On Thu, Oct 17, 2013 at 23:32:56, Dmytriyenko, Denys wrote:
> Subject: Re: [meta-arago] [PATCHv2 04/11] 
> ti-connectivity/wpa-supplicant-
> wl18xx: Add Wilink8 r8.a7.02
> 
> Ping.

Thanks.  Based on the good feedback from Franklin/Chase, I'll rework the 
includes a bit and resubmit.  

> 
> 
> On Thu, Oct 10, 2013 at 03:10:56PM +0000, Maupin, Chase wrote:
> >
> >
> > >-----Original Message-----
> > >From: meta-arago-boun...@arago-project.org [mailto:meta-arago- 
> > >boun...@arago-project.org] On Behalf Of Monk, Roger
> > >Sent: Thursday, October 10, 2013 11:02 AM
> > >To: meta-arago@arago-project.org
> > >Subject: [meta-arago] [PATCHv2 04/11] ti-connectivity/wpa-
> > >supplicant-wl18xx: Add Wilink8 r8.a7.02
> > >
> > >   * Add v r8.a7.02 engineering release wpa supplicant
> > >   * This release supports the omap-a15 devices (omap5-evm/dra7-
> > >evm) with ES 2.1 WL8
> > >      * OMAP5432 UEVMs with the following SKU contain ES2.1
> > >Wilink8 TDK 18xx module
> > >      * OMAP5432x-xx-x1-xx
> > >   * Bump PR
> > >   * Replace defconfig with original wpa-supplicant defconfig
> > >   * Add back SDK specific defconfig changes
> > >   * Enable WFD (WiFi Display)
> > >   * Revert some android patches which prevent WFD
> > >
> > >Signed-off-by: Roger Monk <r-m...@ti.com>
> > >---
> > > ...0001-revert-android-patches-to-enable-wfd.patch |   44 ++++++
> > > .../defconfig                                      |  150
> > >+++++++++++++++-----
> > > ....a6.01.bb => wpa-supplicant-wl18xx_r8.a7.02.bb} |   11 +-
> > > 3 files changed, 166 insertions(+), 39 deletions(-)  create mode
> > >100644 meta-arago-extras/recipes-connectivity/wpa-
> > >supplicant/wpa-supplicant-wl18xx-r8.a7.02/0001-revert-android-
> > >patches-to-enable-wfd.patch
> > > copy meta-arago-extras/recipes-connectivity/wpa-supplicant/{wpa-
> > >supplicant-r5.sp4.01 => wpa-supplicant-wl18xx-r8.a7.02}/defconfig
> > >(74%)
> > > mode change 100755 => 100644
> > > copy meta-arago-extras/recipes-connectivity/wpa-supplicant/{wpa-
> > >supplicant-wl18xx_r8.a6.01.bb => wpa-supplicant- 
> > >wl18xx_r8.a7.02.bb}
> > >(78%)
> > >
> > >diff --git a/meta-arago-extras/recipes-connectivity/wpa-
> > >supplicant/wpa-supplicant-wl18xx-r8.a7.02/0001-revert-android-
> > >patches-to-enable-wfd.patch b/meta-arago-extras/recipes-
> > >connectivity/wpa-supplicant/wpa-supplicant-wl18xx-r8.a7.02/0001-
> > >revert-android-patches-to-enable-wfd.patch
> > >new file mode 100644
> > >index 0000000..29528b4
> > >--- /dev/null
> > >+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-wl18xx-r8.a7.02/0001-revert-android-patches-to-enable-
> > >wfd.patch
> > >@@ -0,0 +1,44 @@
> > >+
> > >+diff -rupN a/src/common/wpa_ctrl.c b/src/common/wpa_ctrl.c
> > >+--- a/src/common/wpa_ctrl.c       2013-09-02 16:46:22.708023057 +0100
> > >++++ b/src/common/wpa_ctrl.c       2013-08-30 10:22:19.811255355 +0100
> > >+@@ -164,6 +164,10 @@ try_again:
> > >+          return NULL;
> > >+  }
> > >+
> > >++#if 0
> > >++//IH this code is introduced in recent supplicant that appears
> > >to make RMD app calls to wpa_ctrl_recv() fail and
> > >++// the supplicant fails to write to the same socket!!!
