aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/config_winreg.c
Commit message (Collapse)AuthorAgeFilesLines
* EAP peer: Add framework for external SIM/USIM processingJouni Malinen2013-10-201-0/+3
| | | | | | | | | | | | | | The new configuration parameter external_sim=<0/1> can now be used to configure wpa_supplicant to use external SIM/USIM processing (e.g., GSM authentication for EAP-SIM or UMTS authentication for EAP-AKA). The requests and responses for such operations are sent over the ctrl_iface CTRL-REQ-SIM and CTRL-RSP-SIM commands similarly to the existing password query mechanism. Changes to the EAP methods to use this new mechanism will be added in separate commits. Signed-hostap: Jouni Malinen <j@w1.fi>
* P2P: Maintain list of per-client PSKs for persistent groupsJouni Malinen2013-09-011-0/+1
| | | | | | | | | Record all generated per-client PSKs in the persistent group network block and configure these for the GO Authenticator whenever re-starting the persistent group. This completes per-client PSK support for persistent groups. Signed-hostap: Jouni Malinen <j@w1.fi>
* wpa_supplicant: Add option -I for additional config fileDmitry Shmidt2013-04-231-2/+7
| | | | | | | | This option can be used only for global parameters that are not going to be changed from settings. Signed-off-by: Dmitry Shmidt <dimitrysh@google.com> Signed-off-by: Iliyan Malchev <malchev@google.com>
* Allow PMF to be enabled by defaultJouni Malinen2012-11-241-1/+6
| | | | | | | | | | Previously, PMF (protected management frames, IEEE 802.11w) could be enabled only with a per-network parameter (ieee80211w). The new global parameter (pmf) can now be used to change the default behavior to be PMF enabled (pmf=1) or required (pmf=2) for network blocks that do not override this with the ieee80211w parameter. Signed-hostap: Jouni Malinen <j@w1.fi>
* Allow OKC to be enabled by defaultJouni Malinen2012-11-121-1/+6
| | | | | | | | | | | Previously, OKC (opportunistic key caching, a.k.a. proactive key caching) could be enabled only with a per-network parameter (proactive_key_caching). The new global parameter (okc) can now be used to change the default behavior to be OKC enabled (okc=1) for network blocks that do not override this with the proactive_key_caching parameter. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Move PSK/passphrase configuration check into use time from parsingJouni Malinen2012-08-031-7/+0
| | | | | | | | | Instead of rejecting network blocks without PSK/passphrase at the time the configuration file is read, allow such configuration to be loaded and only behave as if the network block with missing PSK/passphrase is disabled. Signed-hostap: Jouni Malinen <j@w1.fi>
* Remove the GPL notification from files contributed by Jouni MalinenJouni Malinen2012-02-111-8/+2
| | | | | | | Remove the GPL notification text from the files that were initially contributed by myself. Signed-hostap: Jouni Malinen <j@w1.fi>
* Use wpa_key_mgmt_*() helpersJouni Malinen2011-11-241-3/+1
| | | | | | | This cleans up the source code and makes it less likely that new AKM addition misses some needed changes in the future. Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Store (secondary) device type as binaryJohannes Berg2011-03-171-3/+13
| | | | | | | Instead of converting back and forth from the string representation, always use the binary representation internally. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* Allow AP mode to disconnect STAs based on low ACK conditionJohannes Berg2010-12-281-0/+4
| | | | | | | | | | | The nl80211 driver can report low ACK condition (in fact it reports complete loss right now only). Use that, along with a config option, to disconnect stations when the data connection is not working properly, e.g., due to the STA having went outside the range of the AP. This is disabled by default and can be enabled with disassoc_low_ack=1 in hostapd or wpa_supplicant configuration file. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* P2P: Add mechanism for timing out idle groupsJouni Malinen2010-10-251-0/+4
| | | | | | | | | | | | | A new configuration parameter, p2p_group_idle, can now be used to set idle timeout value for P2P groups in seconds (0 = no timeout). If set, this values is used to remove P2P group (both GO and P2P client) interfaces after the group has been idle (no clients/GO seen) for the configuration duration. The P2P-GROUP-REMOVED event is now indicating the reason for group removal when known. For example: P2P-GROUP-REMOVED wlan0 GO reason=REQUESTED P2P-GROUP-REMOVED wlan1 client reason=IDLE
* Add max_num_sta config option for wpa_supplicant AP modeJouni Malinen2010-10-191-0/+4
| | | | | This can be used to limit the number of stations allowed to be connected to the AP.
