aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/wpa_supplicant.conf
Commit message (Collapse)AuthorAgeFilesLines
* WPS 2.0: Make WSC 2.0 support to be build option (CONFIG_WPS2)Jouni Malinen2010-09-091-0/+3
| | | | | For now, the default build will only include WSC 1.0 support. CONFIG_WPS2=y can be used to add support for WSC 2.0.
* WPS 2.0: Add virtual/physical display and pushbutton config methodsJouni Malinen2010-09-091-2/+3
|
* Add freq_list network configuration parameterJouni Malinen2010-03-261-0/+5
| | | | | | | This can be used to limit which frequencies are considered when selecting a BSS. This is somewhat similar to scan_freq, but will also affect any scan results regardless of which program triggered the scan.
* Add optional scan result filter based on SSIDJouni Malinen2010-03-051-0/+6
| | | | | | | | | filter_ssids=1 global configuration parameter can now be used to enable scan result filtering (with -Dnl80211 only for now) based on the configured SSIDs. In other words, only the scan results that have an SSID matching with one of the configured networks are included in the BSS table. This can be used to reduce memory needs in environments that have huge number of APs.
* Make maximum BSS table size configurableJouni Malinen2010-03-051-0/+8
| | | | | | New global configuration parameter bss_max_count can now be used to change the maximum BSS table size. The old fixed size limit (200) is used as the default value for this parameter.
* Add TLS client events, server probing, and srv cert matchingJouni Malinen2010-02-131-0/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows external programs (e.g., UI) to get more information about server certificate chain used during TLS handshake. This can be used both to automatically probe the authentication server to figure out most likely network configuration and to get information about reasons for failed authentications. The follow new control interface events are used for this: CTRL-EVENT-EAP-PEER-CERT CTRL-EVENT-EAP-TLS-CERT-ERROR In addition, there is now an option for matching the server certificate instead of the full certificate chain for cases where a trusted CA is not configured or even known. This can be used, e.g., by first probing the network and learning the server certificate hash based on the new events and then adding a network configuration with the server certificate hash after user have accepted it. Future connections will then be allowed as long as the same server certificate is used. Authentication server probing can be done, e.g., with following configuration options: eap=TTLS PEAP TLS identity="" ca_cert="probe://" Example set of control events for this: CTRL-EVENT-EAP-STARTED EAP authentication started CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21 CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=US/ST=California/L=San Francisco/CN=Server/emailAddress=server@kir.nu' hash=5a1bc1296205e6fdbe3979728efe3920798885c1c4590b5f90f43222d239ca6a CTRL-EVENT-EAP-TLS-CERT-ERROR reason=8 depth=0 subject='/C=US/ST=California/L=San Francisco/CN=Server/emailAddress=server@kir.nu' err='Server certificate chain probe' CTRL-EVENT-EAP-FAILURE EAP authentication failed Server certificate matching is configured with ca_cert, e.g.: ca_cert="hash://server/sha256/5a1bc1296205e6fdbe3979728efe3920798885c1c4590b5f90f43222d239ca6a" This functionality is currently available only with OpenSSL. Other TLS libraries (including internal implementation) may be added in the future.
* WPS: Make Config Methods configurable for wpa_supplicantJouni Malinen2009-12-211-0/+6
| | | | | | | | This adds config_methods configuration option for wpa_supplicant following the design used in hostapd. In addition, the string is now parsed in common code from src/wps/wps_common.c and the list of configurable methods include all the defined methods from WPS 1.0h spec.
* Allow IBSS/AP mode networks to be created in ap_scan=1 modeJouni Malinen2009-09-291-3/+9
| | | | | | | If no BSSes/IBSSes matching the enabled networks are found in the scan results, IBSS/AP mode network (if configured) can be created in ap_scan=1 mode instead of requiring ap_scan=2 mode to be used whenever using IBSS or AP mode.