> > >++// Temp fix to remove it, probably solution will be in app set
> > >up/usage??
> > >+  /*
> > >+   * Make socket non-blocking so that we don't hang forever if
> > >+   * target dies unexpectedly.
> > >+@@ -176,7 +180,7 @@ try_again:
> > >+                  /* Not fatal, continue on.*/
> > >+          }
> > >+  }
> > >+-
> > >++#endif
> > >+  return ctrl;
> > >+ }
> > >+
> > >+diff -rupN a/wpa_supplicant/wpa_supplicant.c
> > >b/wpa_supplicant/wpa_supplicant.c
> > >+--- a/wpa_supplicant/wpa_supplicant.c     2013-09-04
> > >16:57:26.000000000 +0100
> > >++++ b/wpa_supplicant/wpa_supplicant.c     2013-09-04
> > >17:02:02.256720695 +0100
> > >+@@ -3025,13 +3025,15 @@ next_driver:
> > >+  }
> > >+
> > >+ #ifdef CONFIG_P2P
> > >++ #ifdef ANDROID
> > >+  if (os_strncmp(iface->ifname, "wlan0", 4) == 0) {
> > >+          wpa_printf(MSG_DEBUG, "Disable P2P on wlan0");
> > >+          wpa_s->conf->p2p_disabled = 1;
> > >+  }
> > >+
> > >+  if (os_strncmp(iface->ifname, "p2p0", 4) == 0)
> > >+-         if (wpas_p2p_init(wpa_s->global, wpa_s) < 0) {
> > >++#endif
> > >++     if (wpas_p2p_init(wpa_s->global, wpa_s) < 0) {
> > >+                  wpa_msg(wpa_s, MSG_ERROR, "Failed to init P2P");
> > >+                  return -1;
> > >+          }
> > >diff --git a/meta-arago-extras/recipes-connectivity/wpa-
> > >supplicant/wpa-supplicant-r5.sp4.01/defconfig b/meta-arago-
> > >extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-wl18xx-
> > >r8.a7.02/defconfig
> > >old mode 100755
> > >new mode 100644
> > >similarity index 74%
> > >copy from meta-arago-extras/recipes-connectivity/wpa-
> > >supplicant/wpa-supplicant-r5.sp4.01/defconfig
> > >copy to meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-wl18xx-r8.a7.02/defconfig
> > >index b982e2a..80d2f63
> > >--- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-r5.sp4.01/defconfig
> > >+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-wl18xx-r8.a7.02/defconfig
> > >@@ -39,18 +39,6 @@
> > > #LIBS = -lssl
> > >
> >
> >###############################################################
> ###
> > >#############
> > >
> > >-#CC=$(CROSS_COMPILE)gcc
> > >-#CFLAGS += -DCONFIG_LIBNL20
> > >-#CPPFLAGS += -DCONFIG_LIBNL20
> > >-#LIBS += -L$(NFSROOT)/lib -lnl
> > >-#LIBS_p += -L$(NFSROOT)/lib
> > >-#LIBDIR = $(NFSROOT)/lib
> > >-#BINDIR = $(NFSROOT)/usr/sbin
> > >-
> > >-CONFIG_WAPI=y
> > >-CONFIG_LIBNL20=y
> > >-NEED_BGSCAN=y
> > >-CONFIG_BGSCAN_LEARN=y
> > >
> > > # Driver interface for Host AP driver  #CONFIG_DRIVER_HOSTAP=y @@
> > >-75,7 +63,7 @@ CONFIG_BGSCAN_LEARN=y  #CONFIG_DRIVER_ATMEL=y
> > >
> > > # Driver interface for old Broadcom driver -# Please note that the 
> > >newer Broadcom driver ("hybrid Linux
> > >driver") supportsBG
> > >+# Please note that the newer Broadcom driver ("hybrid Linux
> > >driver") supports
> > > # Linux wireless extensions and does not need (or even work) with 
> > >the old  # driver wrapper. Use CONFIG_DRIVER_WEXT=y with that driver.
