path: root/wpa_supplicant/defconfig
Commit message (Collapse)AuthorAgeFilesLines
* Add Wi-Fi Direct to the build configuration exampleJouni Malinen2013-11-201-0/+5
| | | | | | | In addition, include Wi-Fi Direct support for Android builds by default. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* eloop: Remove eloop_none.cJouni Malinen2013-11-171-1/+0
| | | | | | | | | | This was supposed to be a minimal sample of eloop wrapper, but it is unclear whether this is of that much use and the file has not been kept up-to-date. Remove this file to reduce maintenance effort. The other eloop*.c files can be used as a starting point if something new is needed. Signed-hostap: Jouni Malinen <j@w1.fi>
* Replace unnecessary UTF-8 characters with ASCII versionsJouni Malinen2013-11-021-1/+1
| | | | | | | There is no need for using UTF-8 in these files when perfectly fine ASCII versions of these characters exist. Signed-hostap: Jouni Malinen <j@w1.fi>
* wpa_supplicant: Add CONFIG_IEEE80211ACEliad Peller2013-10-271-0/+4
| | | | | | | In order to support P2P GO with 11ac support, add CONFIG_IEEE80211AC config option support to the Makefile. Signed-hostap: Eliad Peller <eliadx.peller@intel.com>
* EAP-EKE: Add peer implementationJouni Malinen2013-07-071-0/+3
| | | | | | This adds a new password-based EAP method defined in RFC 6124. Signed-hostap: Jouni Malinen <j@w1.fi>
* Remove CONFIG_NO_WPA2 build parameterJouni Malinen2013-06-071-5/+0
| | | | | | | | | | There is not much use for enabling WPA without WPA2 nowadays since most networks have been upgraded to WPA2. Furthermore, the code size savings from disabling just WPA2 are pretty small, so there is not much justification for maintaining this build option. Remove it to get rid of undesired complexity. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Synchronize build config comments for wpa_supplicantJouni Malinen2013-05-041-0/+10
| | | | | | | | This updates number of comments in android.config to match the latest version in defconfig and adds some of the entries that were previously present only in android.config into defconfig. Signed-hostap: Jouni Malinen <j@w1.fi>
* wpa_supplicant: Support VHT capability overridesJohannes Berg2013-03-101-0/+3
| | | | | | | | | Add support for VHT capability overrides to allow testing connections with a subset of the VHT capabilities that are actually supported by the device. The only thing that isn't currently supported (by mac80211 and this code) is the RX/TX highest rate field. Signed-hostap: Johannes Berg <johannes.berg@intel.com>
* wpa_supplicant: Add optional remote access for ctrl_ifaceJanusz Dziedzic2012-08-051-0/+1
| | | | | | | | | Add new option for ctrl iface: CONFIG_CTRL_IFACE=udp-remote. This enables remote access to control interface via UDP port(s). This should be used for testing purpose only since there is no authentication or access control on the commands. Signed-hostap: Janusz Dziedzic <janusz.dziedzic@tieto.com>
* EXT PW: Add framework for supporting external password storageJouni Malinen2012-08-031-0/+8
| | | | | | | | | | | This new mechanism can be used to make wpa_supplicant using external storage (e.g., key store in the operating system) for passwords, passphrases, and PSKs. This commit is only adding the framework part needed to support this, i.e., no actual configuration parameter can yet use this new mechanism. In addition, only a simple test backend is added to allow developer testing of the functionality. Signed-hostap: Jouni Malinen <j@w1.fi>
* WPS: Document NFC use cases with password/config tokenJouni Malinen2012-06-281-0/+2
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Add a simple periodic autoscan moduleTomasz Bursztyka2012-06-261-0/+2
| | | | | | | This module will sets a fixed scanning interval. Thus, the parameter to this module is following this format: <fixed interval> Signed-hostap: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
* Add autoscan module named exponentialTomasz Bursztyka2012-06-261-1/+4
| | | | | | | This module will compute the interval on a base exponential. Thus, params to this module are following this format: <base>:<limit> Signed-hostap: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
* Add automatic scanning supportTomasz Bursztyka2012-06-261-0/+5
