aboutsummaryrefslogtreecommitdiff
path: root/wpa_supplicant/wpa_supplicant.conf
diff options
context:
space:
mode:
authorHai Shalom <haishalom@google.com>2019-02-06 16:32:13 -0800
committerHai Shalom <haishalom@google.com>2019-02-11 18:36:10 +0000
commit39bc25d3a79c1375de430a7918d949c1a86f70c6 (patch)
tree28a9b8d123fef7d5e7cf2bfbd0c110f37756beda /wpa_supplicant/wpa_supplicant.conf
parente6747a12928845398fe963c9b522acb4aedc075b (diff)
downloadwpa_supplicant_8-39bc25d3a79c1375de430a7918d949c1a86f70c6.tar.gz
[wpa_supplicant] Cumulative patch from c4e90da6d
Bug: 124017368 Test: Device boots up and connects to WPA3/OWE wifi networks, run traffic. Test: Able to turn on/off softap, associate wifi STA, run traffic. Test: DPP functional test. Test: Regression test passed (Bug: 124052942) c4e90da6d MBO: Move the WNM-Notification subtype definitions to common location 105b14f54 HS 2.0: Update the T&C Acceptance subtype value 65b487ae5 HS 2.0: Add QUIET=1 support for building hs20-osu-client 73f285dad Add FT-PSK to GET_CAPABILITY key_mgmt 6110753b1 nl80211: Clear PMKID add command message buffer 0fa33e05b nl80211: Clear connect command message buffer b14e8ea1d nl80211: Request kernel to trim off payload of netlink requests from acks 789b48bb4 EAP peer: Clear temporary message buffers before freeing 8f99a3c26 Clear config item writing buffer before freeing it a68e9b698 D-Bus: Fix P2P DeleteService dict iteration 0607346f1 D-Bus: Fix a memory leak in DeleteService handler d05dda61d PEAP: Explicitly clear temporary keys from memory when using CMK 4e1cd3468 EAP-PEAP: Derive EMSK and use 128-octet derivation for MSK d8c20ec59 DPP: Clear dpp_listen_freq on remain-on-channel failure 59fa20538 P2P: Allow the avoid channels for P2P discovery/negotiation e34cd9f06 WNM: Fix WNM-Sleep Mode Request bounds checking 159a7fbde crl_reload_interval: Add CRL reloading support 83c860813 AP: Add wpa_psk_file reloading in runtime ec5c39a55 AP: Allow identifying which passphrase station used with wpa_psk_file b08c9ad0c AP: Expose PMK outside of wpa_auth module 89896c000 tests: Use python3 compatible print statement bab493b90 tests: Use python3 compatible "except" statement 0dab47733 Write multi_ap_backhaul_sta to wpa_supplicant config 98251c6f2 dbus: Document more possible BSS/RSA/KeyMgmt values 1e591df06 Check supported types in wpas_mac_addr_rand_scan_set() c85249aa1 Fix test compilation error related to sme_event_unprot_disconnect() 42d308635 SAE: Advertise Password Identifier use 59c693064 HS 2.0 server: Command line option to fetch the version information 2d1762fa4 HS 2.0 server: Alternative subrem updateNode for certificate credentials d97cf2a11 HS 2.0 server: Use noMOUpdate in client certificate subrem 13a200a92 FILS: Remove notes about experimental implementation 86d4e0537 dbus: Expose support of SAE key management in BSS properties Change-Id: I83ffca34ff5349c226db6215ff1ae35c3b7ab335
Diffstat (limited to 'wpa_supplicant/wpa_supplicant.conf')
-rw-r--r--wpa_supplicant/wpa_supplicant.conf58
1 files changed, 55 insertions, 3 deletions
diff --git a/wpa_supplicant/wpa_supplicant.conf b/wpa_supplicant/wpa_supplicant.conf
index 4f591602..1bd43b22 100644
--- a/wpa_supplicant/wpa_supplicant.conf
+++ b/wpa_supplicant/wpa_supplicant.conf
@@ -907,6 +907,13 @@ fast_reauth=1
# PMF required: ieee80211w=2 and key_mgmt=WPA-EAP-SHA256
# (and similarly for WPA-PSK and WPA-WPSK-SHA256 if WPA2-Personal is used)
#
+# ocv: whether operating channel validation is enabled
+# This is a countermeasure against multi-channel man-in-the-middle attacks.
+# Enabling this automatically also enables ieee80211w, if not yet enabled.