> > > #CONFIG_DRIVER_BROADCOM=y
> > >@@ -90,16 +78,22 @@ CONFIG_BGSCAN_LEARN=y
> #CONFIG_DRIVER_RALINK=y
> > >
> > > # Driver interface for generic Linux wireless extensions
> > >+# Note: WEXT is deprecated in the current Linux kernel version
> > >and no new
> > >+# functionality is added to it. nl80211-based interface is the
> > >new
> > >+# replacement for WEXT and its use allows wpa_supplicant to
> > >properly control
> > >+# the driver to improve existing functionality like roaming and
> > >to support new
> > >+# functionality.
> > > CONFIG_DRIVER_WEXT=y
> > >
> > > # Driver interface for Linux drivers using the nl80211 kernel 
> > >interface  CONFIG_DRIVER_NL80211=y
> > >+CONFIG_LIBNL20=y
> > >
> > > # Driver interface for FreeBSD net80211 layer (e.g., Atheros
> > >driver)
> > > #CONFIG_DRIVER_BSD=y
> > > #CFLAGS += -I/usr/local/include
> > > #LIBS += -L/usr/local/lib
> > >-#LIBS_p += -L/usr/local/libBG
> > >+#LIBS_p += -L/usr/local/lib
> > > #LIBS_c += -L/usr/local/lib
> > >
> > > # Driver interface for Windows NDIS @@ -121,11 +115,6 @@ 
> > >CONFIG_DRIVER_NL80211=y  # Driver interface
> for
> > >development testing  #CONFIG_DRIVER_TEST=y
> > >
> > >-# Include client MLME (management frame processing) for test 
> > >driver -# This can be used to test MLME operations in hostapd with 
> > >the test interface.
> > >-# space.
> > >-#CONFIG_CLIENT_MLME=y
> > >-
> > > # Driver interface for wired Ethernet drivers  
> > >CONFIG_DRIVER_WIRED=y
> > >
> > >@@ -177,6 +166,9 @@ CONFIG_EAP_OTP=y  # EAP-PSK (experimental; this 
> > >is _not_ needed for WPA-PSK) #CONFIG_EAP_PSK=y
> > >
> > >+# EAP-pwd (secure authentication using only a password) 
> > >+#CONFIG_EAP_PWD=y
> > >+
> > > # EAP-PAX
> > > #CONFIG_EAP_PAX=y
> > >
> > >@@ -208,6 +200,11 @@ CONFIG_EAP_LEAP=y  CONFIG_WPS=y  # Enable
> WSC
> > >2.0 support  CONFIG_WPS2=y
> > >+# Enable WPS external registrar functionality #CONFIG_WPS_ER=y # 
> > >+Disable credentials for an open network by default when acting
> > >as a WPS
> > >+# registrar.
> > >+#CONFIG_WPS_REG_DISABLE_OPEN=y
> > >
> > > # EAP-IKEv2
> > > #CONFIG_EAP_IKEV2=y
> > >@@ -224,7 +221,10 @@ CONFIG_SMARTCARD=y  # Enable this if EAP-SIM
> or
> > >EAP-AKA is included  #CONFIG_PCSC=y
> > >
> > >-# Development testingBG
> > >+# Support HT overrides (disable HT/HT40, mask MCS rates, etc.) 
> > >+#CONFIG_HT_OVERRIDES=y
> > >+
> > >+# Development testing
> > > #CONFIG_EAPOL_TEST=y
> > >
> > > # Select control interface backend for external programs, e.g,
> > >wpa_cli:
> > >@@ -242,6 +242,10 @@ CONFIG_CTRL_IFACE=y  # the resulting binary.