| | | | | | | | | | | | | | | | | | | Like bgscan, autoscan is an optional module based feature to automate scanning but while disconnected or inactive. Instead of requesting directly a scan, it only sets the scan_interval and the sched_scan_interval. So, if the driver supports sched_scan, autoscan will be able to tweak its interval. Otherwise, the tweaked scan_interval will be used. If scan parameters needs to be tweaked, an autoscan_params pointer in wpa_s will provide those. So req_scan / req_sched_scan will not set the scan parameters as they usually do, but instead will use this pointer. Modules will not have to request a scan directly, like bgscan does. Instead, it will need to return the interval it wants after each notification. Signed-hostap: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
* Describe CONFIG_AP=y and CONFIG_P2P=y in defconfigJouni Malinen2012-06-231-0/+12
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* WNM: Add advertisement of BSS max idle periodJouni Malinen2012-05-281-0/+4
| | | | | | | | | | | If WNM is enabled for the build (CONFIG_WNM=y), add BSS max idle period information to the (Re)Association Response frame from the AP and parse this information on the station. For SME-in-wpa_supplicant case, add a timer to handle periodic transmission of the keep-alive frame. The actual request for the driver to transmit a frame is not yet implemented. Signed-hostap: Jouni Malinen <j@w1.fi>
* HS 2.0: Add Hotspot 2.0 ANQP routinesJay Katabathuni2012-05-081-0/+3
| | | | Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* Add more documentation for IEEE 802.11w/PMF configurationJouni Malinen2012-05-051-3/+1
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* Clarify comment in wpa_supplicant/defconfigAngie Chinchilla2012-04-061-2/+2
| | | | | | | I think this comment, as originally stated, says the opposite of what is meant. Reword to help the next guy. Signed-hostap: Angie Chinchilla <angie.v.chinchilla@intel.com>
* debug: Add option to log to Linux tracingJohannes Berg2012-03-311-0/+6
| | | | | | | | | | | | Add the option (-T) to wpa_supplicant to log all debug messages into the kernel tracing, allowing to aggregate kernel debugging with wpa_supplicant debugging and recording all with trace-cmd. Since tracing has relatively low overhead and can be filtered afterwards, record all messages regardless of log level. However, it will honor the -K option and not record key material by default. Signed-hostap: Johannes Berg <johannes.berg@intel.com>
* eloop: Support poll() in eloopBen Greear2012-02-121-0/+3
| | | | | | | | When using more than around 200 virtual stations, we start hitting the max number of file descriptors supported by select(). This patch adds support for poll(), which has no hard upper limit. Signed-hostap: Ben Greear <greearb@candelatech.com>
* EAP-pwd: Describe build option for EAP-pwdDan Harkins2012-02-111-0/+3
| | | | Signed-hostap: Dan Harkins <dharkins@lounge.org>
* Support HT capability overridesBen Greear2012-01-291-0/+3
| | | | | | | | | | | | | | | | | | | | | | This allows HT capabilities overrides on kernels that support these features. MCS Rates can be disabled to force to slower speeds when using HT. Rates cannot be forced higher. HT can be disabled, forcing an 802.11a/b/g/n station to act like an 802.11a/b/g station. HT40 can be disabled. MAX A-MSDU can be disabled. A-MPDU Factor and A-MPDU Density can be modified. Please note that these are suggestions to the kernel. Only mac80211 drivers will work at all. The A-MPDU Factor can only be decreased and the A-MPDU Density can only be increased currently. Signed-hostap: Ben Greear <greearb@candelatech.com>
* TLS: Add build configuration for TLS v1.2 supportJouni Malinen2011-11-271-0/+7
| | | | | | | | | This allows the internal TLS implementation to be built for TLS v1.2 support. In addition to the build option, this changes the TLS PRF based on the negotiated version number. Though, this commit does not yet complete support for TLS v1.2. Signed-hostap: Jouni Malinen <j@w1.fi>
* Remove user space client MLMEJouni Malinen2011-10-221-5/+0
| | | | | | | | | This code was used only with driver_test.c to allow MLME operations in hostapd to be tested without having to use a real radio. There are no plans on extending this to any other use than testing and mac80211_hwsim has now obsoled the need for this type of testing. As such, we can drop this code from wpa_supplicant to clean up the implementation of unnecessary complexity.
* Add CONFIG_WPS_REG_DISABLE_OPEN to defconfigAndrii Bordunov2011-10-221-0/+3
* IEEE 802.11u: Allow Interworking and HESSID to be configuredJouni Malinen2011-10-161-0/+6
| | | | | | The new wpa_supplicant.conf file global parameters interworking and hessid can be used to configure wpa_supplicant to include Interworking element in Probe Request frames.
