSUM =
> "file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e \
> 
>  FILESEXTRAPATHS_append := "${THISDIR}/wpa-supplicant:"
> 
> -# Tag: ol_r8.a6.01
> -SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
> -PR = "r2+gitr${SRCPV}"
> +# Tag: ol_r8.a8.08
> +SRCREV = "257ab333aad993b4be81808524bc0d939c276058"
> +PR_append = "a+gitr${SRCPV}"
> 
>  # Add ti to the PV to indicate that this is a TI modify version of wpa-supplicant.
>  PV = "2.0-devel-ti"
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant.inc b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant.inc
> index 2d8970f..9678b1b 100644
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant.inc
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplica
> +++ nt.inc
> @@ -21,6 +21,7 @@ SRC_URI = "git://github.com/TI-
> OpenLink/hostap.git;protocol=git \
>             file://defaults-sane \
>             file://wpa-supplicant.sh \
>             file://wpa_supplicant.conf \
> +           file://p2p_supplicant.conf \
>             file://wpa_supplicant.conf-sane \
>             file://99_wpa_supplicant \
>             file://wpa_supplicant.conf \ @@ -55,6 +56,7 @@ do_install () {
>  	install -d ${D}${sysconfdir}/default
>  	install -m 600 ${WORKDIR}/defaults-sane
> ${D}${sysconfdir}/default/wpa
>  	install -m 600 ${WORKDIR}/wpa_supplicant.conf-sane
> ${D}${sysconfdir}/wpa_supplicant.conf
> +	install -m 600 ${WORKDIR}/p2p_supplicant.conf
> +${D}${sysconfdir}/p2p_supplicant.conf
> 
>  	if grep -q ^CONFIG_CTRL_IFACE_DBUS=y .config || grep -q
> ^CONFIG_CTRL_IFACE_DBUS_NEW=y .config; then
>  		install -d ${D}/${sysconfdir}/dbus-1/system.d
> @@ -104,6 +106,7 @@ pkg_postinst_wpa-supplicant () {  do_configure () {
>  	install -m 0755 ${WORKDIR}/defconfig .config
>  	echo "CFLAGS += -I${STAGING_INCDIR}" >> .config
> +	echo "CFLAGS += -I${STAGING_INCDIR}/libnl3/" >> .config
>  	echo "LIBS += -L${STAGING_LIBDIR}" >> .config
>  	echo "LIBS_p += -L${STAGING_LIBDIR}" >> .config
>  	if [ "${@base_contains('COMBINED_FEATURES', 'madwifi', 1, 0, d)}" =
> "1" ]; then diff --git a/meta-arago-extras/recipes-connectivity/wpa-
> supplicant/wpa-supplicant/p2p_supplicant.conf b/meta-arago-extras/recipes-
> connectivity/wpa-supplicant/wpa-supplicant/p2p_supplicant.conf
> new file mode 100755
> index 0000000..2de8730
> --- /dev/null
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplica
> +++ nt/p2p_supplicant.conf
> @@ -0,0 +1,14 @@
> +ctrl_interface=/var/run/wpa_supplicant
> +update_config=0
> +device_name=TI-SITARA-P2P
> +device_type=1-0050F204-1
> +config_methods=virtual_push_button physical_display keypad
> +p2p_go_intent=0
> +country=US
> +##p2p_pref_chan=115:36 115:40
> +driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1
> +p2p_go_max_inactivity=60
> +p2p_go_ht40=1
> +p2p_multi_chan=1
> +disassoc_low_ack=1
> +concurrent_sched_scan=1
> diff --git a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant/wpa_supplicant.conf b/meta-arago-extras/recipes-
> connectivity/wpa-supplicant/wpa-supplicant/wpa_supplicant.conf
> index f0c993d..f144a38 100644
> --- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> supplicant/wpa_supplicant.conf
> +++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-supplica
> +++ nt/wpa_supplicant.conf
> @@ -1,19 +1,4 @@
> -##### Example wpa_supplicant configuration file
> ############################### -# -# This file describes configuration
> file format and lists all available option.
> -# Please also take a look at simpler configuration examples in 'examples'
> -# subdirectory.
> -#
> -# Empty lines and lines starting with # are ignored
> -
> -# NOTE! This file may contain password information and should probably be
> made -# readable only by root user on multiuser systems.
> -
> -# Note: All file paths in this configuration file should use full (absolute, -# not
> relative to working directory) path in order to allow working directory -# to be
> changed. This can happen if wpa_supplicant is run in the background.
> -
> -# Whether to allow wpa_supplicant to update (overwrite) configuration
> +##### wpa_supplicant configuration file template #####
>  #
>  # This option can be used to allow wpa_supplicant to overwrite configuration  #
> file whenever configuration is changed (e.g., new network block is added with
> @@ -21,59 +6,8 @@  # wpa_cli/wpa_gui to be able to store the configuration
> changes permanently.
>  # Please note that overwriting configuration file will remove the comments
> from  # it.
> -#update_config=1
> -
> -# global configuration (shared by all network blocks) -# -# Parameters for the
> control interface. If this is specified, wpa_supplicant -# will open a control
> interface that is available for external programs to -# manage wpa_supplicant.
> The meaning of this string depends on which control -# interface mechanism is
> used. For all cases, the existance of this parameter -# in configuration is used to
> determine whether the control interface is -# enabled.
> -#
> -# For UNIX domain sockets (default on Linux and BSD): This is a directory that -
> # will be created for UNIX domain sockets for listening to requests from -#
> external programs (CLI/GUI, etc.) for status information and configuration.
> -# The socket file will be named based on the interface name, so multiple -#
> wpa_supplicant processes can be run at the same time if more than one -#
> interface is used.
> -# /var/run/wpa_supplicant is the recommended directory for sockets and by -#
> default, wpa_cli will use it when trying to connect with wpa_supplicant.
> -#
> -# Access control for the control interface can be configured by setting the -#
> directory to allow only members of a group to use sockets. This way, it is -#
> possible to run wpa_supplicant as root (since it needs to change network -#
> configuration and open raw sockets) and still allow GUI/CLI components to be -#
> run as non-root users. However, since the control interface can be used to -#
> change the network configuration, this access needs to be protected in many -#
> cases. By default, wpa_supplicant is configured to use gid 0 (root). If you -#
> want to allow non-root users to use the control interface, add a new group -#
> and change this value to match with that group. Add users that should have -#
> control interface access to this group. If this variable is commented out or -# not
> included in the configuration file, group will not be changed from the -# value it
> got by default when the directory or socket was created.
> -#
> -# When configuring both the directory and group, use following format:
> -# DIR=/var/run/wpa_supplicant GROUP=wheel -#
> DIR=/var/run/wpa_supplicant GROUP=0 -# (group can be either group name or
> gid) -# -# For UDP connections (default on Windows): The value will be ignored.
> This -# variable is just used to select that the control interface is to be created.
> -# The value can be set to, e.g., udp (ctrl_interface=udp) -# -# For Windows
> Named Pipe: This value can be used to set the security descriptor -# for
> controlling access to the control interface. Security descriptor can be -# set using
> Security Descriptor String Format (see http://msdn.microsoft.com/ -#
> library/default.asp?url=/library/en-us/secauthz/security/
> -# security_descriptor_string_format.asp). The descriptor string needs to be -#
> prefixed with SDDL=. For example, ctrl_interface=SDDL=D: would set an empty
> -# DACL (which will reject all connections). See README-Windows.txt for more -
> # information about SDDL string format.
> -#
> +update_config=1
>  ctrl_interface=/var/run/wpa_supplicant
> -
>  # IEEE 802.1X/EAPOL version
>  # wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines
> # EAPOL version 2. However, there are many APs that do not handle the new
> @@ -82,14 +16,15 @@ ctrl_interface=/var/run/wpa_supplicant
>  # to 1 by default. This configuration value can be used to set it to the new  #
> version (2).
>  eapol_version=1
> -
>  # AP scanning/selection
>  # By default, wpa_supplicant requests driver to perform AP scanning and then
> # uses the scan results to select a suitable AP. Another alternative is to  # allow
> the driver to take care of AP scanning and selection and use  # wpa_supplicant
> just to process EAPOL frames based on IEEE 802.11 association  # information
> from the driver.
> -# 1: wpa_supplicant initiates scanning and AP selection
> +# 1: wpa_supplicant initiates scanning and AP selection; if no APs matching to
> +#    the currently enabled networks are found, a new network (IBSS or AP
> mode
> +#    operation) may be initialized (if configured) (default)
>  # 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
>  #    parameters (e.g., WPA IE generation); this mode can also be used with
>  #    non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
> @@ -102,589 +37,28 @@ eapol_version=1
>  #    the driver reports successful association; each network block should have
>  #    explicit security policy (i.e., only one option in the lists) for
>  #    key_mgmt, pairwise, group, proto variables
> +# When using IBSS or AP mode, ap_scan=2 mode can force the new network
> +to be # created immediately regardless of scan results. ap_scan=1 mode
> +will first try # to scan for existing networks and only if no matches
> +with the enabled # networks are found, a new IBSS or AP mode network is
> created.
>  ap_scan=1
> -
>  # EAP fast re-authentication
>  # By default, fast re-authentication is enabled for all EAP methods that  #
> support it. This variable can be used to disable fast re-authentication.
>  # Normally, there is no need to disable this.
>  fast_reauth=1
> -
> -# OpenSSL Engine support
> -# These options can be used to load OpenSSL engines.
> -# The two engines that are supported currently are shown below:
> -# They are both from the opensc project (http://www.opensc.org/) -# By
> default no engines are loaded.
> -# make the opensc engine available
> -#opensc_engine_path=/usr/lib/opensc/engine_opensc.so
> -# make the pkcs11 engine available
> -#pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
> -# configure the path to the pkcs11 module required by the pkcs11 engine -
> #pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
> -
> -# Dynamic EAP methods
> -# If EAP methods were built dynamically as shared object files, they need to be -
> # loaded here before being used in the network blocks. By default, EAP methods
> -# are included statically in the build, so these lines are not needed -
> #load_dynamic_eap=/usr/lib/wpa_supplicant/eap_tls.so
> -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_md5.so
> -
> -# Driver interface parameters
> -# This field can be used to configure arbitrary driver interace parameters. The -
> # format is specific to the selected driver interface. This field is not used -# in
> most cases.
> -#driver_param="field=value"
> -
> -# Maximum lifetime for PMKSA in seconds; default 43200
> -#dot11RSNAConfigPMKLifetime=43200
> -# Threshold for reauthentication (percentage of PMK lifetime); default 70
> -#dot11RSNAConfigPMKReauthThreshold=70
> -# Timeout for security association negotiation in seconds; default 60
> -#dot11RSNAConfigSATimeout=60
> -
> -# network block
> -#
> -# Each network (usually AP's sharing the same SSID) is configured as a separate
> -# block in this configuration file. The network blocks are in preference order -#
> (the first match is used).
> -#
> -# network block fields:
> -#
> -# disabled:
> -#	0 = this network can be used (default)
> -#	1 = this network block is disabled (can be enabled through ctrl_iface,
> -#	    e.g., with wpa_cli or wpa_gui)
> -#
> -# id_str: Network identifier string for external scripts. This value is passed
> -#	to external action script through wpa_cli as WPA_ID_STR environment
> -#	variable to make it easier to do network specific configuration.
> -#
> -# ssid: SSID (mandatory); either as an ASCII string with double quotation or
> -#	as hex string; network name
> -#
> -# scan_ssid:
> -#	0 = do not scan this SSID with specific Probe Request frames (default)
> -#	1 = scan with SSID-specific Probe Request frames (this can be used to
> -#	    find APs that do not accept broadcast SSID or use multiple SSIDs;
> -#	    this will add latency to scanning, so enable this only when needed)
> -#
> -# bssid: BSSID (optional); if set, this network block is used only when
> -#	associating with the AP using the configured BSSID
> -#
> -# priority: priority group (integer)
> -# By default, all networks will get same priority group (0). If some of the -#
> networks are more desirable, this field can be used to change the order in -#
> which wpa_supplicant goes through the networks when selecting a BSS. The -#
> priority groups will be iterated in decreasing priority (i.e., the larger the -#
> priority value, the sooner the network is matched against the scan results).
> -# Within each priority group, networks will be selected based on security -#
> policy, signal strength, etc.
> -# Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not -
> # using this priority to select the order for scanning. Instead, they try the -#
> networks in the order that used in the configuration file.
> -#
> -# mode: IEEE 802.11 operation mode
> -# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default) -# 1 =
> IBSS (ad-hoc, peer-to-peer) -# Note: IBSS can only be used with key_mgmt
> NONE (plaintext and static WEP) -# and key_mgmt=WPA-NONE (fixed group key
> TKIP/CCMP). In addition, ap_scan has -# to be set to 2 for IBSS. WPA-None
> requires following network block options:
> -# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP,
> but not -# both), and psk must also be set.
> -#
> -# proto: list of accepted protocols
> -# WPA = WPA/IEEE 802.11i/D3.0
> -# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN) -# If
> not set, this defaults to: WPA RSN -# -# key_mgmt: list of accepted
> authenticated key management protocols -# WPA-PSK = WPA pre-shared key
> (this requires 'psk' field) -# WPA-EAP = WPA using EAP authentication (this can
> use an external
> -#	program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
> -# IEEE8021X = IEEE 802.1X using EAP authentication and (optionally)
> dynamically
> -#	generated WEP keys
> -# NONE = WPA is not used; plaintext or static WEP could be used -# If not set,
> this defaults to: WPA-PSK WPA-EAP -# -# auth_alg: list of allowed IEEE 802.11
> authentication algorithms -# OPEN = Open System authentication (required for
> WPA/WPA2) -# SHARED = Shared Key authentication (requires static WEP keys)
> -# LEAP = LEAP/Network EAP (only used with LEAP) -# If not set, automatic
> selection is used (Open System with LEAP enabled if -# LEAP is allowed as one of
> the EAP methods).