> > > #CONFIG_READLINE=y
> > >
> > >+# Include internal line edit mode in wpa_cli. This can be used as
> > >a replacement
> > >+# for GNU Readline to provide limited command line editing and
> > >history support.
> > >+#CONFIG_WPA_CLI_EDIT=y
> > >+
> > > # Remove debugging code that is printing out debug message to 
> > >stdout.
> > > # This can be used to reduce the size of the wpa_supplicant 
> > >considerably  # if debugging code is not needed. The size reduction 
> > >can be around 35% @@ -295,13 +299,16 @@ CONFIG_BACKEND=file  # unix
> =
> > >UNIX/POSIX like systems (default)  # win32 = Windows systems  # 
> > >none = Empty template -#CONFIG_OS=unix
> > >+CONFIG_OS=unix
> > >
> > > # Select event loop implementation  # eloop = select() loop 
> > >(default)  # eloop_win = Windows events and WaitForMultipleObject() 
> > >loop  # eloop_none = Empty template -#CONFIG_ELOOP=eloop
> > >+CONFIG_ELOOP=eloop
> > >+
> > >+# Should we use poll instead of select? Select is used by
> > >default.
> > >+#CONFIG_ELOOP_POLL=y
> > >
> > > # Select layer 2 packet implementation  # linux = Linux packet 
> > >socket (default) @@ -310,7 +317,7 @@ CONFIG_BACKEND=file  # winpcap 
> > >= WinPcap with receive thread  # ndis = Windows NDISUIO (note: 
> > >requires
> > >CONFIG_USE_NDISUIO=y)  # none = Empty template 
> > >-#CONFIG_L2_PACKET=linux
> > >+CONFIG_L2_PACKET=linux
> > >
> > > # PeerKey handshake for Station to Station Link (IEEE 802.11e
> > >DLS)
> > > CONFIG_PEERKEY=y
> > >@@ -323,18 +330,24 @@ CONFIG_PEERKEY=y
> > >
> > > # Select TLS implementation
> > > # openssl = OpenSSL (default)
> > >-# gnutls = GnuTLS (needed for TLS/IA, see also
> > >CONFIG_GNUTLS_EXTRA)
> > >+# gnutls = GnuTLS
> > > # internal = Internal TLSv1 implementation (experimental) # none = 
> > > Empty template #CONFIG_TLS=openssl
> > >
> > >-# Whether to enable TLS/IA support, which is required for EAP- 
> > >TTLSv1.
> > >-# You need CONFIG_TLS=gnutls for this to have any effect. Please 
> > >note that -# even though the core GnuTLS library is released under 
> > >LGPL, this extra -# library uses GPL and as such, the terms of GPL 
> > >apply to the combination -# of wpa_supplicant and GnuTLS if this 
> > >option is enabled. BSD license may not -# apply for distribution of 
> > >the resulting binary.
> > >-#CONFIG_GNUTLS_EXTRA=y
> > >+# TLS-based EAP methods require at least TLS v1.0. Newer version
> > >of TLS (v1.1)
> > >+# can be enabled to get a stronger construction of messages when
> > >block ciphers
> > >+# are used. It should be noted that some existing TLS v1.0 -based 
> > >+# implementation may not be compatible with TLS v1.1 message
> > >(ClientHello is
> > >+# sent prior to negotiating which version will be used) 
> > >+#CONFIG_TLSV11=y
> > >+
> > >+# TLS-based EAP methods require at least TLS v1.0. Newer version
> > >of TLS (v1.2)
> > >+# can be enabled to enable use of stronger crypto algorithms. It
> > >should be
> > >+# noted that some existing TLS v1.0 -based implementation may not
> > >be compatible
> > >+# with TLS v1.2 message (ClientHello is sent prior to negotiating
> > >which version
> > >+# will be used)
> > >+#CONFIG_TLSV12=y
> > >
> > > # If CONFIG_TLS=internal is used, additional library and include 
> > >paths are  # needed for LibTomMath. Alternatively, an integrated, 
> > >minimal version of @@ -396,6 +409,21 @@ 
> > >CONFIG_CTRL_IFACE_DBUS_INTRO=y  # Add support for writing debug log 
> > >to a file
> > >(/tmp/wpa_supplicant-log-#.txt)
> > > CONFIG_DEBUG_FILE=y
> > >
> > >+# Send debug messages to syslog instead of stdout 
> > >+#CONFIG_DEBUG_SYSLOG=y # Set syslog facility for debug messages 
> > >+#CONFIG_DEBUG_SYSLOG_FACILITY=LOG_DAEMON
> > >+
> > >+# Add support for sending all debug messages (regardless of debug
> > >verbosity)
> > >+# to the Linux kernel tracing facility. This helps debug the
> > >entire stack by
> > >+# making it easy to record everything happening from the driver
> > >up into the
> > >+# same file, e.g., using trace-cmd.
> > >+#CONFIG_DEBUG_LINUX_TRACING=y
> > >+
> > >+# Add support for writing debug log to Android logcat instead of
> > >standard
> > >+# output
> > >+#CONFIG_ANDROID_LOG=y
> > >+
> > > # Enable privilege separation (see README 'Privilege separation'
> > >for details)
> > > #CONFIG_PRIVSEP=y
> > >
> > >@@ -407,7 +435,7 @@ CONFIG_DEBUG_FILE=y  # This tracks use of
> memory
> > >allocations and other registrations and reports  # incorrect use 
> > >with a backtrace of call (or allocation) location.
> > > #CONFIG_WPA_TRACE=y
> > >-# For BSD, comment out these.
> > >+# For BSD, uncomment these.
> > > #LIBS += -lexecinfo
> > > #LIBS_p += -lexecinfo
> > > #LIBS_c += -lexecinfo
> > >@@ -416,15 +444,65 @@ CONFIG_DEBUG_FILE=y  # This enables use of 
> > >libbfd to get more detailed symbols for the backtraces  # generated 
> > >by CONFIG_WPA_TRACE=y.
> > > #CONFIG_WPA_TRACE_BFD=y
> > >-# For BSD, comment out these.
> > >+# For BSD, uncomment these.
> > > #LIBS += -lbfd -liberty -lz
> > > #LIBS_p += -lbfd -liberty -lz
> > > #LIBS_c += -lbfd -liberty -lz
> > >
> > >-# for p2p
> > >+# wpa_supplicant depends on strong random number generation being
> > >available
> > >+# from the operating system. os_get_random() function is used to
> > >fetch random
> > >+# data when needed, e.g., for key generation. On Linux and BSD
> > >systems, this
> > >+# works by reading /dev/urandom. It should be noted that the OS
> > >entropy pool
> > >+# needs to be properly initialized before wpa_supplicant is
> > >started. This is
> > >+# important especially on embedded devices that do not have a
> > >hardware random
> > >+# number generator and may by default start up with minimal
> > >entropy available
> > >+# for random number generation.
> > >+#
> > >+# As a safety net, wpa_supplicant is by default trying to
> > >internally collect
> > >+# additional entropy for generating random data to mix in with
> > >the data fetched
> > >+# from the OS. This by itself is not considered to be very
> > >strong, but it may
> > >+# help in cases where the system pool is not initialized
> > >properly. However, it
> > >+# is very strongly recommended that the system pool is
> > >initialized with enough
> > >+# entropy either by using hardware assisted random number
> > >generator or by
> > >+# storing state over device reboots.
> > >+#
> > >+# wpa_supplicant can be configured to maintain its own entropy
> > >store over
> > >+# restarts to enhance random number generation. This is not
> > >perfect, but it is
> > >+# much more secure than using the same sequence of random numbers
> > >after every
> > >+# reboot. This can be enabled with -e<entropy file> command line
> > >option. The
> > >+# specified file needs to be readable and writable by
> > >wpa_supplicant.
> > >+#
> > >+# If the os_get_random() is known to provide strong random data
> > >(e.g., on
> > >+# Linux/BSD, the board in question is known to have reliable
> > >source of random
> > >+# data from /dev/urandom), the internal wpa_supplicant random
> > >pool can be
> > >+# disabled. This will save some in binary size and CPU use.
