Skip to content

Conversation

@NordicBuilder
Copy link
Contributor

Backport 63c239c~12..63c239c from #2771.

D-Triveni and others added 12 commits April 23, 2025 11:29
Add support to read identity and private key password if
configured in Enterprise mode.

Signed-off-by: Triveni Danda <[email protected]>
(cherry picked from commit 589333e)
(cherry picked from commit a90c3f7)
Fix the kconfig check for enterprise crypto support in AP mode.
Also, remove the unnecessary Hostapd enterprise crypto check in
credentials code.

Signed-off-by: Triveni Danda <[email protected]>
(cherry picked from commit b3ea4f8)
(cherry picked from commit 75d5c70)
Based on few tests, it was observed that WPA supplicant's maximum usage
for connection and disconnection is 4360.

This would save ~4K which is huge as we have a crunch for RAM.

This was missed when hostap was upstreamed from NCS.

Signed-off-by: Chaitanya Tata <[email protected]>
(cherry picked from commit 83592e8)
(cherry picked from commit 88c6921)
When connecting to a WPA3 connection, the max stack size observed was
5456, fix the SoF by increasing by 200bytes (cushion added).

Signed-off-by: Chaitanya Tata <[email protected]>
(cherry picked from commit 24cbc88)
(cherry picked from commit 2861e27)
During experiments it was observed that workqueue uses a maximum of
3872 bytes, so, with cushion added set it to 4096.

Signed-off-by: Chaitanya Tata <[email protected]>
(cherry picked from commit 96dc3d3)
(cherry picked from commit ef18ad8)
In case interface is UP, the interface is added to WPA supplicant in the
iface_wq itself and the max stack size is 4264, so, increase the stack
size of the iface_wq.

If the interface is added via net_mgmt thread then it works fine.

Signed-off-by: Chaitanya Tata <[email protected]>
(cherry picked from commit e2bf746)
(cherry picked from commit e785ded)
…tion

Increase stack size of supplicant thread to fix crash seen during
enterprise mode connection. Increase heap requirement of hostap
to handle TLS processing failures.

Signed-off-by: Ravi Dondaputi <[email protected]>
(cherry picked from commit d073e62)
(cherry picked from commit ae37a77)
… security

Add support for configuring enterprise mode security.
Fixes SHEL-3573.

Upstream PR #: 88653

Signed-off-by: Ravi Dondaputi <[email protected]>
(cherry picked from commit 5ebd033)
Enable Wi-Fi credentials support. Update the heap sizes as
required for enterprise mode.

Upstream PR #: 88653

Signed-off-by: Ravi Dondaputi <[email protected]>
(cherry picked from commit b2c3f2c)
… overflow

Inclusion of CONFIG_WIFI_SHELL_RUNTIME_CERTIFICATES causes build time
RAM overflow issues. Decrease NRF_WIFI_DATA_HEAP_SIZE to accommodate
the RUNTIME_CERTIFICATES feature.

Upstream PR #:88861

Signed-off-by: Ravi Dondaputi <[email protected]>
(cherry picked from commit a4b75c0)
These are QSPI related which is part of buslib.

Upstream PR #: 88897

Signed-off-by: Chaitanya Tata <[email protected]>
(cherry picked from commit ad17ea8)
These are applicable for Wi-Fi over QSPI (nRF7002DK) or Flash over QSPI
(nRF52/53 + nRF7002EK) and as most Wi-Fi samples run on 128MHz (for
performance), disable the anomalies for both.

Upstream PR #: 88897

Signed-off-by: Chaitanya Tata <[email protected]>
(cherry picked from commit 63c239c)
@sonarqubecloud
Copy link

Quality Gate Failed Quality Gate failed

Failed conditions
47.5% Duplication on New Code (required ≤ 3%)

See analysis details on SonarQube Cloud

@carlescufi carlescufi merged commit be57ad0 into v4.0.99-ncs1-branch Apr 23, 2025
18 of 25 checks passed
@thst-nordic thst-nordic deleted the backport-2771-to-v4.0.99-ncs1-branch branch August 29, 2025 11:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants