From patchwork Wed Jan 8 19:04:39 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sergey Matyukevich X-Patchwork-Id: 1219861 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=140.211.166.136; helo=silver.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="WuOyNY/w"; dkim-atps=neutral Received: from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 47tJW92syQz9sQp for ; Thu, 9 Jan 2020 06:01:25 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id 817C3203DA; Wed, 8 Jan 2020 19:01:23 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X5A1QqoStLue; Wed, 8 Jan 2020 19:01:22 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by silver.osuosl.org (Postfix) with ESMTP id B3E0B203DF; Wed, 8 Jan 2020 19:01:22 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by ash.osuosl.org (Postfix) with ESMTP id A3CD31BF29E for ; Wed, 8 Jan 2020 19:01:21 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id 217D286457 for ; Wed, 8 Jan 2020 19:01:21 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k6BNbXkHd2lW for ; Wed, 8 Jan 2020 19:01:18 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mail-lf1-f47.google.com (mail-lf1-f47.google.com [209.85.167.47]) by whitealder.osuosl.org (Postfix) with ESMTPS id AED5085ADB for ; Wed, 8 Jan 2020 19:01:17 +0000 (UTC) Received: by mail-lf1-f47.google.com with SMTP id n12so3268263lfe.3 for ; Wed, 08 Jan 2020 11:01:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=af/BB3it+sXQ8u+CSNZ6zwor3A/a8tGKUCwRBRaFW6U=; b=WuOyNY/wERRLgUwfJ26GARRqy7VPPWGE+5RrgJ98XXzWsBOy9i/T8CMTtS2/U20AuA HlaI9IXFnTpN6a2Vr+10LG8UUNnXOUjOzxyLvr+G6Ftp9XJUa+q1awLd4PZtY9hBUM9C hToamktUuuwqE+MnumS1c1/1oUfpqqqnS0E/SzmN0tWIODwLj/+S5HwIL5GYWt2SiwFR 6LWdqZFN1+E6Mn2AG8n91By8FECBlPXxbHiNSNvcWujNfBoBCjI29lfZn3GMTQR9Uk4x K7xB+ijAkbFB9g88A1f0XwbAvnTQhG/DaEADxleJJ699GadDChuPBD/jen/zfGv9vJm2 UWAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=af/BB3it+sXQ8u+CSNZ6zwor3A/a8tGKUCwRBRaFW6U=; b=pEietNWLhDdPO7WBSZDzRVDxKvGcNKMsJ/i1/HHP5bPenpYVWPKI2mqvksfxCU5xJg yU5KC+uuV3ZY1uOQFXD3IFhFuc/olFGQxY2AONARlqh3t66r4mxnQoCr/fqYgS17Nl33 Zpg3HjOVdz5gfiYD6qI4OmOTgLfg5U4ZL99QDXq0pAD2/YTWLyqciTo0YLxpoZEU7SBf GFAzlnXDR3fr25A5NNHtq+sxYyHNLcYCoMI7Gq076yFWfWruMKJaB1Y4IWS8OVomGKp5 4v81ypIZadnt2rAX/KDV4q3nAf3puR3xQ45x1FtaZrzUIJxD5FI/YkiK9ycOHH8gYQNs FwWA== X-Gm-Message-State: APjAAAXThKA2Tp1/S9fY3D2QOx0JZ0NLMW4bJSlEwhmeCK42P06+j6py IldXM4tU/URHwwwsfbCIW+XdTJxsBDs= X-Google-Smtp-Source: APXvYqzemOCuv9dbuXe2td2qa9Okl+SCPq6hcGz1h/eo2P54yihdX/t8qaLCLa8Ebrj37y64PYG9lw== X-Received: by 2002:ac2:5623:: with SMTP id b3mr3847642lff.10.1578510075569; Wed, 08 Jan 2020 11:01:15 -0800 (PST) Received: from localhost.localdomain (ip92-101-204-197.onego.ru. [92.101.204.197]) by smtp.googlemail.com with ESMTPSA id d1sm1980656ljl.18.2020.01.08.11.01.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 08 Jan 2020 11:01:14 -0800 (PST) From: Sergey Matyukevich To: buildroot@buildroot.org Date: Wed, 8 Jan 2020 22:04:39 +0300 Message-Id: <20200108190439.459316-1-geomatsi@gmail.com> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Subject: [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Sergey Matyukevich , Thomas Petazzoni Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal TLS implementation. This patch disables TEAP support in wpa_supplicant when internal TLS implementation is selected. Similar fix for hostapd package has already been merged to Buildroot: see commit 47d14e3b1c20 ("package/hostapd: disable TEAP for internal TLS implementation"). TEAP is still an experimental feature that is not recommmended for production use. Currently it should not be used for anything else than experimentation and interoperability testing. Those who needs experimenting with TEAP are encouraged to enable openssl in their buildroot configuration. Fixes: http://autobuild.buildroot.net/results/e83613c06041a60f89da787f4ebf876245713cd2/ Signed-off-by: Sergey Matyukevich --- package/wpa_supplicant/wpa_supplicant.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/package/wpa_supplicant/wpa_supplicant.mk b/package/wpa_supplicant/wpa_supplicant.mk index 4f95ea6276..c87494c2bf 100644 --- a/package/wpa_supplicant/wpa_supplicant.mk +++ b/package/wpa_supplicant/wpa_supplicant.mk @@ -112,7 +112,7 @@ WPA_SUPPLICANT_DEPENDENCIES += host-pkgconf libopenssl WPA_SUPPLICANT_LIBS += `$(PKG_CONFIG_HOST_BINARY) --libs openssl` WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=openssl\)/\1/' else -WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD +WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD CONFIG_EAP_TEAP WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=\).*/\1internal/' endif