* Add support for specifying subset of enabled frequencies to scanJouni Malinen2009-03-261-0/+6
| | | | | | | | | | | | | A new network block parameter, scan_freq, can be used to specify subset of frequencies to scan. This can speed up scanning process considerably if it is known that only a small subset of channels is actually used in the network. A union of configured frequencies for all enabled network blocks is used in scan requests. Currently, only driver_nl80211.c has support for this functionality. For example, following parameter marks 2.4 GHz channels 1, 6, 11 to be scanned: scan_freq=2412 2437 2462
* Initial step in adding simple AP mode support into wpa_supplicantJouni Malinen2009-03-251-0/+1
| | | | | | This version is adding the configuration option (mode=2) for this and driver capability reporting to figure out whether AP mode can be used. However, this does not actually implement any real functionality yet.
* Removed an obsolete comment about use of external program for EAPJouni Malinen2009-02-111-2/+1
|
* WPS: Add configurable option for processing credentials externallyJouni Malinen2009-01-181-0/+7
| | | | | | | The wps_cred_process option can be used to configure wpa_supplicant to send received Credential attributes for external processing over ctrl_iface and dbus. This allows external programs to update their configuration when WPS is used to provision new networks.
* WPS: Generate UUID based on MAC address, if not setJouni Malinen2009-01-011-0/+1
| | | | | | Generate a SHA1 hash -based UUID from the local MAC address if the UUID was not configured. This makes it easier to prepare for WPS since there is no need to generate an UUID.
* Changed the example device_type value to be Computer/PCJouni Malinen2008-12-221-1/+1
|
* Added configuration of WPS device parameters for wpa_supplicantJouni Malinen2008-12-131-0/+37
|
* Added documentation for the new 'country' configuration optionJouni Malinen2008-12-091-0/+5
|
* WPS: Moved UUID configuration from phase1 into global config areaJouni Malinen2008-11-261-2/+8
|
* Added preliminary Wi-Fi Protected Setup (WPS) implementationJouni Malinen2008-11-231-0/+2
| | | | | | | | | | | | | This adds WPS support for both hostapd and wpa_supplicant. Both programs can be configured to act as WPS Enrollee and Registrar. Both PBC and PIN methods are supported. Currently, hostapd has more complete configuration option for WPS parameters and wpa_supplicant configuration style will likely change in the future. External Registrars are not yet supported in hostapd or wpa_supplicant. While wpa_supplicant has initial support for acting as an Registrar to configure an AP, this is still using number of hardcoded parameters which will need to be made configurable for proper operation.
* Changed PEAPv0 cryptobinding to be disabled by defaultJouni Malinen2008-11-201-2/+2
| | | | | There are some interoperability issues with Windows Server 2008 NPS, so better disable cryptobinding use by default for now.
* Added support for enforcing frequent PTK rekeyingJouni Malinen2008-11-061-0/+14
| | | | | | | | | | | | Added a new configuration option, wpa_ptk_rekey, that can be used to enforce frequent PTK rekeying, e.g., to mitigate some attacks against TKIP deficiencies. This can be set either by the Authenticator (to initiate periodic 4-way handshake to rekey PTK) or by the Supplicant (to request Authenticator to rekey PTK). With both wpa_ptk_rekey and wpa_group_rekey (in hostapd) set to 600, TKIP keys will not be used for more than 10 minutes which may make some attacks against TKIP more difficult to implement.
* Fixed a typoJouni Malinen2008-10-021-1/+1
|
* Added support for using SHA256-based stronger key derivation for WPA2Jouni Malinen2008-08-311-0/+2
| | | | | | IEEE 802.11w/D6.0 defines new AKMPs to indicate SHA256-based algorithms for key derivation (and AES-CMAC for EAPOL-Key MIC). Add support for using new AKMPs and clean up AKMP processing with helper functions in defs.h.
* PEAPv0: Added crypto_binding configuration option (part of phase1)Jouni Malinen2008-04-081-0/+5
| | | | | | crypto_binding=# in phase1 network parameter can now be used to change the PEAPv0 cryptobinding behavior (0 = do not use, 1 = optional (default), 2 = required).
* Added a missing '#' to indicate a comment.Jouni Malinen2008-03-051-1/+1
|
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-271-0/+762