> -#
> -# pairwise: list of accepted pairwise (unicast) ciphers for WPA -# CCMP = AES in
> Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] -# TKIP = Temporal
> Key Integrity Protocol [IEEE 802.11i/D7.0] -# NONE = Use only Group Keys
> (deprecated, should not be included if APs support
> -#	pairwise keys)
> -# If not set, this defaults to: CCMP TKIP -# -# group: list of accepted group
> (broadcast/multicast) ciphers for WPA -# CCMP = AES in Counter mode with
> CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] -# TKIP = Temporal Key Integrity
> Protocol [IEEE 802.11i/D7.0] -# WEP104 = WEP (Wired Equivalent Privacy) with
> 104-bit key -# WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE
> 802.11] -# If not set, this defaults to: CCMP TKIP WEP104 WEP40 -# -# psk:
> WPA preshared key; 256-bit pre-shared key -# The key used in WPA-PSK mode
> can be entered either as 64 hex-digits, i.e., -# 32 bytes or as an ASCII passphrase
> (in which case, the real PSK will be -# generated using the passphrase and SSID).
> ASCII passphrase must be between -# 8 and 63 characters (inclusive).
> -# This field is not needed, if WPA-EAP is used.
> -# Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys -
> # from ASCII passphrase. This process uses lot of CPU and wpa_supplicant -#
> startup and reconfiguration time can be optimized by generating the PSK only -#
> only when the passphrase or SSID has actually changed.
> -#
> -# eapol_flags: IEEE 802.1X/EAPOL options (bit field) -# Dynamic WEP key
> required for non-WPA mode -# bit0 (1): require dynamically generated unicast
> WEP key -# bit1 (2): require dynamically generated broadcast WEP key
> -# 	(3 = require both keys; default)
> -# Note: When using wired authentication, eapol_flags must be set to 0 for the -
> # authentication to be completed successfully.
> -#
> -# proactive_key_caching:
> -# Enable/disable opportunistic PMKSA caching for WPA2.
> -# 0 = disabled (default)
> -# 1 = enabled
> -#
> -# wep_key0..3: Static WEP key (ASCII in double quotation, e.g. "abcde" or -#
> hex without quotation, e.g., 0102030405) -# wep_tx_keyidx: Default WEP key
> index (TX) (0..3) -# -# peerkey: Whether PeerKey negotiation for direct links
> (IEEE 802.11e DLS) is -# allowed. This is only used with RSN/WPA2.
> -# 0 = disabled (default)
> -# 1 = enabled
> -#peerkey=1
> -#
> -# Following fields are only used with internal EAP implementation.
> -# eap: space-separated list of accepted EAP methods
> -#	MD5 = EAP-MD5 (unsecure and does not generate keying material ->
> -#			cannot be used with WPA; to be used as a Phase 2
> method
> -#			with EAP-PEAP or EAP-TTLS)
> -#       MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be
> used
> -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> -#       OTP = EAP-OTP (cannot be used separately with WPA; to be used
> -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> -#       GTC = EAP-GTC (cannot be used separately with WPA; to be used
> -#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
> -#	TLS = EAP-TLS (client and server certificate)
> -#	PEAP = EAP-PEAP (with tunnelled EAP authentication)
> -#	TTLS = EAP-TTLS (with tunnelled EAP or
> PAP/CHAP/MSCHAP/MSCHAPV2
> -#			 authentication)
> -#	If not set, all compiled in methods are allowed.
> -#
> -# identity: Identity string for EAP
> -# anonymous_identity: Anonymous identity string for EAP (to be used as the
> -#	unencrypted identity with EAP types that support different tunnelled
> -#	identity, e.g., EAP-TTLS)
> -# password: Password string for EAP
> -# ca_cert: File path to CA certificate file (PEM/DER). This file can have one
> -#	or more trusted CA certificates. If ca_cert and ca_path are not
> -#	included, server certificate will not be verified. This is insecure and
> -#	a trusted CA certificate should always be configured when using
> -#	EAP-TLS/TTLS/PEAP. Full path should be used since working directory
> may
> -#	change when wpa_supplicant is run in the background.
> -#	On Windows, trusted CA certificates can be loaded from the system
> -#	certificate store by setting this to cert_store://<name>, e.g.,
> -#	ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT".
> -#	Note that when running wpa_supplicant as an application, the user
> -#	certificate store (My user account) is used, whereas computer store
> -#	(Computer account) is used when running wpasvc as a service.
> -# ca_path: Directory path for CA certificate files (PEM). This path may
> -#	contain multiple CA certificates in OpenSSL format. Common use for this
> -#	is to point to system trusted CA list which is often installed into
> -#	directory like /etc/ssl/certs. If configured, these certificates are
> -#	added to the list of trusted CAs. ca_cert may also be included in that
> -#	case, but it is not required.
> -# client_cert: File path to client certificate file (PEM/DER)
> -#	Full path should be used since working directory may change when
> -#	wpa_supplicant is run in the background.
> -#	Alternatively, a named configuration blob can be used by setting this
> -#	to blob://<blob name>.
> -# private_key: File path to client private key file (PEM/DER/PFX)
> -#	When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
> -#	commented out. Both the private key and certificate will be read from
> -#	the PKCS#12 file in this case. Full path should be used since working
> -#	directory may change when wpa_supplicant is run in the background.
> -#	Windows certificate store can be used by leaving client_cert out and
> -#	configuring private_key in one of the following formats:
> -#	cert://substring_to_match
> -#	hash://certificate_thumbprint_in_hex
> -#	for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
> -#	Note that when running wpa_supplicant as an application, the user
> -#	certificate store (My user account) is used, whereas computer store
> -#	(Computer account) is used when running wpasvc as a service.
> -#	Alternatively, a named configuration blob can be used by setting this
> -#	to blob://<blob name>.
> -# private_key_passwd: Password for private key file (if left out, this will be
> -#	asked through control interface)
> -# dh_file: File path to DH/DSA parameters file (in PEM format)
> -#	This is an optional configuration file for setting parameters for an
> -#	ephemeral DH key exchange. In most cases, the default RSA
> -#	authentication does not use this configuration. However, it is possible
> -#	setup RSA to use ephemeral DH key exchange. In addition, ciphers with
> -#	DSA keys always use ephemeral DH keys. This can be used to achieve
> -#	forward secrecy. If the file is in DSA parameters format, it will be
> -#	automatically converted into DH params.
> -# subject_match: Substring to be matched against the subject of the
> -#	authentication server certificate. If this string is set, the server
> -#	sertificate is only accepted if it contains this string in the subject.
> -#	The subject string is in following format:
> -#	/C=US/ST=CA/L=San Francisco/CN=Test
> AS/emailAddress=as@example.com
> -# altsubject_match: Semicolon separated string of entries to be matched
> against
> -#	the alternative subject name of the authentication server certificate.
> -#	If this string is set, the server sertificate is only accepted if it
> -#	contains one of the entries in an alternative subject name extension.
> -#	altSubjectName string is in following format: TYPE:VALUE
> -#	Example: EMAIL:server@example.com
> -#	Example: DNS:server.example.com;DNS:server2.example.com
> -#	Following types are supported: EMAIL, DNS, URI
> -# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
> -#	(string with field-value pairs, e.g., "peapver=0" or
> -#	"peapver=1 peaplabel=1")
> -#	'peapver' can be used to force which PEAP version (0 or 1) is used.
> -#	'peaplabel=1' can be used to force new label, "client PEAP encryption",
> -#	to be used during key derivation when PEAPv1 or newer. Most existing
> -#	PEAPv1 implementation seem to be using the old label, "client EAP
> -#	encryption", and wpa_supplicant is now using that as the default value.
> -#	Some servers, e.g., Radiator, may require peaplabel=1 configuration to
> -#	interoperate with PEAPv1; see eap_testing.txt for more details.
> -#	'peap_outer_success=0' can be used to terminate PEAP authentication
> on
> -#	tunneled EAP-Success. This is required with some RADIUS servers that
> -#	implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
> -#	Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode)
> -#	include_tls_length=1 can be used to force wpa_supplicant to include
> -#	TLS Message Length field in all TLS messages even if they are not
> -#	fragmented.
> -#	sim_min_num_chal=3 can be used to configure EAP-SIM to require
> three
> -#	challenges (by default, it accepts 2 or 3)
> -# phase2: Phase2 (inner authentication with TLS tunnel) parameters
> -#	(string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
> -#	"autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
> -# Following certificate/private key fields are used in inner Phase2 -#
> authentication when using EAP-TTLS or EAP-PEAP.
> -# ca_cert2: File path to CA certificate file. This file can have one or more
> -#	trusted CA certificates. If ca_cert2 and ca_path2 are not included,
> -#	server certificate will not be verified. This is insecure and a trusted
> -#	CA certificate should always be configured.
> -# ca_path2: Directory path for CA certificate files (PEM) -# client_cert2: File
> path to client certificate file -# private_key2: File path to client private key file -#
> private_key2_passwd: Password for private key file -# dh_file2: File path to
> DH/DSA parameters file (in PEM format) -# subject_match2: Substring to be
> matched against the subject of the
> -#	authentication server certificate.
> -# altsubject_match2: Substring to be matched against the alternative subject
> -#	name of the authentication server certificate.
> -#
> -# fragment_size: Maximum EAP fragment size in bytes (default 1398).
> -#	This value limits the fragment size for EAP methods that support
> -#	fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set
> -#	small enough to make the EAP messages fit in MTU of the network
> -#	interface used for EAPOL. The default value is suitable for most
> -#	cases.
> -#
> -# EAP-PSK variables:
> -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format -# nai:
> user NAI -# -# EAP-PAX variables:
> -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format -# -#
> EAP-SAKE variables:
> -# eappsk: 32-byte (256-bit, 64 hex digits) pre-shared key in hex format
> -#	(this is concatenation of Root-Secret-A and Root-Secret-B)
> -# nai: user NAI (PEERID)
> -#
> -# EAP-GPSK variables:
> -# eappsk: Pre-shared key in hex format (at least 128 bits, i.e., 32 hex digits) -#
> nai: user NAI (ID_Client) -# -# EAP-FAST variables:
> -# pac_file: File path for the PAC entries. wpa_supplicant will need to be able
> -#	to create this file and write updates to it when PAC is being
> -#	provisioned or refreshed. Full path to the file should be used since
> -#	working directory may change when wpa_supplicant is run in the
> -#	background. Alternatively, a named configuration blob can be used by
> -#	setting this to blob://<blob name>
> -# phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST
> -#	credentials (PAC)
> -#
> -# wpa_supplicant supports number of "EAP workarounds" to work around -#
> interoperability issues with incorrectly behaving authentication servers.
> -# These are enabled by default because some of the issues are present in large -
> # number of authentication servers. Strict EAP conformance mode can be -#
> configured by disabling workarounds with eap_workaround=0.
> -
> -# Example blocks:
> -
> -# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers -
> network={
> -	ssid="simple"
> -	psk="very secret passphrase"
> -	priority=5
> -}
> -
> -# Same as previous, but request SSID-specific scanning (for APs that reject -#
> broadcast SSID) -network={
> -	ssid="second ssid"
> -	scan_ssid=1
> -	psk="very secret passphrase"
> -	priority=2
> -}
> -
> -# Only WPA-PSK is used. Any valid cipher combination is accepted.
> -network={
> -	ssid="example"
> -	proto=WPA
> -	key_mgmt=WPA-PSK
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP WEP104 WEP40
> -
> 	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb
> 0106c72ac7bb
> -	priority=2
> -}
> -
> -# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used
> WEP104 -# or WEP40 as the group cipher will not be accepted.
> -network={
> -	ssid="example"
> -	proto=RSN
> -	key_mgmt=WPA-EAP
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP
> -	eap=TLS
> -	identity="user@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -	private_key="/etc/cert/user.prv"
> -	private_key_passwd="password"
> -	priority=1
> -}
> -
> -# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new
> peaplabel -# (e.g., Radiator) -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=PEAP
> -	identity="user@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	phase1="peaplabel=1"
> -	phase2="auth=MSCHAPV2"
> -	priority=10
> -}
> -
> -# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
> -# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	identity="user@example.com"
> -	anonymous_identity="anonymous@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	priority=2
> -}
> -
> -# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the
> unencrypted -# use. Real identity is sent only within an encrypted TLS tunnel.
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	identity="user@example.com"
> -	anonymous_identity="anonymous@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	phase2="auth=MSCHAPV2"
> -}
> -
> -# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner -#
> authentication.
> -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	# Phase1 / outer authentication
> -	anonymous_identity="anonymous@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	# Phase 2 / inner authentication
> -	phase2="autheap=TLS"
> -	ca_cert2="/etc/cert/ca2.pem"
> -	client_cert2="/etc/cer/user.pem"
> -	private_key2="/etc/cer/user.prv"
> -	private_key2_passwd="password"
> -	priority=2
> -}
> -
> -# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise
> and -# group cipher.
> -network={
> -	ssid="example"
> -	bssid=00:11:22:33:44:55
> -	proto=WPA RSN
> -	key_mgmt=WPA-PSK WPA-EAP
> -	pairwise=CCMP
> -	group=CCMP
> -
> 	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb
> 0106c72ac7bb
> -}
> -
> -# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP -
> # and all valid ciphers.
> -network={
> -	ssid=00010203
> -
> 	psk=000102030405060708090a0b0c0d0e0f10111213141516171819
> 1a1b1c1d1e1f
> -}
> -
> -
> -# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA)
> using -# EAP-TLS for authentication and key generation; require both unicast
> and -# broadcast WEP keys.