* Remove EAP-TTLSv1 and TLS/IAJouni Malinen2011-09-251-9/+1
| | | | | | | | | | | | | | These protocols seem to be abandoned: latest IETF drafts have expired years ago and it does not seem likely that EAP-TTLSv1 would be deployed. The implementation in hostapd/wpa_supplicant was not complete and not fully tested. In addition, the TLS/IA functionality was only available when GnuTLS was used. Since GnuTLS removed this functionality in 3.0.0, there is no available TLS/IA implementation in the latest version of any supported TLS library. Remove the EAP-TTLSv1 and TLS/IA implementation to clean up unwanted complexity from hostapd and wpa_supplicant. In addition, this removes any potential use of the GnuTLS extra library.
* TLS: Add support for TLS v1.1 (RFC 4346) with internal TLSJouni Malinen2011-09-251-0/+7
| | | | | This is disabled by defautl and can be enabled with CONFIG_TLSV11=y build configuration parameter.
* Add CONFIG_IEEE80211N to wpa_supplicant defconfigJouni Malinen2011-07-181-0/+3
| | | | This is needed for AP mode functionality with some drivers.
* Add notes for CONFIG_WPS_ER build configuration optionJouni Malinen2011-06-231-0/+2
| | | | [Bug 407]
* random: Add support for maintaining internal entropy store over restartsJouni Malinen2011-05-311-2/+8
| | | | | | | This can be used to avoid rejection of first two 4-way handshakes every time hostapd (or wpa_supplicant in AP/IBSS mode) is restarted. A new command line parameter, -e, can now be used to specify an entropy file that will be used to maintain the needed state.
* Enable CONFIG_DRIVER_NL80211=y in the default configurationJouni Malinen2011-04-211-1/+6
| | | | | nl80211 should be preferred over WEXT with any recent Linux kernel version.
* Document CONFIG_DEBUG_SYSLOG and CONFIG_DEBUG_SYSLOG_FACILITYJouni Malinen2011-03-201-0/+5
* Maintain internal entropy pool for augmenting random number generationJouni Malinen2010-11-231-0/+25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default, make hostapd and wpa_supplicant maintain an internal entropy pool that is fed with following information: hostapd: - Probe Request frames (timing, RSSI) - Association events (timing) - SNonce from Supplicants wpa_supplicant: - Scan results (timing, signal/noise) - Association events (timing) The internal pool is used to augment the random numbers generated with the OS mechanism (os_get_random()). While the internal implementation is not expected to be very strong due to limited amount of generic (non-platform specific) information to feed the pool, this may strengthen key derivation on some devices that are not configured to provide strong random numbers through os_get_random() (e.g., /dev/urandom on Linux/BSD). This new mechanism is not supposed to replace proper OS provided random number generation mechanism. The OS mechanism needs to be initialized properly (e.g., hw random number generator, maintaining entropy pool over reboots, etc.) for any of the security assumptions to hold. If the os_get_random() is known to provide strong ramdom data (e.g., on Linux/BSD, the board in question is known to have reliable source of random data from /dev/urandom), the internal hostapd random pool can be disabled. This will save some in binary size and CPU use. However, this should only be considered for builds that are known to be used on devices that meet the requirements described above. The internal pool is disabled by adding CONFIG_NO_RANDOM_POOL=y to the .config file.
* wpa_cli: Add internal line edit implementationJouni Malinen2010-11-141-0/+4
| | | | | | CONFIG_WPA_CLI_EDIT=y can now be used to build wpa_cli with internal implementation of line editing and history support. This can be used as a replacement for CONFIG_READLINE=y.
* WPS 2.0: Make WSC 2.0 support to be build option (CONFIG_WPS2)Jouni Malinen2010-09-091-0/+2
| | | | | For now, the default build will only include WSC 1.0 support. CONFIG_WPS2=y can be used to add support for WSC 2.0.
* Solaris: Add support for wired IEEE 802.1X clientMasashi Honma2010-08-281-0/+4
| | | | | | | | | This patch adds support for wired IEEE 802.1X client on the Solaris. I have tested with these: OS : OpenSolaris 2009.06 EAP : EAP-MD5 Switch : Cisco Catalyst 2950
* bsd: Add support for WPA_TRACE and WPA_TRACE_BFDMasashi Honma2010-01-091-0/+10
| | | | On FreeBSD 8.0, WPA_TRACE and WPA_TRACE_BFD functionality build fails.
