All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
@ 2020-01-08 19:04 Sergey Matyukevich
  2020-01-13 23:05 ` Arnout Vandecappelle
                   ` (2 more replies)
  0 siblings, 3 replies; 7+ messages in thread
From: Sergey Matyukevich @ 2020-01-08 19:04 UTC (permalink / raw)
  To: buildroot

EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
TLS implementation. This patch disables TEAP support in wpa_supplicant
when internal TLS implementation is selected. Similar fix for hostapd
package has already been merged to Buildroot: see commit 47d14e3b1c20
("package/hostapd: disable TEAP for internal TLS implementation").

TEAP is still an experimental feature that is not recommmended for
production use. Currently it should not be used for anything else
than experimentation and interoperability testing. Those who needs
experimenting with TEAP are encouraged to enable openssl in their
buildroot configuration.

Fixes:
http://autobuild.buildroot.net/results/e83613c06041a60f89da787f4ebf876245713cd2/

Signed-off-by: Sergey Matyukevich <geomatsi@gmail.com>
---
 package/wpa_supplicant/wpa_supplicant.mk | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/package/wpa_supplicant/wpa_supplicant.mk b/package/wpa_supplicant/wpa_supplicant.mk
index 4f95ea6276..c87494c2bf 100644
--- a/package/wpa_supplicant/wpa_supplicant.mk
+++ b/package/wpa_supplicant/wpa_supplicant.mk
@@ -112,7 +112,7 @@ WPA_SUPPLICANT_DEPENDENCIES += host-pkgconf libopenssl
 WPA_SUPPLICANT_LIBS += `$(PKG_CONFIG_HOST_BINARY) --libs openssl`
 WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=openssl\)/\1/'
 else
-WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD
+WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD CONFIG_EAP_TEAP
 WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=\).*/\1internal/'
 endif
 
-- 
2.24.1

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
  2020-01-08 19:04 [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation Sergey Matyukevich
@ 2020-01-13 23:05 ` Arnout Vandecappelle
  2020-01-14  8:02   ` Sergey Matyukevich
  2020-03-15 20:07 ` Sergey Matyukevich
  2020-08-13 21:08 ` Thomas Petazzoni
  2 siblings, 1 reply; 7+ messages in thread
From: Arnout Vandecappelle @ 2020-01-13 23:05 UTC (permalink / raw)
  To: buildroot



On 08/01/2020 20:04, Sergey Matyukevich wrote:
> EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
> TLS implementation. This patch disables TEAP support in wpa_supplicant
> when internal TLS implementation is selected. Similar fix for hostapd
> package has already been merged to Buildroot: see commit 47d14e3b1c20
> ("package/hostapd: disable TEAP for internal TLS implementation").
> 
> TEAP is still an experimental feature that is not recommmended for
> production use. Currently it should not be used for anything else
> than experimentation and interoperability testing. Those who needs
> experimenting with TEAP are encouraged to enable openssl in their
> buildroot configuration.

 So then why don't we just unconditionally disable this feature? Preferably with
a comment in the .mk file that it's disabled due to its experimental nature, so
that someone who needs it a couple of years down the line can note that it's not
longer experimental.

 Regards,
 Arnout

> 
> Fixes:
> http://autobuild.buildroot.net/results/e83613c06041a60f89da787f4ebf876245713cd2/
> 
> Signed-off-by: Sergey Matyukevich <geomatsi@gmail.com>
> ---
>  package/wpa_supplicant/wpa_supplicant.mk | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/package/wpa_supplicant/wpa_supplicant.mk b/package/wpa_supplicant/wpa_supplicant.mk
> index 4f95ea6276..c87494c2bf 100644
> --- a/package/wpa_supplicant/wpa_supplicant.mk
> +++ b/package/wpa_supplicant/wpa_supplicant.mk
> @@ -112,7 +112,7 @@ WPA_SUPPLICANT_DEPENDENCIES += host-pkgconf libopenssl
>  WPA_SUPPLICANT_LIBS += `$(PKG_CONFIG_HOST_BINARY) --libs openssl`
>  WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=openssl\)/\1/'
>  else
> -WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD
> +WPA_SUPPLICANT_CONFIG_DISABLE += CONFIG_EAP_PWD CONFIG_EAP_TEAP
>  WPA_SUPPLICANT_CONFIG_EDITS += 's/\#\(CONFIG_TLS=\).*/\1internal/'
>  endif
>  
> 

