path: root/wpa_supplicant/wpa_supplicant.conf
diff options
authorJouni Malinen <jouni@codeaurora.org>2018-08-01 14:54:13 (GMT)
committerJouni Malinen <j@w1.fi>2018-08-01 14:55:50 (GMT)
commitecec4878b79076ece9e218e0b8014346325add7a (patch)
tree7132e3cda14398f895e8002c69f7b4787f971cb0 /wpa_supplicant/wpa_supplicant.conf
parente7d73c378d891120c756f5534afc5f6919e0b0c6 (diff)
Provide more details of WPA3 modes in wpa_supplicant.conf
Clarify that proto=RSN is used for WPA3 and add the WPA3-Personal name for SAE and include OWE as a possible key_mgmt value. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
Diffstat (limited to 'wpa_supplicant/wpa_supplicant.conf')
1 files changed, 4 insertions, 1 deletions
diff --git a/wpa_supplicant/wpa_supplicant.conf b/wpa_supplicant/wpa_supplicant.conf
index f4cf91d..4f59160 100644
--- a/wpa_supplicant/wpa_supplicant.conf
+++ b/wpa_supplicant/wpa_supplicant.conf
@@ -865,6 +865,7 @@ fast_reauth=1
# proto: list of accepted protocols
# WPA = WPA/IEEE 802.11i/D3.0
# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
+# Note that RSN is used also for WPA3.
# If not set, this defaults to: WPA RSN
# key_mgmt: list of accepted authenticated key management protocols
@@ -883,7 +884,7 @@ fast_reauth=1
# WPA-EAP-SHA256 = Like WPA-EAP but using stronger SHA256-based algorithms
# SAE = Simultaneous authentication of equals; pre-shared key/password -based
# authentication with stronger security than WPA-PSK especially when using
-# not that strong password
+# not that strong password; a.k.a. WPA3-Personal
# FT-SAE = SAE with FT
# WPA-EAP-SUITE-B = Suite B 128-bit level
# WPA-EAP-SUITE-B-192 = Suite B 192-bit level
@@ -892,6 +893,8 @@ fast_reauth=1
# FILS-SHA384 = Fast Initial Link Setup with SHA384
# FT-FILS-SHA256 = FT and Fast Initial Link Setup with SHA256
# FT-FILS-SHA384 = FT and Fast Initial Link Setup with SHA384
+# OWE = Opportunistic Wireless Encryption (a.k.a. Enhanced Open)
+# DPP = Device Provisioning Protocol
# If not set, this defaults to: WPA-PSK WPA-EAP
# ieee80211w: whether management frame protection is enabled