* dbus: Get rid of libxml2 dependency with introspectionJouni Malinen2010-01-011-1/+1
| | | | | | The XML used in D-Bus introspection is simple and there is no need to use libxml2 to generate it. This gets rid of the dependency on the large library by using internal XML generation.
* Include BSS table unconditionally in the wpa_supplicant buildJouni Malinen2009-12-271-5/+0
| | | | | | | | | | | | | | This will allow more cleanup to be done for scan results processing since all code can now be made to depend on the BSS table instead of the temporary scan results. Once remaining code has been converted to use the BSS table, the new scan results can be freed immediately after the BSS table has been updated. In addition, filtering of BSS information should be added to better support systems with limited resources. For now, memory use can be limited by defining WPA_BSS_MAX_COUNT to be smaller. Anyway, better filtering of results to only the configured networks should be added to improve this.
* Add BSS table to track scan results without dropping informationJouni Malinen2009-12-271-0/+5
| | | | | | | | | | | Collect information from scan results into a BSS table that will not expire information as quickly as scan results where every new scan, no matter for how limited set of channels/SSIDs, clears all old information. For now, this is only used for D-Bus BSS added/removed notifications, but this will likely be extended to be used internally instead of the scan results to better support partial scans.
* Comment CONFIG_WPA_TRACE_BFD=y out by defaultJouni Malinen2009-12-231-1/+1
* Describe tracing build options for developersJouni Malinen2009-12-201-0/+10
* Remove obsolete Prism54.org driver support (driver_prism54.c)Jouni Malinen2009-12-121-5/+0
| | | | | | | | | | | | | | | | | The Prism54.org project seems have been dead for a while and it does not look like this driver would ever be maintained again. Furthermore, it is difficult to find a version that would work with the driver_prism54.c wrapper and there is another driver for these card in the Linux kernel tree. The hostapd integration in driver_prism54.c is quite different from the other driver wrappers and would require major effort to get it cleaned up. Since there does not seem to be any real users for the cleaned up version, there does not seem to be justification to spend this effort on the wrapper. This old code is making it much more difficult to clean up the driver interface and at this point, the best option seems to be to remove the driver wrappers. Should someone really still need this, the old code will continue to be available in hostapd 0.6.x.
* Add cleared deprecation notes on iwl,ndiswrapper,madwifi(sta) wrappersJouni Malinen2009-11-231-0/+3
| | | | | | | These driver wrappers should not be used anymore; WEXT should be used instead. However, there may still be users stuck on older kernel versions that may require driver specific wrappers, so the source code still remains in the repository.
* Add 'none' driver as an option for wpa_supplicantJouni Malinen2009-11-201-0/+3
| | | | | This can be used, e.g., with WPS ER when no network interface is actually used for IEEE 802.1X or wireless operations.
* wpa_supplicant: new DBus API implementationWitold Sowa2009-11-091-1/+9
| | | | | | | | | | | | | | | | | | | | This patch implements the new DBus API. Both, the new and the previous API may work concurrently and may be turned on or off separately in .config file. Some features of the new API are: - more wpa_supplicant's events are signaled with DBus signals, - introspection data (requires libxml2 and may be disabled), - CurrentBSS and CurrentNetwork properties, - PropertyChanged signal for most of properties, - Relatively easy to extend. .config options for the new API are: CONFIG_CTRL_IFACE_DBUS_NEW=y and CONFIG_CTRL_IFACE_DBUS_INTRO=y for introspection. This commit misses couple of parts from the full implementation (these are still under review): - fetching all configuration parameters for learning WPS information - scan result BSS add/remove notification (register_bss() and unregister_bss() notification callbacks)
* Replace CONFIG_NO_AES_EXTRAS with auto-detection during buildJouni Malinen2009-10-111-5/+0
| | | | | | There is no need to do this manually since it is possible to figure out automatically which AES extra files need to be included in the build.
* Document CONFIG_CLIENT_MLME option as specific to test driverJouni Malinen2009-03-201-7/+5
| | | | | Since user space MLME is not used with nl80211 anymore, this option is only of use with driver_test.