Are there any known issues with running the upstream (http://w1.fi/) wpa_supplicant on top of a WiLink patched kernel?
This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
Are there any known issues with running the upstream (http://w1.fi/) wpa_supplicant on top of a WiLink patched kernel?
Peter,
We cannot comment on it since we do our testing with TI released hostap / wpa supplicant.
Latest release is based on hostap v2.9 : https://git.ti.com/cgit/wilink8-wlan/hostap/tag/?h=R8.8
Regards
Saurabh
Thanks. It would be very useful if the patches for wpa_supplicant could be rebased and squashed. As it is now, there are close to 50 patches, but there are less than 50 actual improvements/changes compared to the stock wpa_supplicant. In other words, there are many patches which just modifies or corrects the code of earlier patches. This makes it difficult to evaluate the changes, compared to upstream.