> -network={
> -	ssid="1x-test"
> -	key_mgmt=IEEE8021X
> -	eap=TLS
> -	identity="user@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -	private_key="/etc/cert/user.prv"
> -	private_key_passwd="password"
> -	eapol_flags=3
> -}
> -
> -
> -# LEAP with dynamic WEP keys
> -network={
> -	ssid="leap-example"
> -	key_mgmt=IEEE8021X
> -	eap=LEAP
> -	identity="user"
> -	password="foobar"
> -}
> -
> -# Plaintext connection (no WPA, no IEEE 802.1X) -network={
> -	ssid="plaintext-test"
> -	key_mgmt=NONE
> -}
> -
> -
> -# Shared WEP key connection (no WPA, no IEEE 802.1X) -network={
> -	ssid="static-wep-test"
> -	key_mgmt=NONE
> -	wep_key0="abcde"
> -	wep_key1=0102030405
> -	wep_key2="1234567890123"
> -	wep_tx_keyidx=0
> -	priority=5
> -}
> -
> -
> -# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key -#
> IEEE 802.11 authentication -network={
> -	ssid="static-wep-test2"
> -	key_mgmt=NONE
> -	wep_key0="abcde"
> -	wep_key1=0102030405
> -	wep_key2="1234567890123"
> -	wep_tx_keyidx=0
> -	priority=5
> -	auth_alg=SHARED
> -}
> -
> -
> -# IBSS/ad-hoc network with WPA-None/TKIP.
> -network={
> -	ssid="test adhoc"
> -	mode=1
> -	proto=WPA
> -	key_mgmt=WPA-NONE
> -	pairwise=NONE
> -	group=TKIP
> -	psk="secret passphrase"
> -}
> -
> -
> -# Catch all example that allows more or less all configuration modes -network={
> -	ssid="example"
> -	scan_ssid=1
> -	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP WEP104 WEP40
> -	psk="very secret passphrase"
> -	eap=TTLS PEAP TLS
> -	identity="user@example.com"
> -	password="foobar"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -	private_key="/etc/cert/user.prv"
> -	private_key_passwd="password"
> -	phase1="peaplabel=0"
> -}
> -
> -# Example of EAP-TLS with smartcard (openssl engine) -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TLS
> -	proto=RSN
> -	pairwise=CCMP TKIP
> -	group=CCMP TKIP
> -	identity="user@example.com"
> -	ca_cert="/etc/cert/ca.pem"
> -	client_cert="/etc/cert/user.pem"
> -
> -	engine=1
> -
> -	# The engine configured here must be available. Look at
> -	# OpenSSL engine support in the global section.
> -	# The key available through the engine must be the private key
> -	# matching the client certificate configured above.
> -
> -	# use the opensc engine
> -	#engine_id="opensc"
> -	#key_id="45"
> -
> -	# use the pkcs11 engine
> -	engine_id="pkcs11"
> -	key_id="id_45"
> -
> -	# Optional PIN configuration; this can be left out and PIN will be
> -	# asked through the control interface
> -	pin="1234"
> -}
> -
> -# Example configuration showing how to use an inlined blob as a CA certificate -
> # data instead of using external file -network={
> -	ssid="example"
> -	key_mgmt=WPA-EAP
> -	eap=TTLS
> -	identity="user@example.com"
> -	anonymous_identity="anonymous@example.com"
> -	password="foobar"
> -	ca_cert="blob://exampleblob"
> -	priority=20
> -}
> -
> -blob-base64-exampleblob={
> -SGVsbG8gV29ybGQhCg==
> -}
> -
> -
> -# Wildcard match for SSID (plaintext APs only). This example select any -# open
> AP regardless of its SSID.
> -network={
> -	key_mgmt=NONE
> -}
> +device_name=Blaze
> +manufacturer=TI
> +model_name=Wilink
> +model_number=wl18xx
> +serial_number=12345
> +driver_param=use_multi_chan_concurrent=1 use_p2p_group_interface=1 #
> +Timeout in seconds to detect STA inactivity (default: 300 seconds) # #
> +This timeout value is used in P2P GO mode to clean up # inactive
> +stations.
> +p2p_go_max_inactivity=60
> +p2p_go_ht40=1
> +p2p_multi_chan=1
> +disassoc_low_ack=1
> +concurrent_sched_scan=1
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 2/8] hostap-daemon-wl18xx: Update recipe to ol_r8.a8.08 version
  2013-12-08  8:18 ` [PATCH 2/8] hostap-daemon-wl18xx: " Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 2/8] hostap-daemon-wl18xx: Update recipe to
> ol_r8.a8.08 version
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Build hostap-daemon from TI_Openlink ol_r8.a8.08
> - Add missing includes for building with libnl3.
> - Adjusted configuration files.
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  ...d-change-conf-file-for-better-oob-startup.patch | 1089
> +++++++++++++++++++-
>  ...8.a6.01.bb => hostap-daemon-wl18xx_r8.a8.08.bb} |    6 +-
>  .../hostap/hostap-daemon/defconfig                 |   42 +-
>  .../recipes-connectivity/hostap/hostap.inc         |    3 +-
>  4 files changed, 1101 insertions(+), 39 deletions(-)  rename meta-arago-
> extras/recipes-connectivity/hostap/{hostap-daemon-wl18xx_r8.a6.01.bb =>
> hostap-daemon-wl18xx_r8.a8.08.bb} (84%)
> 
> diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-
> wl18xx/0001-hostapd-change-conf-file-for-better-oob-startup.patch b/meta-
> arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx/0001-
> hostapd-change-conf-file-for-better-oob-startup.patch
> index 824d250..aee4531 100644
> --- a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-
> wl18xx/0001-hostapd-change-conf-file-for-better-oob-startup.patch
> +++ b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx
> +++ /0001-hostapd-change-conf-file-for-better-oob-startup.patch
> @@ -1,40 +1,1093 @@
> -From f7c1b9d4e18dc650dd0b9da97a91f27f6a4bb5b7 Mon Sep 17 00:00:00
> 2001
> -From: Eyal Reizer <eyalr@ti.com>
> -Date: Sun, 17 Mar 2013 07:18:55 -0700
> -Subject: [PATCH] hostapd: change conf file for better sdk out of box startup
> +From 0649cc8f954a957a32180dc714ab4226503c5a66 Mon Sep 17 00:00:00
> 2001
> +From: Yaniv Mahani <yanivma@ti.com>
> +Date: Wed, 27 Nov 2013 13:43:55 +0200
> +Subject: [PATCH] hostapd change conf file for better oob startup
> 
> -Change the default channel to 6 and change the ssid to a more -meaningful
> name.
> -
> -Upstream-status: inappropriate [SDK specific patch]
> -
> -Signed-off-by: Eyal Reizer <eyalr@ti.com>
> +Changed some of the default parameters
>  ---
> - hostapd/hostapd.conf |    4 ++--
> - 1 file changed, 2 insertions(+), 2 deletions(-)
> + hostapd/hostapd.conf |  726
> + +++++++-------------------------------------------
> + 1 file changed, 89 insertions(+), 637 deletions(-)
> 
>  diff --git a/hostapd/hostapd.conf b/hostapd/hostapd.conf -index
> f71a881..00843aa 100644
> +index f26f310..162fc28 100644
>  --- a/hostapd/hostapd.conf
>  +++ b/hostapd/hostapd.conf
> -@@ -83,7 +83,7 @@ ctrl_interface_group=0
> +@@ -1,9 +1,23 @@
> + ##### hostapd configuration file
> +##############################################
> + # Empty lines and lines starting with # are ignored
> ++#
> ++# Copyright (C) {2011} Texas Instruments Incorporated -
> ++http://www.ti.com/ # # Licensed under the Apache License, Version 2.0
> ++(the "License"); # you may not use this file except in compliance with
> ++the License.
> ++# You may obtain a copy of the License at #
> ++# 	http://www.apache.org/licenses/LICENSE-2.0
> ++#
> ++# Unless required by applicable law or agreed to in writing, software
> ++# distributed under the License is distributed on an "AS IS" BASIS, #
> ++WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
> implied.
> ++# See the License for the specific language governing permissions and
> ++# limitations under the License.
> +
> + # AP netdevice name (without 'ap' postfix, i.e., wlan0 uses wlan0ap
> +for  # management frames); ath0 for madwifi
> +-interface=wlan0
> ++interface=wlan1
> +
> + # In case of madwifi, atheros, and nl80211 driver interfaces, an
> +additional  # configuration parameter, bridge, may be used to notify
> +hostapd if the @@ -22,7 +36,7 @@ interface=wlan0  # default: hostap).
> +nl80211 is used with all Linux mac80211 drivers.
> + # Use driver=none if building hostapd as a standalone RADIUS server
> +that does  # not control any wireless/wired driver.
> +-# driver=hostap
> ++driver=nl80211
> +
> + # hostapd event logger configuration
> + #
> +@@ -50,10 +64,8 @@ logger_syslog=-1
> + logger_syslog_level=2
> + logger_stdout=-1
> + logger_stdout_level=2
> +-
> + # Dump file for state information (on SIGUSR1)
> +-dump_file=/tmp/hostapd.dump
> +-
> ++dump_file=/var/run/hostapd.dump
> + # Interface for separate control program. If this is specified,
> +hostapd  # will create this directory and a UNIX domain socket for
> +listening to requests  # from external programs (CLI/GUI, etc.) for
> +status information and @@ -63,7 +75,6 @@ dump_file=/tmp/hostapd.dump
> #
> +/var/run/hostapd is the recommended directory for sockets and by
> +default,  # hostapd_cli will use it when trying to connect with hostapd.
> + ctrl_interface=/var/run/hostapd
> +-
> + # Access control for the control interface can be configured by
> +setting the  # directory to allow only members of a group to use
> +sockets. This way, it is  # possible to run hostapd as root (since it
> +needs to change network @@ -77,13 +88,12 @@
> +ctrl_interface=/var/run/hostapd  #  # This variable can be a group name
> +or gid.
> + #ctrl_interface_group=wheel
> +-ctrl_interface_group=0
> +-
> +
>   ##### IEEE 802.11 related configuration
> #######################################
> 
>   # SSID to be used in IEEE 802.11 management frames  -ssid=test
>  +ssid=TexasInstruments_0001
> -
> ++
> + # Alternative formats for configuring SSID  # (double quoted string,
> +hexdump, printf-escaped string)  #ssid2="test"
> +@@ -93,27 +103,25 @@ ssid=test
>   # Country code (ISO/IEC 3166-1). Used to set regulatory domain.
>   # Set as needed to indicate country in which device is operating.
> -@@ -107,7 +107,7 @@ hw_mode=g
> + # This can limit available channels and transmit power.
> +-#country_code=US
> ++country_code=US
> +
> + # Enable IEEE 802.11d. This advertises the country_code and the set of
> +allowed  # channels and transmit power levels based on the regulatory
> +limits. The  # country_code setting must be configured with the correct
> +country for  # IEEE 802.11d functions.
> + # (default: 0 = disabled)
> +-#ieee80211d=1
> ++ieee80211d=1
> +
> + # Operation mode (a = IEEE 802.11a, b = IEEE 802.11b, g = IEEE
> +802.11g,  # Default: IEEE 802.11b  hw_mode=g
> +-
> + # Channel number (IEEE 802.11)
> + # (default: 0, i.e., not set)
> + # Please note that some drivers do not use this value from hostapd and
> +the
>   # channel will need to be configured separately with iwconfig.
>   # When set to 0, automatic channel selection will be engaged. A channel
>   # will be selected from the desired hw_mode.
>  -channel=1
> -+channel=6
> -
> +-
> ++channel=11
>   # Automatic channel selection (ACS) whitelist
>   # (default: not set)
> + # Allow only these channels in automatic channel selection @@ -123,39
> ++131,34 @@ channel=1  # (default: not set)  # Don't allow these
> +channels in automatic channel selection  # acs_blacklist=1 2 3 4 5 6 7
> +8 9 10 11
> +-
> + # Sync channel to previous operational APs  # (default: 0)  # Set to 1
> +in order to sync the channel of the current AP to the  # channel of an
> +operational radio on the same PHY. Note that this  # applies to the
> +40Mhz operating channel (primary + secondary)
> +-#ap_channel_sync=0
> ++ap_channel_sync=1
> +
> + # Beacon interval in kus (1.024 ms) (default: 100; range 15..65535)
> + beacon_int=100
> +-
> + # DTIM (delivery traffic information message) period (range 1..255):
> + # number of beacons between DTIMs (1 = every beacon includes DTIM
> +element)  # (default: 2)
> + dtim_period=2
> +-
> + # Maximum number of stations allowed in station table. New stations
> +will be  # rejected after the station table is full. IEEE 802.11 has a
> +limit of 2007  # different association IDs, so this number should not be larger
> than that.
> + # (default: 2007)
> +-max_num_sta=255
> +-
> ++max_num_sta=10
> + # RTS/CTS threshold; 2347 = disabled (default); range 0..2347  # If
> +this field is not included in hostapd.conf, hostapd will not control  #
> +RTS threshold and 'iwconfig wlan# rts <val>' can be used to set it.
> +-rts_threshold=2347
> ++#rts_threshold=2347
> +
> + # Fragmentation threshold; 2346 = disabled (default); range 256..2346
> +# If this field is not included in hostapd.conf, hostapd will not
> +control  # fragmentation threshold and 'iwconfig wlan# frag <val>' can
> +be used to set  # it.
> +-fragm_threshold=2346
> +-
> ++#fragm_threshold=2346
> + # Rate configuration
> + # Default is to enable all rates supported by the hardware. This
> +configuration  # item allows this list be filtered so that only the
> +listed rates will be left @@ -167,14 +170,14 @@ fragm_threshold=2346  #
> +default: use the most common supported rate setting for the selected  #
> +hw_mode (i.e., this line can be removed from configuration file in most
> +# cases)
> +-#supported_rates=10 20 55 110 60 90 120 180 240 360 480 540
> +-
> ++supported_rates=10 20 55 110 60 90 120 180 240 360 480 540
> + # Basic rate set configuration
> + # List of rates (in 100 kbps) that are included in the basic rate set.
> + # If this item is not included, usually reasonable default set is used.