+# 0 = disabled (default)
+# 1 = enabled
+#ocv=1
+#
# auth_alg: list of allowed IEEE 802.11 authentication algorithms
# OPEN = Open System authentication (required for WPA/WPA2)
# SHARED = Shared Key authentication (requires static WEP keys)
@@ -987,6 +994,22 @@ fast_reauth=1
# 0: Encrypt traffic (default)
# 1: Integrity only
#
+# macsec_replay_protect: IEEE 802.1X/MACsec replay protection
+# This setting applies only when MACsec is in use, i.e.,
+# - macsec_policy is enabled
+# - the key server has decided to enable MACsec
+# 0: Replay protection disabled (default)
+# 1: Replay protection enabled
+#
+# macsec_replay_window: IEEE 802.1X/MACsec replay protection window
+# This determines a window in which replay is tolerated, to allow receipt
+# of frames that have been misordered by the network.
+# This setting applies only when MACsec replay protection active, i.e.,
+# - macsec_replay_protect is enabled
+# - the key server has decided to enable MACsec
+# 0: No replay window, strict check (default)
+# 1..2^32-1: number of packets that could be misordered
+#
# macsec_port: IEEE 802.1X/MACsec port
# Port component of the SCI
# Range: 1-65534 (default: 1)
@@ -995,9 +1018,10 @@ fast_reauth=1
# This allows to configure MACsec with a pre-shared key using a (CAK,CKN) pair.
# In this mode, instances of wpa_supplicant can act as MACsec peers. The peer
# with lower priority will become the key server and start distributing SAKs.
-# mka_cak (CAK = Secure Connectivity Association Key) takes a 16-bytes (128 bit)
-# hex-string (32 hex-digits)
-# mka_ckn (CKN = CAK Name) takes a 32-bytes (256 bit) hex-string (64 hex-digits)
+# mka_cak (CAK = Secure Connectivity Association Key) takes a 16-byte (128-bit)
+# hex-string (32 hex-digits) or a 32-byte (256-bit) hex-string (64 hex-digits)
+# mka_ckn (CKN = CAK Name) takes a 1..32-bytes (8..256 bit) hex-string
+# (2..64 hex-digits)
# mka_priority (Priority of MKA Actor) is in 0..255 range with 255 being
# default priority
#
@@ -1216,12 +1240,19 @@ fast_reauth=1
# For EAP-FAST, this must be set to 0 (or left unconfigured for the
# default value to be used automatically).
# tls_disable_tlsv1_0=1 - disable use of TLSv1.0
+# tls_disable_tlsv1_0=0 - explicitly enable use of TLSv1.0 (this allows
+# systemwide TLS policies to be overridden)
# tls_disable_tlsv1_1=1 - disable use of TLSv1.1 (a workaround for AAA servers
# that have issues interoperating with updated TLS version)
+# tls_disable_tlsv1_1=0 - explicitly enable use of TLSv1.1 (this allows
+# systemwide TLS policies to be overridden)
# tls_disable_tlsv1_2=1 - disable use of TLSv1.2 (a workaround for AAA servers
# that have issues interoperating with updated TLS version)
+# tls_disable_tlsv1_2=0 - explicitly enable use of TLSv1.2 (this allows
+# systemwide TLS policies to be overridden)
# tls_disable_tlsv1_3=1 - disable use of TLSv1.3 (a workaround for AAA servers
# that have issues interoperating with updated TLS version)
+# tls_disable_tlsv1_3=0 - enable TLSv1.3 (experimental - disabled by default)
# tls_ext_cert_check=0 - No external server certificate validation (default)
# tls_ext_cert_check=1 - External server certificate validation enabled; this
# requires an external program doing validation of server certificate
@@ -1381,6 +1412,20 @@ fast_reauth=1
# Treated as hint by the kernel.
# -1 = Do not make any changes.
# 0-3 = Set AMPDU density (aka factor) to specified value.
+#
+# tx_stbc: Allow overriding STBC support for TX streams
+# Value: 0-1, see IEEE Std 802.11-2016, 9.4.2.56.2.
+# -1 = Do not make any changes (default)
+# 0 = Set if not supported
+# 1 = Set if supported
+#
+# rx_stbc: Allow overriding STBC support for RX streams
+# Value: 0-3, see IEEE Std 802.11-2016, 9.4.2.56.2.
+# -1 = Do not make any changes (default)
+# 0 = Set if not supported
+# 1 = Set for support of one spatial stream
+# 2 = Set for support of one and two spatial streams
+# 3 = Set for support of one, two and three spatial streams
# disable_vht: Whether VHT should be disabled.
# 0 = VHT enabled (if AP supports it)
@@ -1396,6 +1441,13 @@ fast_reauth=1
# 2: MCS 0-9
# 3: not supported
+# multi_ap_backhaul_sta: Multi-AP backhaul STA functionality
+# 0 = normal STA (default)
+# 1 = backhaul STA
+# A backhaul STA sends the Multi-AP IE, fails to associate if the AP does not
+# support Multi-AP, and sets 4-address mode if it does. Thus, the netdev can be
+# added to a bridge to allow forwarding frames over this backhaul link.
+
##### Fast Session Transfer (FST) support #####################################
#
# The options in this section are only available when the build configuration