diff options
| author | Vishal Mahaveer <a0271468@ti.com> | 2011-10-24 16:26:45 -0600 |
|---|---|---|
| committer | Keith Deacon <kdeacon@ti.com> | 2011-11-15 20:45:52 -0600 |
| commit | 449ce04be428b88b5b968c69d85df1f8c2b4bdd2 (patch) | |
| tree | 95eea7d0d801fff4da3612623693e8953fbea030 | |
| parent | c39471463ddf2c5f96ba2cc1f8ac4c6669860e09 (diff) | |
| download | android_external_wpa_supplicant_8-449ce04be428b88b5b968c69d85df1f8c2b4bdd2.tar.gz android_external_wpa_supplicant_8-449ce04be428b88b5b968c69d85df1f8c2b4bdd2.tar.bz2 android_external_wpa_supplicant_8-449ce04be428b88b5b968c69d85df1f8c2b4bdd2.zip | |
Enable CONFIG_NO_RANDOM_POOL and CONFIG_IEEE80211N in .config
Change-Id: I8fdc489aafc0709c2c1a7d53f264f9f2c38a1765
Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
| -rw-r--r-- | wpa_supplicant/.config | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/wpa_supplicant/.config b/wpa_supplicant/.config index b234de8f..84e74bbf 100644 --- a/wpa_supplicant/.config +++ b/wpa_supplicant/.config @@ -273,6 +273,36 @@ CONFIG_BACKEND=file # Remove support for configuration blobs to reduce code size by about 1.5 kB. #CONFIG_NO_CONFIG_BLOBS=y + +# wpa_supplicant depends on strong random number generation being available +# from the operating system. os_get_random() function is used to fetch random +# data when needed, e.g., for key generation. On Linux and BSD systems, this +# works by reading /dev/urandom. It should be noted that the OS entropy pool +# needs to be properly initialized before wpa_supplicant is started. This is +# important especially on embedded devices that do not have a hardware random +# number generator and may by default start up with minimal entropy available +# for random number generation. +# +# As a safety net, wpa_supplicant is by default trying to internally collect +# additional entropy for generating random data to mix in with the data fetched +# from the OS. This by itself is not considered to be very strong, but it may +# help in cases where the system pool is not initialized properly. However, it +# is very strongly recommended that the system pool is initialized with enough +# entropy either by using hardware assisted random number generatior or by +# storing state over device reboots. +# +# If the os_get_random() is known to provide strong ramdom data (e.g., on +# Linux/BSD, the board in question is known to have reliable source of random +# data from /dev/urandom), the internal wpa_supplicant random pool can be +# disabled. This will save some in binary size and CPU use. However, this +# should only be considered for builds that are known to be used on devices +# that meet the requirements described above. +CONFIG_NO_RANDOM_POOL=y + +# IEEE 802.11n (High Throughput) support (mainly for AP mode) +CONFIG_IEEE80211N=y + + # Select program entry point implementation: # main = UNIX/POSIX like main() function (default) # main_winsvc = Windows service (read parameters from registry) |