> + #basic_rates=10 20
> + #basic_rates=10 20 55 110
> + #basic_rates=60 120 240
> ++basic_rates=10 20 55 110 60 120 240
> +
> + # Short Preamble
> + # This parameter can be used to enable optional use of short preamble
> +for @@ -185,8 +188,7 @@ fragm_threshold=2346  # disabled (and enabled
> +when such STAs disassociate) dynamically.
> + # 0 = do not allow use of short preamble (default)  # 1 = allow use of
> +short preamble
> +-#preamble=1
> +-
> ++preamble=1
> + # Station MAC address -based authentication  # Please note that this
> +kind of access control requires a driver that uses  # hostapd to take
> +care of management frame processing and as such, this can be @@ -195,7
> ++197,6 @@ fragm_threshold=2346  # 1 = deny unless in accept list  # 2 =
> +use external RADIUS server (accept/deny lists are searched first)
> + macaddr_acl=0
> +-
> + # Accept/deny lists are read from separate files (containing list of
> +# MAC addresses, one per line). Use absolute path name to make sure
> +that the  # files can be read on SIGHUP configuration reloads.
> +@@ -209,7 +210,6 @@ macaddr_acl=0
> + # bit 0 = Open System Authentication
> + # bit 1 = Shared Key Authentication (requires WEP)
> + auth_algs=3
> +-
> + # Send empty SSID in beacons and ignore probe request frames that do
> +not  # specify full SSID, i.e., require stations to know SSID.
> + # default: disabled (0)
> +@@ -219,14 +219,12 @@ auth_algs=3
> + #     with some clients that do not support empty SSID) and ignore probe
> + #     requests for broadcast SSID
> + ignore_broadcast_ssid=0
> +-
> + # Additional vendor specfic elements for Beacon and Probe Response
> +frames  # This parameter can be used to add additional vendor specific
> +element(s) into  # the end of the Beacon and Probe Response frames. The
> +format for these  # element(s) is a hexdump of the raw information
> +elements (id+len+payload for  # one or more elements)
> + #vendor_elements=dd0411223301
> +-
> + # TX queue parameters (EDCF / bursting)  # tx_queue_<queue
> +name>_<param>  # queues: data0, data1, data2, data3, after_beacon,
> +beacon @@ -243,31 +241,31 @@ ignore_broadcast_ssid=0  # to the clients.
> + #
> + # Low priority / AC_BK = background
> +-#tx_queue_data3_aifs=7
> +-#tx_queue_data3_cwmin=15
> +-#tx_queue_data3_cwmax=1023
> +-#tx_queue_data3_burst=0
> ++tx_queue_data3_aifs=7
> ++tx_queue_data3_cwmin=15
> ++tx_queue_data3_cwmax=1023
> ++tx_queue_data3_burst=0
> + # Note: for IEEE 802.11b mode: cWmin=31 cWmax=1023 burst=0  #  #
> +Normal priority / AC_BE = best effort
> +-#tx_queue_data2_aifs=3
> +-#tx_queue_data2_cwmin=15
> +-#tx_queue_data2_cwmax=63
> +-#tx_queue_data2_burst=0
> ++tx_queue_data2_aifs=3
> ++tx_queue_data2_cwmin=15
> ++tx_queue_data2_cwmax=63
> ++tx_queue_data2_burst=0
> + # Note: for IEEE 802.11b mode: cWmin=31 cWmax=127 burst=0  #  # High
> +priority / AC_VI = video
> +-#tx_queue_data1_aifs=1
> +-#tx_queue_data1_cwmin=7
> +-#tx_queue_data1_cwmax=15
> +-#tx_queue_data1_burst=3.0
> ++tx_queue_data1_aifs=1
> ++tx_queue_data1_cwmin=7
> ++tx_queue_data1_cwmax=15
> ++tx_queue_data1_burst=3.0
> + # Note: for IEEE 802.11b mode: cWmin=15 cWmax=31 burst=6.0  #  #
> +Highest priority / AC_VO = voice
> +-#tx_queue_data0_aifs=1
> +-#tx_queue_data0_cwmin=3
> +-#tx_queue_data0_cwmax=7
> +-#tx_queue_data0_burst=1.5
> ++tx_queue_data0_aifs=1
> ++tx_queue_data0_cwmin=3
> ++tx_queue_data0_cwmax=7
> ++tx_queue_data0_burst=1.5
> + # Note: for IEEE 802.11b mode: cWmin=7 cWmax=15 burst=3.3
> +
> + # 802.1D Tag (= UP) to AC mappings
> +@@ -298,42 +296,42 @@ ignore_broadcast_ssid=0  # note - here cwMin and
> +cmMax are in exponent form. the actual cw value used  # will be (2^n)-1
> +where n is the value given here  #
> +-wmm_enabled=1
> ++wme_enabled=1
> + #
> + # WMM-PS Unscheduled Automatic Power Save Delivery [U-APSD]  # Enable
> +this flag if U-APSD supported outside hostapd (eg., Firmware/driver)
> +-#uapsd_advertisement_enabled=1
> ++uapsd_advertisement_enabled=1
> + #
> + # Low priority / AC_BK = background
> +-wmm_ac_bk_cwmin=4
> +-wmm_ac_bk_cwmax=10
> +-wmm_ac_bk_aifs=7
> +-wmm_ac_bk_txop_limit=0
> +-wmm_ac_bk_acm=0
> ++wme_ac_bk_cwmin=4
> ++wme_ac_bk_cwmax=10
> ++wme_ac_bk_aifs=7
> ++wme_ac_bk_txop_limit=0
> ++wme_ac_bk_acm=0
> + # Note: for IEEE 802.11b mode: cWmin=5 cWmax=10  #  # Normal priority
> +/ AC_BE = best effort
> +-wmm_ac_be_aifs=3
> +-wmm_ac_be_cwmin=4
> +-wmm_ac_be_cwmax=10
> +-wmm_ac_be_txop_limit=0
> +-wmm_ac_be_acm=0
> ++wme_ac_be_aifs=3
> ++wme_ac_be_cwmin=4
> ++wme_ac_be_cwmax=10
> ++wme_ac_be_txop_limit=0
> ++wme_ac_be_acm=0
> + # Note: for IEEE 802.11b mode: cWmin=5 cWmax=7  #  # High priority /
> +AC_VI = video
> +-wmm_ac_vi_aifs=2
> +-wmm_ac_vi_cwmin=3
> +-wmm_ac_vi_cwmax=4
> +-wmm_ac_vi_txop_limit=94
> +-wmm_ac_vi_acm=0
> ++wme_ac_vi_aifs=2
> ++wme_ac_vi_cwmin=3
> ++wme_ac_vi_cwmax=4
> ++wme_ac_vi_txop_limit=94
> ++wme_ac_vi_acm=0
> + # Note: for IEEE 802.11b mode: cWmin=4 cWmax=5 txop_limit=188  #  #
> +Highest priority / AC_VO = voice
> +-wmm_ac_vo_aifs=2
> +-wmm_ac_vo_cwmin=2
> +-wmm_ac_vo_cwmax=3
> +-wmm_ac_vo_txop_limit=47
> +-wmm_ac_vo_acm=0
> ++wme_ac_vo_aifs=2
> ++wme_ac_vo_cwmin=2
> ++wme_ac_vo_cwmax=3
> ++wme_ac_vo_txop_limit=47
> ++wme_ac_vo_acm=0
> + # Note: for IEEE 802.11b mode: cWmin=3 cWmax=4 burst=102
> +
> + # Static WEP key configuration
> +@@ -353,7 +351,6 @@ wmm_ac_vo_acm=0
> + #wep_key1="vwxyz"
> + #wep_key2=0102030405060708090a0b0c0d
> + #wep_key3=".2.4.6.8.0.23"
> +-
> + # Station inactivity limit
> + #
> + # If a station does not send anything in ap_max_inactivity seconds, an
> +@@ -369,7 +366,7 @@ wmm_ac_vo_acm=0  # disassociation frame is not
> sent
> +immediately without first polling  # the STA with a data frame.
> + # default: 300 (i.e., 5 minutes)
> +-#ap_max_inactivity=300
> ++ap_max_inactivity=10000
> + #
> + # The inactivity polling can be disabled to disconnect stations based
> +on  # inactivity timeout so that idle stations are more likely to be
> +disconnected @@ -380,7 +377,7 @@ wmm_ac_vo_acm=0  # Disassociate
> +stations based on excessive transmission failures or other  #
> +indications of connection loss. This depends on the driver capabilities
> +and  # may not be available with all drivers.
> +-#disassoc_low_ack=1
> ++disassoc_low_ack=1
> +
> + # Maximum allowed Listen Interval (how many Beacon periods STAs are
> +allowed to  # remain asleep). Default: 65535 (no limit apart from field
> +size) @@ -400,14 +397,13 @@ wmm_ac_vo_acm=0  # Client isolation can be
> +used to prevent low-level bridging of frames between  # associated
> +stations in the BSS. By default, this bridging is allowed.
> + #ap_isolate=1
> +-
> + ##### IEEE 802.11n related configuration
> +######################################
> +
> + # ieee80211n: Whether IEEE 802.11n (HT) is enabled  # 0 = disabled
> +(default)  # 1 = enabled  # Note: You will also need to enable WMM for
> +full HT functionality.
> +-#ieee80211n=1
> ++ieee80211n=1
> +
> + # ht_capab: HT capabilities (list of flags)  # LDPC coding capability:
> +[LDPC] = supported @@ -442,162 +438,10 @@ wmm_ac_vo_acm=0  #
> DSSS/CCK
> +Mode in 40 MHz: [DSSS_CCK-40] = allowed (not allowed if not set)  #
> +PSMP support: [PSMP] (disabled if not set)  # L-SIG TXOP protection
> +support: [LSIG-TXOP-PROT] (disabled if not set)
> +-#ht_capab=[HT40-][SHORT-GI-20][SHORT-GI-40]
> ++ht_capab=[SHORT-GI-20][GF]
> +
> + # Require stations to support HT PHY (reject association if they do
> +not)
> + #require_ht=1
> +-
> +-##### IEEE 802.11ac related configuration
> +#####################################
> +-
> +-# ieee80211ac: Whether IEEE 802.11ac (VHT) is enabled -# 0 = disabled
> +(default) -# 1 = enabled -# Note: You will also need to enable WMM for
> +full VHT functionality.
> +-#ieee80211ac=1
> +-
> +-# vht_capab: VHT capabilities (list of flags) -# -# vht_max_mpdu_len:
> +[MAX-MPDU-7991] [MAX-MPDU-11454] -# Indicates maximum MPDU length
> -# 0
> += 3895 octets (default) -# 1 = 7991 octets -# 2 = 11454 octets -# 3 =
> +reserved -# -# supported_chan_width: [VHT160] [VHT160-80PLUS80] -#
> +Indicates supported Channel widths -# 0 = 160 MHz & 80+80 channel
> +widths are not supported (default) -# 1 = 160 MHz channel width is
> +supported -# 2 = 160 MHz & 80+80 channel widths are supported -# 3 =
> +reserved -# -# Rx LDPC coding capability: [RXLDPC] -# Indicates support
> +for receiving LDPC coded pkts -# 0 = Not supported (default) -# 1 =
> +Supported -# -# Short GI for 80 MHz: [SHORT-GI-80] -# Indicates short
> +GI support for reception of packets transmitted with TXVECTOR -# params
> +format equal to VHT and CBW = 80Mhz -# 0 = Not supported (default) -# 1
> += Supported -# -# Short GI for 160 MHz: [SHORT-GI-160] -# Indicates
> +short GI support for reception of packets transmitted with TXVECTOR -#
> +params format equal to VHT and CBW = 160Mhz -# 0 = Not supported
> +(default) -# 1 = Supported -# -# Tx STBC: [TX-STBC-2BY1] -# Indicates
> +support for the transmission of at least 2x1 STBC -# 0 = Not supported
> +(default) -# 1 = Supported -# -# Rx STBC: [RX-STBC-1] [RX-STBC-12]
> +[RX-STBC-123] [RX-STBC-1234] -# Indicates support for the reception of
> +PPDUs using STBC -# 0 = Not supported (default) -# 1 = support of one
> +spatial stream -# 2 = support of one and two spatial streams -# 3 =
> +support of one, two and three spatial streams -# 4 = support of one,
> +two, three and four spatial streams -# 5,6,7 = reserved -# -# SU
> +Beamformer Capable: [SU-BEAMFORMER] -# Indicates support for operation
> +as a single user beamformer -# 0 = Not supported (default) -# 1 =
> +Supported -# -# SU Beamformee Capable: [SU-BEAMFORMEE] -# Indicates
> +support for operation as a single user beamformee -# 0 = Not supported
> +(default) -# 1 = Supported -# -# Compressed Steering Number of
> +Beamformer Antennas Supported: [BF-ANTENNA-2]
> +-#   Beamformee's capability indicating the maximum number of beamformer
> +-#   antennas the beamformee can support when sending compressed
> beamforming
> +-#   feedback
> +-# If SU beamformer capable, set to maximum value minus 1 -# else
> +reserved (default) -# -# Number of Sounding Dimensions:
> +[SOUNDING-DIMENSION-2] -# Beamformer's capability indicating the
> +maximum value of the NUM_STS parameter -# in the TXVECTOR of a VHT NDP
> +-# If SU beamformer capable, set to maximum value minus 1 -# else
> +reserved (default) -# -# MU Beamformer Capable: [MU-BEAMFORMER] -#
> +Indicates support for operation as an MU beamformer -# 0 = Not
> +supported or sent by Non-AP STA (default) -# 1 = Supported -# -# MU
> +Beamformee Capable: [MU-BEAMFORMEE] -# Indicates support for operation
> +as an MU beamformee -# 0 = Not supported or sent by AP (default) -# 1 =
> +Supported -# -# VHT TXOP PS: [VHT-TXOP-PS] -# Indicates whether or not
> +the AP supports VHT TXOP Power Save Mode -#  or whether or not the STA
> +is in VHT TXOP Power Save mode -# 0 = VHT AP doesnt support VHT TXOP PS
> +mode (OR) VHT Sta not in VHT TXOP PS -#  mode -# 1 = VHT AP supports
> +VHT TXOP PS mode (OR) VHT Sta is in VHT TXOP power save -#  mode -# -#
> ++HTC-VHT Capable: [HTC-VHT] -# Indicates whether or not the STA
> +supports receiving a VHT variant HT Control -# field.