* P2P: Add global configuration parameters for P2PJouni Malinen2010-09-091-0/+8
|
* winreg: Get rid of compiler warningJouni Malinen2010-09-021-1/+1
|
* Add optional scan result filter based on SSIDJouni Malinen2010-03-051-0/+4
| | | | | | | | | filter_ssids=1 global configuration parameter can now be used to enable scan result filtering (with -Dnl80211 only for now) based on the configured SSIDs. In other words, only the scan results that have an SSID matching with one of the configured networks are included in the BSS table. This can be used to reduce memory needs in environments that have huge number of APs.
* Make maximum BSS table size configurableJouni Malinen2010-03-051-0/+7
| | | | | | New global configuration parameter bss_max_count can now be used to change the maximum BSS table size. The old fixed size limit (200) is used as the default value for this parameter.
* WPS: Make Config Methods configurable for wpa_supplicantJouni Malinen2009-12-211-0/+4
| | | | | | | | This adds config_methods configuration option for wpa_supplicant following the design used in hostapd. In addition, the string is now parsed in common code from src/wps/wps_common.c and the list of configurable methods include all the defined methods from WPS 1.0h spec.
* WPS: Add configurable option for processing credentials externallyJouni Malinen2009-01-181-0/+4
| | | | | | | The wps_cred_process option can be used to configure wpa_supplicant to send received Credential attributes for external processing over ctrl_iface and dbus. This allows external programs to update their configuration when WPS is used to provision new networks.
* Silenced number of Doxygen warningsJouni Malinen2009-01-041-5/+9
|
* Fixed global conf write to skip default values for uuid and os_versionJouni Malinen2008-12-181-1/+1
|
* Added configuration of WPS device parameters for wpa_supplicantJouni Malinen2008-12-131-2/+47
|
* WPS: Moved UUID configuration from phase1 into global config areaJouni Malinen2008-11-261-0/+33
|
* Added preliminary Wi-Fi Protected Setup (WPS) implementationJouni Malinen2008-11-231-0/+2
| | | | | | | | | | | | | This adds WPS support for both hostapd and wpa_supplicant. Both programs can be configured to act as WPS Enrollee and Registrar. Both PBC and PIN methods are supported. Currently, hostapd has more complete configuration option for WPS parameters and wpa_supplicant configuration style will likely change in the future. External Registrars are not yet supported in hostapd or wpa_supplicant. While wpa_supplicant has initial support for acting as an Registrar to configure an AP, this is still using number of hardcoded parameters which will need to be made configurable for proper operation.
* Separate OpenSSL engine configuration for Phase 2Carolin Latze2008-11-181-0/+3
| | | | | | | | | | | | | | I fixed the engine issue in phase2 of EAP-TTLS. The problem was that you only defined one engine variable, which was read already in phase1. I defined some new variables: engine2 engine2_id pin2 and added support to read those in phase2 wheres all the engine variables without number are only read in phase1. That solved it and I am now able to use an engine also in EAP-TTLS phase2.
* Added support for using SHA256-based stronger key derivation for WPA2Jouni Malinen2008-08-311-2/+3
| | | | | | IEEE 802.11w/D6.0 defines new AKMPs to indicate SHA256-based algorithms for key derivation (and AES-CMAC for EAPOL-Key MIC). Add support for using new AKMPs and clean up AKMP processing with helper functions in defs.h.
* Add support to wpa_supplicant configuring eap_peer for client cert and CADavid Smith2008-05-231-0/+5
| | | | cert on smartcard, plus handling phase2 auth with smartcard same as phase1.
* Re-initialize hostapd/wpa_supplicant git repository based on 0.6.3 releaseJouni Malinen2008-02-281-0/+883