> > >However, this
> > >+# should only be considered for builds that are known to be used
> > >on devices
> > >+# that meet the requirements described above.
> > >+#CONFIG_NO_RANDOM_POOL=y
> > >+
> > >+# IEEE 802.11n (High Throughput) support (mainly for AP mode) 
> > >+CONFIG_IEEE80211N=y
> > >+
> > >+# Interworking (IEEE 802.11u)
> > >+# This can be used to enable functionality to improve
> > >interworking with
> > >+# external networks (GAS/ANQP to learn more about the networks
> > >and network
> > >+# selection based on available credentials).
> > >+#CONFIG_INTERWORKING=y
> > >+
> > >+# Hotspot 2.0
> > >+#CONFIG_HS20=y
> > >+
> > >+# Disable roaming in wpa_supplicant #CONFIG_NO_ROAMING=y
> > >+
> > >+# Enable P2P
> > > CONFIG_P2P=y
> > > CONFIG_AP=y
> > >
> > >-# IEEE 802.11n (High Throughput) support -CONFIG_IEEE80211N=y
> > >+# bgscan
> > >+NEED_BGSCAN=y
> > >+CONFIG_BGSCAN_LEARN=y
> > >+CONFIG_BGSCAN_SIMPLE=y
> > >
> > >+# Enable WIFI Display
> > >+CONFIG_WIFI_DISPLAY=y
> > >\ No newline at end of file
> > >diff --git a/meta-arago-extras/recipes-connectivity/wpa-
> > >supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb b/meta-arago-
> > >extras/recipes-connectivity/wpa-supplicant/wpa-supplicant-
> > >wl18xx_r8.a7.02.bb
> > >similarity index 78%
> > >copy from meta-arago-extras/recipes-connectivity/wpa-
> > >supplicant/wpa-supplicant-wl18xx_r8.a6.01.bb
> > >copy to meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-wl18xx_r8.a7.02.bb
> > >index f6c4f70..0ea9ff5 100644
> > >--- a/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-wl18xx_r8.a6.01.bb
> > >+++ b/meta-arago-extras/recipes-connectivity/wpa-supplicant/wpa-
> > >supplicant-wl18xx_r8.a7.02.bb
> > >@@ -10,9 +10,14 @@ LIC_FILES_CHKSUM = 
> > >"file://../COPYING;md5=ab87f20cd7e8c0d0a6539b34d3791d0e \
> > >
> > > FILESEXTRAPATHS_append := "${THISDIR}/wpa-supplicant:"
> > >
> > >-# Tag: ol_r8.a6.01
> > >-SRCREV = "7190ff7dbd43243290b626068ded0d61c5019050"
> > >-PR = "r2+gitr${SRCPV}"
> > >+COMPATIBLE_MACHINE = "(omap-a15)"
> > >+
> > >+# Tag: ol_r8.a7.02
> > >+SRCREV = "4dda294a5186f3efb437ae0898a6df71655843ef"
> > >+PR = "r4+gitr${SRCPV}"
> >
> > Why not reset the PR?  Is there no corresponding PV bump for this release?
> >
> > >+
> > >+SRC_URI += "file://0001-revert-android-patches-to-enable-
> > >wfd.patch;patchdir=.. \
> > >+"
> > >
> > > # Add ti to the PV to indicate that this is a TI modify version of 
> > >wpa-supplicant.
> > > PV = "2.0-devel-ti"
> > >--
> > >1.7.9.5
> > >
> > >_______________________________________________
> > >meta-arago mailing list
> > >meta-arago@arago-project.org
> > >http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago
> > _______________________________________________
> > meta-arago mailing list
> > meta-arago@arago-project.org
> > http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago


_______________________________________________
meta-arago mailing list
meta-arago@arago-project.org
http://arago-project.org/cgi-bin/mailman/listinfo/meta-arago

Reply via email to