> +-# 0 = Not supported (default)
> +-# 1 = supported
> +-#
> +-# Maximum A-MPDU Length Exponent:
> +[MAX-A-MPDU-LEN-EXP0]..[MAX-A-MPDU-LEN-EXP7]
> +-# Indicates the maximum length of A-MPDU pre-EOF padding that the STA
> +can recv -# This field is an integer in the range of 0 to 7.
> +-# The length defined by this field is equal to -# 2 pow(13 + Maximum
> +A-MPDU Length Exponent) -1 octets -# -# VHT Link Adaptation Capable:
> +[VHT-LINK-ADAPT2] [VHT-LINK-ADAPT3] -# Indicates whether or not the STA
> +supports link adaptation using VHT variant -# HT Control field -# If
> ++HTC-VHTcapable is 1 -#  0 = (no feedback) if the STA does not provide
> +VHT MFB (default) -#  1 = reserved -#  2 = (Unsolicited) if the STA
> +provides only unsolicited VHT MFB -#  3 = (Both) if the STA can provide
> +VHT MFB in response to VHT MRQ and if the
> +-#      STA provides unsolicited VHT MFB
> +-# Reserved if +HTC-VHTcapable is 0
> +-#
> +-# Rx Antenna Pattern Consistency: [RX-ANTENNA-PATTERN] -# Indicates
> +the possibility of Rx antenna pattern change -# 0 = Rx antenna pattern
> +might change during the lifetime of an association -# 1 = Rx antenna
> +pattern does not change during the lifetime of an association -# -# Tx
> +Antenna Pattern Consistency: [TX-ANTENNA-PATTERN] -# Indicates the
> +possibility of Tx antenna pattern change -# 0 = Tx antenna pattern
> +might change during the lifetime of an association -# 1 = Tx antenna
> +pattern does not change during the lifetime of an association
> +-#vht_capab=[SHORT-GI-80][HTC-VHT]
> +-#
> +-# Require stations to support VHT PHY (reject association if they do
> +not)
> +-#require_vht=1
> +-
> +-# 0 = 20 or 40 MHz operating Channel width -# 1 = 80 MHz channel width
> +-# 2 = 160 MHz channel width -# 3 = 80+80 MHz channel width
> +-#vht_oper_chwidth=1
> +-#
> +-# center freq = 5 GHz + (5 * index)
> +-# So index 42 gives center freq 5.210 GHz -# which is channel 42 in 5G
> +band -#
> +-#vht_oper_centr_freq_seg0_idx=42
> +-#
> +-# center freq = 5 GHz + (5 * index)
> +-# So index 159 gives center freq 5.795 GHz -# which is channel 159 in
> +5G band -#
> +-#vht_oper_centr_freq_seg1_idx=159
> +-
> + ##### IEEE 802.1X-2004 related configuration
> +##################################
> +
> + # Require IEEE 802.1X authorization
> +@@ -625,11 +469,10 @@ wmm_ac_vo_acm=0
> + #wep_key_len_broadcast=5
> + #wep_key_len_unicast=5
> + # Rekeying period in seconds. 0 = do not rekey (i.e., set keys only
> +once)
> +-#wep_rekey_period=300
> +-
> ++wep_rekey_period=0
> + # EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed
> +only if  # only broadcast keys are used)
> +-eapol_key_index_workaround=0
> ++#eapol_key_index_workaround=0
> +
> + # EAP reauthentication period in seconds (default: 3600 seconds; 0 =
> +disable  # reauthentication).
> +@@ -640,7 +483,6 @@ eapol_key_index_workaround=0  # mechanism used
> in
> +wired authentication, but it also requires that the port  # is only
> +used by one station.
> + #use_pae_group_addr=1
> +-
> + ##### Integrated EAP server
> +###################################################
> +
> + # Optionally, hostapd can be configured to use an integrated EAP
> +server @@ -651,8 +493,7 @@ eapol_key_index_workaround=0  # Use
> +integrated EAP server instead of external RADIUS authentication  #
> +server. This is also needed if hostapd is configured to act as a RADIUS
> +# authentication server.
> +-eap_server=0
> +-
> ++eap_server=1
> + # Path for EAP server user database
> + # If SQLite support is included, this can be set to "sqlite:/path/to/sqlite.db"
> + # to use SQLite database instead of a text file.
> +@@ -757,21 +598,12 @@ eap_server=0
> + # connect. Note: This is only used with EAP-TTLS and EAP-FAST. If any
> +other  # EAP method is enabled, the peer will be allowed to connect without
> TNC.
> + #tnc=1
> +-
> +-
> +-##### IEEE 802.11f - Inter-Access Point Protocol (IAPP)
> +#######################
> +-
> +-# Interface to be used for IAPP broadcast packets
> +-#iapp_interface=eth0
> +-
> +-
> + ##### RADIUS client configuration
> +#############################################
> + # for IEEE 802.1X with external Authentication Server, IEEE 802.11  #
> +authentication with external ACL for MAC addresses, and accounting
> +
> + # The own IP address of the access point (used as NAS-IP-Address)
> + own_ip_addr=127.0.0.1
> +-
> + # Optional NAS-Identifier string for RADIUS messages. When used, this
> +should be  # a unique to the NAS within the scope of the RADIUS server.
> +For example, a  # fully qualified domain name can be used here.
> +@@ -922,8 +754,6 @@ own_ip_addr=127.0.0.1
> +
> + # Use IPv6 with RADIUS server (IPv4 will also be supported using IPv6
> +API)
> + #radius_server_ipv6=1
> +-
> +-
> + ##### WPA/IEEE 802.11i configuration
> +##########################################
> +
> + # Enable WPA. Setting this variable configures the AP to require WPA
> +(either @@ -982,23 +812,18 @@ own_ip_addr=127.0.0.1
> #wpa_pairwise=TKIP
> +CCMP  # Pairwise cipher for RSN/WPA2 (default: use wpa_pairwise value)
> +#rsn_pairwise=CCMP
> +-
> + # Time interval for rekeying GTK (broadcast/multicast encryption keys)
> +in  # seconds. (dot11RSNAConfigGroupRekeyTime)
> +-#wpa_group_rekey=600
> +-
> ++wpa_group_rekey=0
> + # Rekey GTK when any STA that possesses the current GTK is leaving the BSS.
> + # (dot11RSNAConfigGroupRekeyStrict)
> + #wpa_strict_rekey=1
> +-
> + # Time interval for rekeying GMK (master key used internally to
> +generate GTKs  # (in seconds).
> +-#wpa_gmk_rekey=86400
> +-
> ++wpa_gmk_rekey=0
> + # Maximum lifetime for PTK in seconds. This can be used to enforce
> +rekeying of  # PTK to mitigate some attacks against TKIP deficiencies.
> +-#wpa_ptk_rekey=600
> +-
> ++wpa_ptk_rekey=0
> + # Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to
> +speed up  # roaming be pre-authenticating IEEE 802.1X/EAP part of the
> +full RSN  # authentication and key handshake before actually associating with a
> new AP.
> +@@ -1050,55 +875,6 @@ own_ip_addr=127.0.0.1  # 0 = disabled (default)
> +# 1 = enabled
> + #okc=1
> +-
> +-
> +-##### IEEE 802.11r configuration
> +##############################################
> +-
> +-# Mobility Domain identifier (dot11FTMobilityDomainID, MDID) -# MDID
> +is used to indicate a group of APs (within an ESS, i.e., sharing the -#
> +same SSID) between which a STA can use Fast BSS Transition.
> +-# 2-octet identifier as a hex string.
> +-#mobility_domain=a1b2
> +-
> +-# PMK-R0 Key Holder identifier (dot11FTR0KeyHolderID) -# 1 to 48 octet
> +identifier.
> +-# This is configured with nas_identifier (see RADIUS client section above).
> +-
> +-# Default lifetime of the PMK-RO in minutes; range 1..65535 -#
> +(dot11FTR0KeyLifetime)
> +-#r0_key_lifetime=10000
> +-
> +-# PMK-R1 Key Holder identifier (dot11FTR1KeyHolderID) -# 6-octet
> +identifier as a hex string.
> +-#r1_key_holder=000102030405
> +-
> +-# Reassociation deadline in time units (TUs / 1.024 ms; range
> +1000..65535) -# (dot11FTReassociationDeadline)
> +-#reassociation_deadline=1000
> +-
> +-# List of R0KHs in the same Mobility Domain -# format: <MAC address>
> +<NAS Identifier> <128-bit key as hex string> -# This list is used to
> +map R0KH-ID (NAS Identifier) to a destination MAC -# address when
> +requesting PMK-R1 key from the R0KH that the STA used during the -#
> +Initial Mobility Domain Association.
> +-#r0kh=02:01:02:03:04:05 r0kh-1.example.com
> +000102030405060708090a0b0c0d0e0f
> +-#r0kh=02:01:02:03:04:06 r0kh-2.example.com
> +00112233445566778899aabbccddeeff -# And so on.. One line per R0KH.
> +-
> +-# List of R1KHs in the same Mobility Domain -# format: <MAC address>
> +<R1KH-ID> <128-bit key as hex string> -# This list is used to map
> +R1KH-ID to a destination MAC address when sending -# PMK-R1 key from
> +the R0KH. This is also the list of authorized R1KHs in the MD -# that
> +can request PMK-R1 keys.
> +-#r1kh=02:01:02:03:04:05 02:11:22:33:44:55
> +000102030405060708090a0b0c0d0e0f
> +-#r1kh=02:01:02:03:04:06 02:11:22:33:44:66
> +00112233445566778899aabbccddeeff -# And so on.. One line per R1KH.
> +-
> +-# Whether PMK-R1 push is enabled at R0KH -# 0 = do not push PMK-R1 to
> +all configured R1KHs (default) -# 1 = push PMK-R1 to all configured
> +R1KHs whenever a new PMK-R0 is derived
> +-#pmk_r1_push=1
> +-
> + ##### Neighbor table
> +##########################################################
> + # Maximum number of entries kept in AP table (either for neigbor table
> +or for  # detecting Overlapping Legacy BSS Condition). The oldest entry
> +will be @@ -1106,36 +882,29 @@ own_ip_addr=127.0.0.1  # limit. Note!
> +WFA certification for IEEE 802.11g requires that OLBC is  # enabled, so
> +this field should not be set to 0 when using IEEE 802.11g.
> + # default: 255
> +-#ap_table_max_size=255
> +-
> ++ap_table_max_size=255
> + # Number of seconds of no frames received after which entries may be
> +deleted  # from the AP table. Since passive scanning is not usually
> +performed frequently  # this should not be set to very small value. In
> +addition, there is no  # guarantee that every scan cycle will receive
> +beacon frames from the  # neighboring APs.
> + # default: 60
> +-#ap_table_expiration_time=3600
> +-
> +-
> ++ap_table_expiration_time=60
> + ##### Wi-Fi Protected Setup (WPS)
> +#############################################
> +-
> + # WPS state
> + # 0 = WPS disabled (default)
> + # 1 = WPS enabled, not configured
> + # 2 = WPS enabled, configured
> +-#wps_state=2
> +-
> ++wps_state=2
> + # AP can be configured into a locked state where new WPS Registrar are
> +not  # accepted, but previously authorized Registrars (including the
> +internal one)  # can continue to add new Enrollees.
> +-#ap_setup_locked=1
> +-
> ++ap_setup_locked=1
> + # Universally Unique IDentifier (UUID; see RFC 4122) of the device  #
> +This value is used as the UUID for the internal WPS Registrar. If the
> +AP  # is also using UPnP, this value should be set to the device's UPnP UUID.
> + # If not configured, UUID will be generated based on the local MAC address.
> +-#uuid=12345678-9abc-def0-1234-56789abcdef0
> +-
> ++uuid=12345678-9abc-def0-1234-56789abcdef0
> + # Note: If wpa_psk_file is set, WPS is used to generate random,
> +per-device PSKs  # that will be appended to the wpa_psk_file. If
> +wpa_psk_file is not set, the  # default PSK (wpa_psk/wpa_passphrase)
> +will be delivered to Enrollees. Use of @@ -1149,27 +918,21 @@
> +own_ip_addr=127.0.0.1  # pending PIN requests. If the following
> +variable is set, the PIN requests will  # be written to the configured file.
> + #wps_pin_requests=/var/run/hostapd_wps_pin_requests
> +-
> + # Device Name
> + # User-friendly description of device; up to 32 octets encoded in
> +UTF-8 -#device_name=Wireless AP
> +-
> ++device_name=Sitara
> + # Manufacturer
> + # The manufacturer of the device (up to 64 ASCII characters)
> +-#manufacturer=Company
> +-
> ++manufacturer=TexasInstruments
> + # Model Name
> + # Model of the device (up to 32 ASCII characters) -#model_name=WAP
> +-
> ++model_name=TI_Connectivity_module
> + # Model Number
> + # Additional device description (up to 32 ASCII characters)
> +-#model_number=123
> +-
> ++model_number=wl18xx
> + # Serial Number
> + # Serial number of the device (up to 32 characters)
> +-#serial_number=12345
> +-
> ++serial_number=12345
> + # Primary Device Type
> + # Used format: <categ>-<OUI>-<subcateg>  # categ = Category as an
> +integer value @@ -1181,8 +944,7 @@ own_ip_addr=127.0.0.1
> + #   1-0050F204-2 (Computer / Server)
> + #   5-0050F204-1 (Storage / NAS)
> + #   6-0050F204-1 (Network Infrastructure / AP)
> +-#device_type=6-0050F204-1
> +-
> ++device_type=0-00000000-0
> + # OS Version
> + # 4-octet operating system version number (hex string)
> + #os_version=01020300
> +@@ -1192,8 +954,7 @@ own_ip_addr=127.0.0.1  # Available methods: usba
> +ethernet label display ext_nfc_token int_nfc_token
> + #	nfc_interface push_button keypad virtual_display physical_display
> + #	virtual_push_button physical_push_button
> +-#config_methods=label virtual_display virtual_push_button keypad
> +-
> ++config_methods=virtual_display virtual_push_button keypad
> + # WPS capability discovery workaround for PBC with Windows 7  #
> +Windows 7 uses incorrect way of figuring out AP's WPS capabilities by
> +acting  # as a Registrar and using M1 from the AP. The config methods
> +attribute in that @@ -1228,312 +989,3 @@ own_ip_addr=127.0.0.1  #
> +option points to an external file that much contain the WPS Credential
> +# attribute(s) as binary data.