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
  2020-01-13 23:05 ` Arnout Vandecappelle
@ 2020-01-14  8:02   ` Sergey Matyukevich
  2020-02-16 14:38     ` Sergey Matyukevich
  0 siblings, 1 reply; 7+ messages in thread
From: Sergey Matyukevich @ 2020-01-14  8:02 UTC (permalink / raw)
  To: buildroot

> On 08/01/2020 20:04, Sergey Matyukevich wrote:
> > EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
> > TLS implementation. This patch disables TEAP support in wpa_supplicant
> > when internal TLS implementation is selected. Similar fix for hostapd
> > package has already been merged to Buildroot: see commit 47d14e3b1c20
> > ("package/hostapd: disable TEAP for internal TLS implementation").
> > 
> > TEAP is still an experimental feature that is not recommmended for
> > production use. Currently it should not be used for anything else
> > than experimentation and interoperability testing. Those who needs
> > experimenting with TEAP are encouraged to enable openssl in their
> > buildroot configuration.
> 
>  So then why don't we just unconditionally disable this feature? Preferably with
> a comment in the .mk file that it's disabled due to its experimental nature, so
> that someone who needs it a couple of years down the line can note that it's not
> longer experimental.

Well, this is another possible option. But I don't see why we should
disable it completely. TEAP does not build with internal hostapd TLSv1
implementation, which in its turn is also marked as experimental. On
the other hand, TEAP successfully builds if OpenSSL is selected as TLS
implementation. So why don't we just disable known broken combination,
leaving the choice between working combinations to the end user.

Regards,
Sergey

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
  2020-01-14  8:02   ` Sergey Matyukevich
@ 2020-02-16 14:38     ` Sergey Matyukevich
  0 siblings, 0 replies; 7+ messages in thread
From: Sergey Matyukevich @ 2020-02-16 14:38 UTC (permalink / raw)
  To: buildroot

> > > EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
> > > TLS implementation. This patch disables TEAP support in wpa_supplicant
> > > when internal TLS implementation is selected. Similar fix for hostapd
> > > package has already been merged to Buildroot: see commit 47d14e3b1c20
> > > ("package/hostapd: disable TEAP for internal TLS implementation").
> > > 
> > > TEAP is still an experimental feature that is not recommmended for
> > > production use. Currently it should not be used for anything else
> > > than experimentation and interoperability testing. Those who needs
> > > experimenting with TEAP are encouraged to enable openssl in their
> > > buildroot configuration.
> > 
> >  So then why don't we just unconditionally disable this feature? Preferably with
> > a comment in the .mk file that it's disabled due to its experimental nature, so
> > that someone who needs it a couple of years down the line can note that it's not
> > longer experimental.
> 
> Well, this is another possible option. But I don't see why we should
> disable it completely. TEAP does not build with internal hostapd TLSv1
> implementation, which in its turn is also marked as experimental. On
> the other hand, TEAP successfully builds if OpenSSL is selected as TLS
> implementation. So why don't we just disable known broken combination,
> leaving the choice between working combinations to the end user.

Hi Thomas, Arnout,

It has been a while since my last reply. Do you still have any other
concerns regarding suggested approach ?

Let me reiterate the idea. TEAP is a farily new and experimental hostapd
feature which does not compile with internal hostapd TLS implementation.
On the other hand, it can be successfully built with OpenSSL as TLS
provider for hostapd.

So suggested approach explicitly disables broken configuration, but still
lets the users to play with it if they need to.

Regards,
Sergey

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
  2020-01-08 19:04 [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation Sergey Matyukevich
  2020-01-13 23:05 ` Arnout Vandecappelle
@ 2020-03-15 20:07 ` Sergey Matyukevich
  2020-08-13 21:08 ` Thomas Petazzoni
  2 siblings, 0 replies; 7+ messages in thread
From: Sergey Matyukevich @ 2020-03-15 20:07 UTC (permalink / raw)
  To: buildroot

