aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVishal Mahaveer <a0271468@ti.com>2011-10-24 16:26:45 -0600
committerKeith Deacon <kdeacon@ti.com>2011-11-15 20:45:52 -0600
commit449ce04be428b88b5b968c69d85df1f8c2b4bdd2 (patch)
tree95eea7d0d801fff4da3612623693e8953fbea030
parentc39471463ddf2c5f96ba2cc1f8ac4c6669860e09 (diff)
downloadandroid_external_wpa_supplicant_8-449ce04be428b88b5b968c69d85df1f8c2b4bdd2.tar.gz
android_external_wpa_supplicant_8-449ce04be428b88b5b968c69d85df1f8c2b4bdd2.tar.bz2
android_external_wpa_supplicant_8-449ce04be428b88b5b968c69d85df1f8c2b4bdd2.zip
Enable CONFIG_NO_RANDOM_POOL and CONFIG_IEEE80211N in .config
Change-Id: I8fdc489aafc0709c2c1a7d53f264f9f2c38a1765 Signed-off-by: Vishal Mahaveer <a0271468@ti.com>
-rw-r--r--wpa_supplicant/.config30
1 files changed, 30 insertions, 0 deletions
diff --git a/wpa_supplicant/.config b/wpa_supplicant/.config
index b234de8f..84e74bbf 100644
--- a/wpa_supplicant/.config
+++ b/wpa_supplicant/.config
@@ -273,6 +273,36 @@ CONFIG_BACKEND=file
# Remove support for configuration blobs to reduce code size by about 1.5 kB.
#CONFIG_NO_CONFIG_BLOBS=y
+
+# wpa_supplicant depends on strong random number generation being available
+# from the operating system. os_get_random() function is used to fetch random
+# data when needed, e.g., for key generation. On Linux and BSD systems, this
+# works by reading /dev/urandom. It should be noted that the OS entropy pool
+# needs to be properly initialized before wpa_supplicant is started. This is
+# important especially on embedded devices that do not have a hardware random
+# number generator and may by default start up with minimal entropy available
+# for random number generation.
+#
+# As a safety net, wpa_supplicant is by default trying to internally collect
+# additional entropy for generating random data to mix in with the data fetched
+# from the OS. This by itself is not considered to be very strong, but it may
+# help in cases where the system pool is not initialized properly. However, it
+# is very strongly recommended that the system pool is initialized with enough
+# entropy either by using hardware assisted random number generatior or by
+# storing state over device reboots.
+#
+# If the os_get_random() is known to provide strong ramdom data (e.g., on
+# Linux/BSD, the board in question is known to have reliable source of random
+# data from /dev/urandom), the internal wpa_supplicant random pool can be
+# disabled. This will save some in binary size and CPU use. However, this
+# should only be considered for builds that are known to be used on devices
+# that meet the requirements described above.
+CONFIG_NO_RANDOM_POOL=y
+
+# IEEE 802.11n (High Throughput) support (mainly for AP mode)
+CONFIG_IEEE80211N=y
+
+
# Select program entry point implementation:
# main = UNIX/POSIX like main() function (default)
# main_winsvc = Windows service (read parameters from registry)