> + #extra_cred=hostapd.cred
> +-
> +-# Credential processing
> +-#   0 = process received credentials internally (default)
> +-#   1 = do not process received credentials; just pass them over ctrl_iface to
> +-#	external program(s)
> +-#   2 = process received credentials internally and pass them over ctrl_iface
> +-#	to external program(s)
> +-# Note: With wps_cred_processing=1, skip_cred_build should be set to 1
> +and -# extra_cred be used to provide the Credential data for Enrollees.
> +-#
> +-# wps_cred_processing=1 will disabled automatic updates of
> +hostapd.conf file -# both for Credential processing and for marking AP
> +Setup Locked based on -# validation failures of AP PIN. An external
> +program is responsible on updating -# the configuration appropriately in this
> case.
> +-#wps_cred_processing=0
> +-
> +-# AP Settings Attributes for M7
> +-# By default, hostapd generates the AP Settings Attributes for M7
> +based on the -# current configuration. It is possible to override this
> +by providing a file -# with pre-configured attributes. This is similar
> +to extra_cred file format, -# but the AP Settings attributes are not
> +encapsulated in a Credential -# attribute.
> +-#ap_settings=hostapd.ap_settings
> +-
> +-# WPS UPnP interface
> +-# If set, support for external Registrars is enabled.
> +-#upnp_iface=br0
> +-
> +-# Friendly Name (required for UPnP)
> +-# Short description for end use. Should be less than 64 characters.
> +-#friendly_name=WPS Access Point
> +-
> +-# Manufacturer URL (optional for UPnP)
> +-#manufacturer_url=http://www.example.com/
> +-
> +-# Model Description (recommended for UPnP) -# Long description for end
> +user. Should be less than 128 characters.
> +-#model_description=Wireless Access Point
> +-
> +-# Model URL (optional for UPnP)
> +-#model_url=http://www.example.com/model/
> +-
> +-# Universal Product Code (optional for UPnP) -# 12-digit, all-numeric
> +code that identifies the consumer package.
> +-#upc=123456789012
> +-
> +-# WPS RF Bands (a = 5G, b = 2.4G, g = 2.4G, ag = dual band) -# This
> +value should be set according to RF band(s) supported by the AP if -#
> +hw_mode is not set. For dual band dual concurrent devices, this needs
> +to be -# set to ag to allow both RF bands to be advertized.
> +-#wps_rf_bands=ag
> +-
> +-# NFC password token for WPS
> +-# These parameters can be used to configure a fixed NFC password token
> +for the -# AP. This can be generated, e.g., with nfc_pw_token from
> +wpa_supplicant. When -# these parameters are used, the AP is assumed to
> +be deployed with a NFC tag -# that includes the matching NFC password
> +token (e.g., written based on the -# NDEF record from nfc_pw_token).
> +-#
> +-#wps_nfc_dev_pw_id: Device Password ID (16..65535)
> +-#wps_nfc_dh_pubkey: Hexdump of DH Public Key
> +-#wps_nfc_dh_privkey: Hexdump of DH Private Key
> +-#wps_nfc_dev_pw: Hexdump of Device Password
> +-
> +-##### Wi-Fi Direct (P2P)
> +######################################################
> +-
> +-# Enable P2P Device management
> +-#manage_p2p=1
> +-
> +-# Allow cross connection
> +-#allow_cross_connection=1
> +-
> +-#### TDLS (IEEE 802.11z-2010)
> +#################################################
> +-
> +-# Prohibit use of TDLS in this BSS
> +-#tdls_prohibit=1
> +-
> +-# Prohibit use of TDLS Channel Switching in this BSS
> +-#tdls_prohibit_chan_switch=1
> +-
> +-##### IEEE 802.11v-2011
> +#######################################################
> +-
> +-# Time advertisement
> +-# 0 = disabled (default)
> +-# 2 = UTC time at which the TSF timer is 0
> +-#time_advertisement=2
> +-
> +-# Local time zone as specified in 8.3 of IEEE Std 1003.1-2004:
> +-# stdoffset[dst[offset][,start[/time],end[/time]]]
> +-#time_zone=EST5
> +-
> +-##### IEEE 802.11u-2011
> +#######################################################
> +-
> +-# Enable Interworking service
> +-#interworking=1
> +-
> +-# Access Network Type
> +-# 0 = Private network
> +-# 1 = Private network with guest access -# 2 = Chargeable public
> +network -# 3 = Free public network -# 4 = Personal device network -# 5
> += Emergency services only network -# 14 = Test or experimental -# 15 =
> +Wildcard
> +-#access_network_type=0
> +-
> +-# Whether the network provides connectivity to the Internet -# 0 =
> +Unspecified -# 1 = Network provides connectivity to the Internet
> +-#internet=1
> +-
> +-# Additional Step Required for Access
> +-# Note: This is only used with open network, i.e., ASRA shall ne set
> +to 0 if -# RSN is used.
> +-#asra=0
> +-
> +-# Emergency services reachable
> +-#esr=0
> +-
> +-# Unauthenticated emergency service accessible
> +-#uesa=0
> +-
> +-# Venue Info (optional)
> +-# The available values are defined in IEEE Std 802.11u-2011, 7.3.1.34.
> +-# Example values (group,type):
> +-# 0,0 = Unspecified
> +-# 1,7 = Convention Center
> +-# 1,13 = Coffee Shop
> +-# 2,0 = Unspecified Business
> +-# 7,1  Private Residence
> +-#venue_group=7
> +-#venue_type=1
> +-
> +-# Homogeneous ESS identifier (optional; dot11HESSID) -# If set, this
> +shall be identifical to one of the BSSIDs in the homogeneous -# ESS and
> +this shall be set to the same value across all BSSs in homogeneous -#
> +ESS.
> +-#hessid=02:03:04:05:06:07
> +-
> +-# Roaming Consortium List
> +-# Arbitrary number of Roaming Consortium OIs can be configured with
> +each line -# adding a new OI to the list. The first three entries are
> +available through -# Beacon and Probe Response frames. Any additional
> +entry will be available only -# through ANQP queries. Each OI is
> +between 3 and 15 octets and is configured as -# a hexstring.
> +-#roaming_consortium=021122
> +-#roaming_consortium=2233445566
> +-
> +-# Venue Name information
> +-# This parameter can be used to configure one or more Venue Name
> +Duples for -# Venue Name ANQP information. Each entry has a two or
> +three character language -# code (ISO-639) separated by colon from the venue
> name string.
> +-# Note that venue_group and venue_type have to be set for Venue Name
> +-# information to be complete.
> +-#venue_name=eng:Example venue
> +-#venue_name=fin:Esimerkkipaikka
> +-
> +-# Network Authentication Type
> +-# This parameter indicates what type of network authentication is used
> +in the -# network.
> +-# format: <network auth type indicator (1-octet hex str)> [redirect
> +URL] -# Network Authentication Type Indicator values:
> +-# 00 = Acceptance of terms and conditions -# 01 = On-line enrollment
> +supported -# 02 = http/https redirection -# 03 = DNS redirection
> +-#network_auth_type=00
> +-#network_auth_type=02http://www.example.com/redirect/me/here/
> +-
> +-# IP Address Type Availability
> +-# format: <1-octet encoded value as hex str> -# (ipv4_type & 0x3f) <<
> +2 | (ipv6_type & 0x3) -# ipv4_type:
> +-# 0 = Address type not available
> +-# 1 = Public IPv4 address available
> +-# 2 = Port-restricted IPv4 address available -# 3 = Single NATed
> +private IPv4 address available -# 4 = Double NATed private IPv4 address
> +available -# 5 = Port-restricted IPv4 address and single NATed IPv4
> +address available -# 6 = Port-restricted IPv4 address and double NATed
> +IPv4 address available -# 7 = Availability of the address type is not
> +known -# ipv6_type:
> +-# 0 = Address type not available
> +-# 1 = Address type available
> +-# 2 = Availability of the address type not known
> +-#ipaddr_type_availability=14
> +-
> +-# Domain Name
> +-# format: <variable-octet str>[,<variable-octet str>]
> +-#domain_name=example.com,another.example.com,yet-
> another.example.com
> +-
> +-# 3GPP Cellular Network information
> +-# format: <MCC1,MNC1>[;<MCC2,MNC2>][;...]
> +-#anqp_3gpp_cell_net=244,91;310,026;234,56
> +-
> +-# NAI Realm information
> +-# One or more realm can be advertised. Each nai_realm line adds a new
> +realm to -# the set. These parameters provide information for stations
> +using Interworking -# network selection to allow automatic connection
> +to a network based on -# credentials.
> +-# format: <encoding>,<NAI Realm(s)>[,<EAP Method 1>][,<EAP Method
> +2>][,...] -# encoding:
> +-#	0 = Realm formatted in accordance with IETF RFC 4282
> +-#	1 = UTF-8 formatted character string that is not formatted in
> +-#	    accordance with IETF RFC 4282
> +-# NAI Realm(s): Semi-colon delimited NAI Realm(s) -# EAP Method: <EAP
> +Method>[:<[AuthParam1:Val1]>][<[AuthParam2:Val2]>][...]
> +-# AuthParam (Table 8-188 in IEEE Std 802.11-2012):
> +-# ID 2 = Non-EAP Inner Authentication Type
> +-#	1 = PAP, 2 = CHAP, 3 = MSCHAP, 4 = MSCHAPV2
> +-# ID 3 = Inner authentication EAP Method Type -# ID 5 = Credential
> +Type
> +-#	1 = SIM, 2 = USIM, 3 = NFC Secure Element, 4 = Hardware Token,
> +-#	5 = Softoken, 6 = Certificate, 7 = username/password, 9 = Anonymous,
> +-#	10 = Vendor Specific
> +-#nai_realm=0,example.com;example.net
> +-# EAP methods EAP-TLS with certificate and EAP-TTLS/MSCHAPv2 with -#
> +username/password -#nai_realm=0,example.org,13[5:6],21[2:4][5:7]
> +-
> +-##### Hotspot 2.0
> +############################################################
> #
> +-
> +-# Enable Hotspot 2.0 support
> +-#hs20=1
> +-
> +-# Disable Downstream Group-Addressed Forwarding (DGAF) -# This can be
> +used to configure a network where no group-addressed frames are -#
> +allowed. The AP will not forward any group-address frames to the
> +stations and -# random GTKs are issued for each station to prevent
> +associated stations from -# forging such frames to other stations in the BSS.
> +-#disable_dgaf=1
> +-
> +-# Operator Friendly Name
> +-# This parameter can be used to configure one or more Operator
> +Friendly Name -# Duples. Each entry has a two or three character
> +language code (ISO-639) -# separated by colon from the operator friendly
> name string.
> +-#hs20_oper_friendly_name=eng:Example operator
> +-#hs20_oper_friendly_name=fin:Esimerkkioperaattori
> +-
> +-# Connection Capability
> +-# This can be used to advertise what type of IP traffic can be sent
> +through the -# hotspot (e.g., due to firewall allowing/blocking
> protocols/ports).
> +-# format: <IP Protocol>:<Port Number>:<Status> -# IP Protocol: 1 =
> +ICMP, 6 = TCP, 17 = UDP -# Port Number: 0..65535 -# Status: 0 = Closed,
> +1 = Open, 2 = Unknown -# Each hs20_conn_capab line is added to the list
> +of advertised tuples.
> +-#hs20_conn_capab=1:0:2
> +-#hs20_conn_capab=6:22:1
> +-#hs20_conn_capab=17:5060:0
> +-
> +-# WAN Metrics
> +-# format: <WAN Info>:<DL Speed>:<UL Speed>:<DL Load>:<UL Load>:<LMD>
> +-# WAN Info: B0-B1: Link Status, B2: Symmetric Link, B3: At Capabity
> +-#    (encoded as two hex digits)
> +-#    Link Status: 1 = Link up, 2 = Link down, 3 = Link in test state
> +-# Downlink Speed: Estimate of WAN backhaul link current downlink speed in
> kbps;
> +-#	1..4294967295; 0 = unknown
> +-# Uplink Speed: Estimate of WAN backhaul link current uplink speed in kbps
> +-#	1..4294967295; 0 = unknown
> +-# Downlink Load: Current load of downlink WAN connection (scaled to
> +255 = 100%) -# Uplink Load: Current load of uplink WAN connection
> +(scaled to 255 = 100%) -# Load Measurement Duration: Duration for
> +measuring downlink/uplink load in -# tenths of a second (1..65535); 0
> +if load cannot be determined
> +-#hs20_wan_metrics=01:8000:1000:80:240:3000
> +-
> +-# Operating Class Indication
> +-# List of operating classes the BSSes in this ESS use. The Global
> +operating -# classes in Table E-4 of IEEE Std 802.11-2012 Annex E
> +define the values that -# can be used in this.