On Wed, Jan 08, 2020 at 10:04:39PM +0300, Sergey Matyukevich wrote:
> EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
> TLS implementation. This patch disables TEAP support in wpa_supplicant
> when internal TLS implementation is selected. Similar fix for hostapd
> package has already been merged to Buildroot: see commit 47d14e3b1c20
> ("package/hostapd: disable TEAP for internal TLS implementation").
> 
> TEAP is still an experimental feature that is not recommmended for
> production use. Currently it should not be used for anything else
> than experimentation and interoperability testing. Those who needs
> experimenting with TEAP are encouraged to enable openssl in their
> buildroot configuration.
> 
> Fixes:
> http://autobuild.buildroot.net/results/e83613c06041a60f89da787f4ebf876245713cd2/

Also fixes similar recent autobuild failure:
http://autobuild.buildroot.net/results/c52dd7fbb74d8f7bdd0149ce0bd90f89caec5776/

Regards,
Sergey

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
  2020-01-08 19:04 [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation Sergey Matyukevich
  2020-01-13 23:05 ` Arnout Vandecappelle
  2020-03-15 20:07 ` Sergey Matyukevich
@ 2020-08-13 21:08 ` Thomas Petazzoni
  2020-08-28 16:25   ` Peter Korsgaard
  2 siblings, 1 reply; 7+ messages in thread
From: Thomas Petazzoni @ 2020-08-13 21:08 UTC (permalink / raw)
  To: buildroot

On Wed,  8 Jan 2020 22:04:39 +0300
Sergey Matyukevich <geomatsi@gmail.com> wrote:

> EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
> TLS implementation. This patch disables TEAP support in wpa_supplicant
> when internal TLS implementation is selected. Similar fix for hostapd
> package has already been merged to Buildroot: see commit 47d14e3b1c20
> ("package/hostapd: disable TEAP for internal TLS implementation").
> 
> TEAP is still an experimental feature that is not recommmended for
> production use. Currently it should not be used for anything else
> than experimentation and interoperability testing. Those who needs
> experimenting with TEAP are encouraged to enable openssl in their
> buildroot configuration.
> 
> Fixes:
> http://autobuild.buildroot.net/results/e83613c06041a60f89da787f4ebf876245713cd2/
> 
> Signed-off-by: Sergey Matyukevich <geomatsi@gmail.com>
> ---
>  package/wpa_supplicant/wpa_supplicant.mk | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)

Applied to master, thanks.

Thomas
-- 
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation
  2020-08-13 21:08 ` Thomas Petazzoni
@ 2020-08-28 16:25   ` Peter Korsgaard
  0 siblings, 0 replies; 7+ messages in thread
From: Peter Korsgaard @ 2020-08-28 16:25 UTC (permalink / raw)
  To: buildroot

>>>>> "Thomas" == Thomas Petazzoni <thomas.petazzoni@bootlin.com> writes:

 > On Wed,  8 Jan 2020 22:04:39 +0300
 > Sergey Matyukevich <geomatsi@gmail.com> wrote:

 >> EAP-TEAP support in hostapd/wpa_supplicant fails to build with internal
 >> TLS implementation. This patch disables TEAP support in wpa_supplicant
 >> when internal TLS implementation is selected. Similar fix for hostapd
 >> package has already been merged to Buildroot: see commit 47d14e3b1c20
 >> ("package/hostapd: disable TEAP for internal TLS implementation").
 >> 
 >> TEAP is still an experimental feature that is not recommmended for
 >> production use. Currently it should not be used for anything else
 >> than experimentation and interoperability testing. Those who needs
 >> experimenting with TEAP are encouraged to enable openssl in their
 >> buildroot configuration.
 >> 
 >> Fixes:
 >> http://autobuild.buildroot.net/results/e83613c06041a60f89da787f4ebf876245713cd2/
 >> 
 >> Signed-off-by: Sergey Matyukevich <geomatsi@gmail.com>
 >> ---
 >> package/wpa_supplicant/wpa_supplicant.mk | 2 +-
 >> 1 file changed, 1 insertion(+), 1 deletion(-)

Committed to 2020.02.x and 2020.05.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2020-08-28 16:25 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-01-08 19:04 [Buildroot] [PATCH 1/1] package/wpa_supplicant: disable TEAP for internal TLS implementation Sergey Matyukevich
2020-01-13 23:05 ` Arnout Vandecappelle
2020-01-14  8:02   ` Sergey Matyukevich
2020-02-16 14:38     ` Sergey Matyukevich
2020-03-15 20:07 ` Sergey Matyukevich
2020-08-13 21:08 ` Thomas Petazzoni
2020-08-28 16:25   ` Peter Korsgaard

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.