dnsmasq: full: disable ipset support by default
[openwrt/staging/mkresin.git] / package / network / services / hostapd / Config.in
index 578fba839cc8a61f130f2343f77343a2425d225a..5c00f3e24ea375423d1d0f1887aaf3e7cfb134a0 100644 (file)
@@ -1,26 +1,4 @@
 # wpa_supplicant config
-config WPA_SUPPLICANT_NO_TIMESTAMP_CHECK
-       bool "Disable timestamp check"
-       depends on PACKAGE_wpa-supplicant || \
-                  PACKAGE_wpa-supplicant-openssl || \
-                  PACKAGE_wpa-supplicant-wolfssl || \
-                  PACKAGE_wpa-supplicant-mesh-openssl || \
-                  PACKAGE_wpa-supplicant-mesh-wolfssl || \
-                  PACKAGE_wpa-supplicant-basic || \
-                  PACKAGE_wpa-supplicant-mini || \
-                  PACKAGE_wpa-supplicant-p2p || \
-                  PACKAGE_wpad || \
-                  PACKAGE_wpad-openssl || \
-                  PACKAGE_wpad-wolfssl || \
-                  PACKAGE_wpad-basic || \
-                  PACKAGE_wpad-mini || \
-                  PACKAGE_wpad-mesh-openssl || \
-                  PACKAGE_wpad-mesh-wolfssl
-       default n
-       help
-         This disables the timestamp check for certificates in wpa_supplicant
-         Useful for devices without RTC that cannot reliably get the real date/time
-
 config WPA_RFKILL_SUPPORT
        bool "Add rfkill support"
        depends on PACKAGE_wpa-supplicant || \
@@ -35,6 +13,8 @@ config WPA_RFKILL_SUPPORT
                   PACKAGE_wpad-openssl || \
                   PACKAGE_wpad-wolfssl || \
                   PACKAGE_wpad-basic || \
+                  PACKAGE_wpad-basic-openssl || \
+                  PACKAGE_wpad-basic-wolfssl || \
                   PACKAGE_wpad-mini || \
                   PACKAGE_wpad-mesh-openssl || \
                   PACKAGE_wpad-mesh-wolfssl
@@ -54,6 +34,8 @@ config WPA_MSG_MIN_PRIORITY
                   PACKAGE_wpad-openssl || \
                   PACKAGE_wpad-wolfssl || \
                   PACKAGE_wpad-basic || \
+                  PACKAGE_wpad-basic-openssl || \
+                  PACKAGE_wpad-basic-wolfssl || \
                   PACKAGE_wpad-mini || \
                   PACKAGE_wpad-mesh-openssl || \
                   PACKAGE_wpad-mesh-wolfssl
@@ -71,17 +53,13 @@ config WPA_WOLFSSL
        bool
        default PACKAGE_wpa-supplicant-wolfssl ||\
                PACKAGE_wpad-wolfssl ||\
+               PACKAGE_wpad-basic-wolfssl || \
                PACKAGE_wpad-mesh-wolfssl ||\
                PACKAGE_eapol-test-wolfssl
-       select PACKAGE_libwolfssl
        select WOLFSSL_HAS_AES_CCM
-       select WOLFSSL_HAS_AES_GCM
        select WOLFSSL_HAS_ARC4
-       select WOLFSSL_HAS_DES3
        select WOLFSSL_HAS_DH
-       select WOLFSSL_HAS_ECC
        select WOLFSSL_HAS_OCSP
-       select WOLFSSL_HAS_PSK
        select WOLFSSL_HAS_SESSION_TICKET
        select WOLFSSL_HAS_WPAS
 
@@ -97,6 +75,15 @@ config DRIVER_11AC_SUPPORT
        bool
        default n
 
-config DRIVER_11W_SUPPORT
+config DRIVER_11AX_SUPPORT
        bool
        default n
+
+config WPA_ENABLE_WEP
+       bool "Enable support for unsecure and obsolete WEP"
+       help
+         Wired equivalent privacy (WEP) is an obsolete cryptographic data
+         confidentiality algorithm that is not considered secure. It should not be used
+         for anything anymore. The functionality needed to use WEP is available in the
+         current hostapd release under this optional build parameter and completely
+         removed in a future release.