> +-# format: hexdump of operating class octets -# for example, operating
> +classes 81 (2.4 GHz channels 1-13) and 115 (5 GHz -# channels 36-48):
> +-#hs20_operating_class=5173
> +-
> +-##### Multiple BSSID support
> +##################################################
> +-#
> +-# Above configuration is using the default interface (wlan#, or
> +multi-SSID VLAN -# interfaces). Other BSSIDs can be added by using
> +separator 'bss' with -# default interface name to be allocated for the data
> packets of the new BSS.
> +-#
> +-# hostapd will generate BSSID mask based on the BSSIDs that are -#
> +configured. hostapd will verify that dev_addr & MASK == dev_addr. If
> +this is -# not the case, the MAC address of the radio must be changed
> +before starting -# hostapd (ifconfig wlan0 hw ether <MAC addr>). If a
> +BSSID is configured for -# every secondary BSS, this limitation is not
> +applied at hostapd and other -# masks may be used if the driver
> +supports them (e.g., swap the locally -# administered bit) -# -# BSSIDs
> +are assigned in order to each BSS, unless an explicit BSSID is -#
> +specified using the 'bssid' parameter.
> +-# If an explicit BSSID is specified, it must be chosen such that it:
> +-# - results in a valid MASK that covers it and the dev_addr -# - is
> +not the same as the MAC address of the radio -# - is not the same as
> +any other explicitly specified BSSID -# -# Please note that hostapd
> +uses some of the values configured for the first BSS -# as the defaults
> +for the following BSSes. However, it is recommended that all -# BSSes
> +include explicit configuration of all relevant configuration items.
> +-#
> +-#bss=wlan0_0
> +-#ssid=test2
> +-# most of the above items can be used here (apart from radio interface
> +specific -# items, like channel)
> +-
> +-#bss=wlan0_1
> +-#bssid=00:13:10:95:fe:0b
> +-# ...
>  --
>  1.7.9.5
> 
> diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-
> wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-connectivity/hostap/hostap-
> daemon-wl18xx_r8.a8.08.bb
> similarity index 84%
> rename from meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-
> wl18xx_r8.a6.01.bb
> rename to meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-
> wl18xx_r8.a8.08.bb
> index e232b32..861c97b 100644
> --- a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-
> wl18xx_r8.a6.01.bb
> +++ b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon-wl18xx
> +++ _r8.a8.08.bb
> @@ -6,7 +6,7 @@ require hostap.inc
>  LICENSE = "GPLv2"
>  LIC_FILES_CHKSUM =
> "file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e"
> 
> -PR_append = "b+gitr${SRCPV}"
> +PR_append = "a+gitr${SRCPV}"
> 
>  FILESEXTRAPATHS_append := "${THISDIR}/hostap-daemon:"
> 
> @@ -14,8 +14,8 @@ FILESEXTRAPATHS_append := "${THISDIR}/hostap-
> daemon:"
>  # of hostap
>  PV = "2.0-devel-ti"
> 
> -# Tag: ol_r8.a6.01
> -SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
> +# Tag: ol_r8.a8.08
> +SRCREV = "257ab333aad993b4be81808524bc0d939c276058"
> 
>  PROVIDES += "hostap-daemon"
>  RPROVIDES_${PN} += "hostap-daemon"
> diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap-
> daemon/defconfig b/meta-arago-extras/recipes-connectivity/hostap/hostap-
> daemon/defconfig
> index 6a654c9..ccc0996 100644
> --- a/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon/defconfig
> +++ b/meta-arago-extras/recipes-connectivity/hostap/hostap-daemon/defcon
> +++ fig
> @@ -10,7 +10,7 @@
>  # to override previous values of the variables.
> 
>  # Driver interface for Host AP driver
> -CONFIG_DRIVER_HOSTAP=y
> +#CONFIG_DRIVER_HOSTAP=y
> 
>  # Driver interface for wired authenticator  #CONFIG_DRIVER_WIRED=y @@ -
> 21,13 +21,13 @@ CONFIG_DRIVER_HOSTAP=y
> 
>  # Driver interface for drivers using the nl80211 kernel interface
> CONFIG_DRIVER_NL80211=y -CONFIG_LIBNL20=y  # driver_nl80211.c requires
> a rather new libnl (version 1.1) which may not be  # shipped with your
> distribution yet. If that is the case, you need to build  # newer libnl version and
> point the hostapd build to use it.
>  #LIBNL=/usr/src/libnl
>  #CFLAGS += -I$(LIBNL)/include
>  #LIBS += -L$(LIBNL)/lib
> +CONFIG_LIBNL32=y
> 
>  # Driver interface for FreeBSD net80211 layer (e.g., Atheros driver)
> #CONFIG_DRIVER_BSD=y @@ -40,13 +40,13 @@ CONFIG_LIBNL20=y
> #CONFIG_DRIVER_NONE=y
> 
>  # IEEE 802.11F/IAPP
> -CONFIG_IAPP=y
> +#CONFIG_IAPP=y
> 
>  # WPA2/IEEE 802.11i RSN pre-authentication -CONFIG_RSN_PREAUTH=y
> +#CONFIG_RSN_PREAUTH=y
> 
>  # PeerKey handshake for Station to Station Link (IEEE 802.11e DLS) -
> CONFIG_PEERKEY=y
> +#CONFIG_PEERKEY=y
> 
>  # IEEE 802.11w (management frame protection)  # This version is an
> experimental implementation based on IEEE 802.11w/D1.0 @@ -55,25 +55,25
> @@ CONFIG_PEERKEY=y  #CONFIG_IEEE80211W=y
> 
>  # Integrated EAP server
> -CONFIG_EAP=y
> +#CONFIG_EAP=y
> 
>  # EAP-MD5 for the integrated EAP server -CONFIG_EAP_MD5=y
> +#CONFIG_EAP_MD5=y
> 
>  # EAP-TLS for the integrated EAP server -CONFIG_EAP_TLS=y
> +#CONFIG_EAP_TLS=y
> 
>  # EAP-MSCHAPv2 for the integrated EAP server -CONFIG_EAP_MSCHAPV2=y
> +#CONFIG_EAP_MSCHAPV2=y
> 
>  # EAP-PEAP for the integrated EAP server -CONFIG_EAP_PEAP=y
> +#CONFIG_EAP_PEAP=y
> 
>  # EAP-GTC for the integrated EAP server -CONFIG_EAP_GTC=y
> +#CONFIG_EAP_GTC=y
> 
>  # EAP-TTLS for the integrated EAP server -CONFIG_EAP_TTLS=y
> +#CONFIG_EAP_TTLS=y
> 
>  # EAP-SIM for the integrated EAP server  #CONFIG_EAP_SIM=y @@ -111,7
> +111,7 @@ CONFIG_WPS=y  # Enable WSC 2.0 support  CONFIG_WPS2=y  #
> Enable UPnP support for external WPS Registrars -CONFIG_WPS_UPNP=y
> +#CONFIG_WPS_UPNP=y
> 
>  # EAP-IKEv2
>  #CONFIG_EAP_IKEV2=y
> @@ -145,11 +145,14 @@ CONFIG_IEEE80211N=y  # code is not needed.
>  #CONFIG_NO_STDOUT_DEBUG=y
> 
> +# Add support for writing debug log to Android logcat instead of
> +standard output CONFIG_ANDROID_LOG=y
> +
>  # Remove support for RADIUS accounting
>  #CONFIG_NO_ACCOUNTING=y
> 
>  # Remove support for RADIUS
> -#CONFIG_NO_RADIUS=y
> +CONFIG_NO_RADIUS=y
> 
>  # Remove support for VLANs
>  #CONFIG_NO_VLAN=y
> @@ -159,6 +162,12 @@ CONFIG_IEEE80211N=y  # option.
>  #CONFIG_NO_DUMP_STATE=y
> 
> +# Select wrapper for operatins system and C library specific functions
> +# unix = UNIX/POSIX like systems (default) # win32 = Windows systems #
> +none = Empty template CONFIG_OS=unix
> +
>  # Enable tracing code for developer debugging  # This tracks use of memory
> allocations and other registrations and reports  # incorrect use with a backtrace
> of call (or allocation) location.
> @@ -176,7 +185,6 @@ CONFIG_IEEE80211N=y
>  #LIBS += -lbfd -liberty -lz
>  #LIBS_p += -lbfd -liberty -lz
>  #LIBS_c += -lbfd -liberty -lz
> -#
> -#
> 
> -CONFIG_NO_RANDOM_POOL=y
> +# Enable AP
> +CONFIG_AP=y
> diff --git a/meta-arago-extras/recipes-connectivity/hostap/hostap.inc b/meta-
> arago-extras/recipes-connectivity/hostap/hostap.inc
> index 8f6488b..9be2585 100644
> --- a/meta-arago-extras/recipes-connectivity/hostap/hostap.inc
> +++ b/meta-arago-extras/recipes-connectivity/hostap/hostap.inc
> @@ -11,7 +11,7 @@ DEPENDS = "libnl openssl"
>  # default
>  DEFAULT_PREFERENCE = "-1"
> 
> -PR = "r4"
> +PR = "r5"
> 
>  inherit update-rc.d
>  INITSCRIPT_NAME="hostapd"
> @@ -28,6 +28,7 @@ S = "${WORKDIR}/git/hostapd"
>  do_configure() {
>  	install -m 0644 ${WORKDIR}/defconfig ${S}/.config
>  	echo "CFLAGS += -I${STAGING_INCDIR}" >> .config
> +        echo "CFLAGS += -I${STAGING_INCDIR}/libnl3/" >> .config
>  	echo "LIBS += -L${STAGING_LIBDIR}" >> .config  }
> 
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 3/8] wlconf : Update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 ` [PATCH 3/8] wlconf : " Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 3/8] wlconf : Update recipe to ol_r8.a8.08
> version.
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Added missing default configuration file.
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  .../{wlconf_r8.a6.01.bb => wlconf_r8.a8.08.bb}     |    7 ++++---
>  1 files changed, 4 insertions(+), 3 deletions(-)  rename meta-arago-
> extras/recipes-connectivity/wlconf/{wlconf_r8.a6.01.bb =>
> wlconf_r8.a8.08.bb} (88%)
> 
> diff --git a/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a6.01.bb
> b/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a8.08.bb
> similarity index 88%
> rename from meta-arago-extras/recipes-
> connectivity/wlconf/wlconf_r8.a6.01.bb
> rename to meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a8.08.bb
> index 8076350..f4adc18 100644
> --- a/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a6.01.bb
> +++ b/meta-arago-extras/recipes-connectivity/wlconf/wlconf_r8.a8.08.bb
> @@ -2,11 +2,11 @@ DESCRIPTION = "Configuration utility for TI wireless
> drivers"
>  LICENSE = "GPLv2"
>  LIC_FILES_CHKSUM =
> "file://README;beginline=1;endline=21;md5=adc05a1903d3f107f85c90328e3
> a9438"
> 
> -PR ="r2"
> +PR ="r0"
>  PR_append = "+gitr${SRCPV}"
> 
> -# Tag: ol_r8.a6.01
> -SRCREV = "214dfbdf97cc390b0020c4ea9331a1cf82240a64"
> +# Tag: ol_r8.a8.08
> +SRCREV = "c976584589981c9ab8741d1819a5019e17cac13b"
>  SRC_URI = "git://github.com/TI-OpenLink/18xx-ti-utils.git"
> 
>  S = "${WORKDIR}/git/wlconf"
> @@ -21,6 +21,7 @@ do_install() {
>  	install -m 0755 wlconf ${D}${bindir}/wlconf/
>  	install -m 0755 dictionary.txt ${D}${bindir}/wlconf/
>  	install -m 0755 struct.bin ${D}${bindir}/wlconf/
> +	install -m 0755 default.conf ${D}${bindir}/wlconf/
>  	install -m 0755 wl18xx-conf-default.bin ${D}${bindir}/wlconf/
>  	install -m 0755 README ${D}${bindir}/wlconf/
>  	install -m 0755 example.conf ${D}${bindir}/wlconf/
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 4/8] ti-wifi-utils-wl18xx: Update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 ` [PATCH 4/8] ti-wifi-utils-wl18xx: " Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 4/8] ti-wifi-utils-wl18xx: Update recipe to
> ol_r8.a8.08 version.
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Updated firmware name.
> - Added required makefile parameter to support libnl3 compilation.
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  ...8.a6.01.bb => ti-wifi-utils-wl18xx_r8.a8.08.bb} |   13 ++++++++-----
>  1 files changed, 8 insertions(+), 5 deletions(-)  rename meta-arago-
> extras/recipes-devtools/ti-wifi-utils/{ti-wifi-utils-wl18xx_r8.a6.01.bb => ti-wifi-
> utils-wl18xx_r8.a8.08.bb} (68%)
> 
> diff --git a/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-
> wl18xx_r8.a6.01.bb b/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-
> utils-wl18xx_r8.a8.08.bb
> similarity index 68%
> rename from meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-
> wl18xx_r8.a6.01.bb
> rename to meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-
> wl18xx_r8.a8.08.bb
> index eab94fa..601b203 100644
> --- a/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-
> wl18xx_r8.a6.01.bb
> +++ b/meta-arago-extras/recipes-devtools/ti-wifi-utils/ti-wifi-utils-wl1
> +++ 8xx_r8.a8.08.bb
> @@ -3,12 +3,12 @@ LICENSE = "BSD"
>  LIC_FILES_CHKSUM =
> "file://COPYING;md5=4725015cb0be7be389cf06deeae3683d"
> 
>  DEPENDS = "libnl"
> -RDEPENDS_${PN} = "ti-compat-wireless-wl12xx wl12xx-firmware"
> +RDEPENDS_${PN} = "wl18xx-firmware"
> 
> -PR ="r3+gitr${SRCPV}"
> +PR ="r0+gitr${SRCPV}"
> 
> -# Tag: ol_r8.a6.01
> -SRCREV = "214dfbdf97cc390b0020c4ea9331a1cf82240a64"
> +#Tag: ol_r8.a8.08
> +SRCREV = "9627cb09b9de32b8ffcc32d3ce3e275b7c56d8e4"
>  SRC_URI = "git://github.com/TI-OpenLink/18xx-ti-utils.git \  "
> 
> @@ -20,7 +20,10 @@ RCONFLICTS_${PN} +=  "ti-wifi-utils"
>  S = "${WORKDIR}/git"
> 
>  export CROSS_COMPILE = "${TARGET_PREFIX}"
> -CFLAGS += " -DCONFIG_LIBNL20"
> +
> +EXTRA_OEMAKE = 'CFLAGS="${CFLAGS} -I${STAGING_INCDIR}/libnl3/ -
> DCONFIG_LIBNL32 " \
> +		LDFLAGS="${LDFLAGS} -L${STAGING_LIBDIR}" \
> +		NLVER=3'
> 
>  do_install() {
>      install -d ${D}${bindir}
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 5/8] wl18xx-firmware: update recipe to ol_r8.a8.08 version.
  2013-12-08  8:18 ` [PATCH 5/8] wl18xx-firmware: update " Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 5/8] wl18xx-firmware: update recipe to
> ol_r8.a8.08 version.
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  ...are_r8.a6.01.bb => wl18xx-firmware_r8.a8.08.bb} |    8 ++++----
>  1 files changed, 4 insertions(+), 4 deletions(-)  rename meta-arago-
> extras/recipes-bsp/wl18xx-firmware/{wl18xx-firmware_r8.a6.01.bb => wl18xx-
> firmware_r8.a8.08.bb} (76%)
> 
> diff --git a/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-
> firmware_r8.a6.01.bb b/meta-arago-extras/recipes-bsp/wl18xx-
> firmware/wl18xx-firmware_r8.a8.08.bb
> similarity index 76%
> rename from meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-
> firmware_r8.a6.01.bb
> rename to meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-
> firmware_r8.a8.08.bb
> index 4b3f22a..759bf47 100644
> --- a/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-
> firmware_r8.a6.01.bb
> +++ b/meta-arago-extras/recipes-bsp/wl18xx-firmware/wl18xx-firmware_r8.a
> +++ 8.08.bb
> @@ -1,18 +1,18 @@
>  DESCRIPTION = "Firmware files for use with TI wl18xx"
>  LICENSE = "TI-TSPA"
> -LIC_FILES_CHKSUM =
> "file://LICENCE;md5=b28122fd6678e89fd3a8d4bc80922969"
> +LIC_FILES_CHKSUM =
> "file://LICENCE;md5=4977a0fe767ee17765ae63c435a32a9e"
> 
>  PACKAGE_ARCH = "all"
> 
> -PR = "r2+gitr${SRCPV}"
> +PR = "r0+gitr${SRCPV}"
> 
>  PROVIDES += "wl12xx-firmware"
>  RPROVIDES_${PN} += "wl12xx-firmware"
>  RREPLACES_${PN} += "wl12xx-firmware"
>  RCONFLICTS_${PN} += "wl12xx-firmware"
> 
> -# Tag: ol_r8.a6.01
> -SRCREV = "1c0f45f0e8aec0823175f7ac977908888c424aa1"
> +# Tag: ol_r8.a8.08
> +SRCREV = "8e7f455e726f2bf92c568286a5cca510d7718dc1"
>  SRC_URI = "git://github.com/TI-OpenLink/wl18xx_fw.git;protocol=git \
>             file://Makefile \
>            "
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 6/8] arago-prefs: update default value for am335x and am43x for WILINK-8
  2013-12-08  8:18 ` [PATCH 6/8] arago-prefs: update default value for am335x and am43x for WILINK-8 Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 6/8] arago-prefs: update default value for
> am335x and am43x for WILINK-8
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Also change the default supported WILINK version
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  .../conf/distro/include/arago-prefs.inc            |    5 ++++-
>  1 files changed, 4 insertions(+), 1 deletions(-)
> 
> diff --git a/meta-arago-distro/conf/distro/include/arago-prefs.inc b/meta-
> arago-distro/conf/distro/include/arago-prefs.inc
> index 7d9afe7..412fa3a 100644
> --- a/meta-arago-distro/conf/distro/include/arago-prefs.inc
> +++ b/meta-arago-distro/conf/distro/include/arago-prefs.inc
> @@ -99,7 +99,10 @@ PREFERRED_VERSION_bluez-hcidump = "2.2"
>  PREFERRED_VERSION_bash = "3.2.48"
>  PREFERRED_VERSION_gettext = "0.16.1"
> 
> -WILINK_VERSION = "WILINK-6"
> +WILINK_VERSION = "WILINK-8"
> +# For AM335x & AM43x Wilink 8 is now the default version to be used
> +WILINK_VERSION_ti33x = "WILINK-8"
> +WILINK_VERSION_ti43x = "WILINK-8"
>  PREFERRED_PROVIDER_wl12xx-firmware =
> "${@base_contains('WILINK_VERSION','WILINK-8','wl18xx-firmware','wl12xx-
> firmware',d)}"
>  PREFERRED_PROVIDER_ti-compat-wireless-wl12xx =
> "${@base_contains('WILINK_VERSION','WILINK-8','ti-compat-wireless-
> wl18xx','ti-compat-wireless-wl12xx',d)}"
>  PREFERRED_PROVIDER_hostap-daemon =
> "${@base_contains('WILINK_VERSION','WILINK-8','hostap-daemon-
> wl18xx','hostap-daemon',d)}"
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 7/8] arago-tisdk-connectivity: Restored connectivity modules compilation
  2013-12-08  8:18 ` [PATCH 7/8] arago-tisdk-connectivity: Restored connectivity modules compilation Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 7/8] arago-tisdk-connectivity: Restored
> connectivity modules compilation
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - Modules compatibility issues with libnl were fixed.
> - Removed unused components
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  .../packagegroup-arago-tisdk-connectivity.bb       |   17 ++++++-----------
>  1 files changed, 6 insertions(+), 11 deletions(-)
> 
> diff --git a/meta-arago-distro/recipes-core/packagegroups/packagegroup-
> arago-tisdk-connectivity.bb b/meta-arago-distro/recipes-
> core/packagegroups/packagegroup-arago-tisdk-connectivity.bb
> index 0aa019d..d7d2ef2 100644
> --- a/meta-arago-distro/recipes-core/packagegroups/packagegroup-arago-
> tisdk-connectivity.bb
> +++ b/meta-arago-distro/recipes-core/packagegroups/packagegroup-arago-ti
> +++ sdk-connectivity.bb
> @@ -1,6 +1,6 @@
>  DESCRIPTION = "Task to install wlan and bluetooth packages into the target FS"
>  LICENSE = "MIT"
> -PR = "r17"
> +PR = "r18"
> 
>  inherit packagegroup
> 
> @@ -23,16 +23,12 @@ WLAN_COMMON = "\
>      pulseaudio-module-bluetooth-device \
>      eventdump \
>      ${@base_contains('WILINK_VERSION','WILINK-8','wlconf','',d)} \
> +    wpa-supplicant \
> +    crda \
> +    hostap-daemon \
> +    ti-wifi-utils \
>  "
> -
> -# TI/ECS versions of wpa-supplicant/crda/hostap/wifi-utils require older libnl, -
> # which no longer exists
> -#    wpa-supplicant
> -#    crda
> -#    hostap-daemon
> -#    ti-wifi-utils
>  # No bluetooth/bluetooth.h
> -#    oppserver
> 
>  # netperf has non-standard license, needs verifying
>  #    netperf
> @@ -42,8 +38,7 @@ WLAN_COMMON = "\
>  #    ti-compat-bluetooth
> 
>  FIRMWARE_AND_DRIVERS = "\
> -    bt-firmware \
> -    bt-enable \
> +    "${@base_contains('WILINK_VERSION','WILINK-6',' oppserver
> + bt-firmware bt-enable' , '',d)}"\
>      wl12xx-firmware \
>  "
> 
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [PATCH 8/8] crda: Removed redundant recipe.
  2013-12-08  8:18 ` [PATCH 8/8] crda: Removed redundant recipe Yaniv Mahani
@ 2014-01-14 13:28   ` Cooper Jr., Franklin
  0 siblings, 0 replies; 18+ messages in thread
From: Cooper Jr., Franklin @ 2014-01-14 13:28 UTC (permalink / raw)
  To: Machani, Yaniv, meta-arago@arago-project.org

Acked-by: Franklin Cooper Jr. <fcooper@ti.com>

> -----Original Message-----
> From: meta-arago-bounces@arago-project.org [mailto:meta-arago-
> bounces@arago-project.org] On Behalf Of Machani, Yaniv
> Sent: Sunday, December 08, 2013 2:18 AM
> To: meta-arago@arago-project.org
> Subject: [meta-arago] [PATCH 8/8] crda: Removed redundant recipe.
> 
> From: Yaniv Machani <yanivma@ti.com>
> 
> - crda 1.1.3 from meta-openembedded can be used.
> 
> Signed-off-by: Yaniv Machani <yanivma@ti.com>
> ---
>  .../conf/distro/include/arago-prefs.inc            |    2 +-
>  .../recipes-connectivity/crda/crda_1.1.1.bb        |   37 --------------------
>  2 files changed, 1 insertions(+), 38 deletions(-)  delete mode 100644 meta-
> arago-extras/recipes-connectivity/crda/crda_1.1.1.bb
> 
> diff --git a/meta-arago-distro/conf/distro/include/arago-prefs.inc b/meta-
> arago-distro/conf/distro/include/arago-prefs.inc
> index 412fa3a..a19e425 100644
> --- a/meta-arago-distro/conf/distro/include/arago-prefs.inc
> +++ b/meta-arago-distro/conf/distro/include/arago-prefs.inc
> @@ -92,7 +92,7 @@ PREFERRED_VERSION_readline-native = "5.2"
>  PREFERRED_VERSION_readline-nativesdk = "5.2"
> 
>  PREFERRED_VERSION_libnl = "3.2.21"
> -PREFERRED_VERSION_crda = "1.1.1"
> +PREFERRED_VERSION_crda = "1.1.3"
>  PREFERRED_VERSION_obex = "0.34"
>  PREFERRED_VERSION_bluez4 = "4.101"
>  PREFERRED_VERSION_bluez-hcidump = "2.2"
> diff --git a/meta-arago-extras/recipes-connectivity/crda/crda_1.1.1.bb b/meta-
> arago-extras/recipes-connectivity/crda/crda_1.1.1.bb
> deleted file mode 100644
> index e3880a1..0000000
> --- a/meta-arago-extras/recipes-connectivity/crda/crda_1.1.1.bb
> +++ /dev/null
> @@ -1,37 +0,0 @@
> -DESCRIPTION = "Wireless Central Regulatory Domain Agent"
> -HOMEPAGE = "http://wireless.kernel.org/en/developers/Regulatory/CRDA"
> -SECTION = "base"
> -LICENSE = "ISC"
> -LIC_FILES_CHKSUM =
> "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c"
> -
> -PR = "r0"
> -
> -DEPENDS = "libgcrypt libnl python-native python-m2crypto-native"
> -RDEPENDS_${PN} = "udev"
> -
> -SRC_URI = "http://wireless.kernel.org/download/crda/${P}.tar.bz2;name=crda
> \
> -           http://wireless.kernel.org/download/wireless-
> regdb/regulatory.bins/2011.04.28-regulatory.bin;name=reg \
> -"
> -
> -CFLAGS += " -DCONFIG_LIBNL20"
> -
> -EXTRA_OEMAKE = "MAKEFLAGS="
> -do_compile() {
> -    oe_runmake all_noverify
> -}
> -
> -do_install() {
> -    oe_runmake DESTDIR=${D} install
> -    install -d ${D}/usr/lib/crda/
> -    install -m 0644 ${WORKDIR}/2011.04.28-regulatory.bin
> ${D}/usr/lib/crda/regulatory.bin
> -}
> -
> -SRC_URI[crda.md5sum] = "5fc77af68b3e21736b8ef2f8b061c810"
> -SRC_URI[crda.sha256sum] =
> "59b4760da44a8f803caeaaa7fb97e0c6bd3f35f40445b28258e7f14c2fbe13b5
> "
> -SRC_URI[reg.md5sum] = "1535e98bcaba732e2f8e8f62dac6f369"
> -SRC_URI[reg.sha256sum] =
> "bb6ba6f5dcdf7106a19c588b0e4d43ab7af26f6474fe01011a318b3dceaba33b
> "
> -
> -FILES_${PN} += "\
> -    /lib/udev/rules.d/85-regulatory.rules \
> -    /usr/lib/crda/regulatory.bin \
> -"
> --
> 1.7.9
> 
> _______________________________________________
> meta-arago mailing list
> meta-arago@arago-project.org
> http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


^ permalink raw reply	[flat|nested] 18+ messages in thread

end of thread, other threads:[~2014-01-14 13:28 UTC | newest]

Thread overview: 18+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-12-08  8:18 [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Yaniv Mahani
2013-12-08  8:18 ` [PATCH 2/8] hostap-daemon-wl18xx: " Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-08  8:18 ` [PATCH 3/8] wlconf : " Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-08  8:18 ` [PATCH 4/8] ti-wifi-utils-wl18xx: " Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-08  8:18 ` [PATCH 5/8] wl18xx-firmware: update " Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-08  8:18 ` [PATCH 6/8] arago-prefs: update default value for am335x and am43x for WILINK-8 Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-08  8:18 ` [PATCH 7/8] arago-tisdk-connectivity: Restored connectivity modules compilation Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-08  8:18 ` [PATCH 8/8] crda: Removed redundant recipe Yaniv Mahani
2014-01-14 13:28   ` Cooper Jr., Franklin
2013-12-09  5:46 ` [PATCH 1/8] wpa-supplicant-wl18xx: Update recipe to ol_r8.a8.08 version Denys Dmytriyenko
2013-12-14  9:40   ` Denys Dmytriyenko
2014-01-14 13:28 ` Cooper Jr., Franklin

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.