Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:used

18 # This option can be used to allow wpa_supplicant to overwrite configuration
31 # interface mechanism is used. For all cases, the existence of this parameter
32 # in configuration is used to determine whether the control interface is
40 # interface is used.
48 # run as non-root users. However, since the control interface can be used to
63 # variable is just used to select that the control interface is to be created.
66 # For Windows Named Pipe: This value can be used to set the security descriptor
82 # to 1 by default. This configuration value can be used to set it to the new
96 # parameters (e.g., WPA IE generation); this mode can also be used with
99 # also be used when using wired Ethernet drivers.
101 # BSSID); this can be used, e.g., with ndiswrapper and NDIS drivers to
115 # support it. This variable can be used to disable fast re-authentication.
120 # These options can be used to load OpenSSL engines.
133 # loaded here before being used in the network blocks. By default, EAP methods
139 # This field can be used to configure arbitrary driver interace parameters. The
140 # format is specific to the selected driver interface. This field is not used
183 # Used format: <categ>-<OUI>-<subcateg>
222 # These parameters can be used to configure a fixed NFC password token for the
224 # parameters are used, the station is assumed to be deployed with a NFC tag
235 # This can be used to limit memory use on the BSS entries (cached scan
264 # This timeout value is used in P2P GO mode to clean up
269 # This parameter can be used to set the default behavior for the
277 # This parameter can be used to set the default behavior for the ieee80211w
299 # This parameter can be used to add additional vendor specific element(s) into
302 # one or more elements). This is used in AP and P2P GO modes.
309 # be used to configure such old information to be ignored instead of
324 # If this is set, scans will be used to request response only from BSSes
325 # belonging to the specified Homogeneous ESS. This is used only if interworking
339 # Each credential used for automatic network selection is configured as a set
341 # interworking_select and interworking_connect commands are used.
347 # (0). This field can be used to give higher priority for credentials
364 # This field is used with Interworking networking selection for a case
365 # where client certificate/private key is used for authentication
366 used since working
369 # Alternatively, a named configuration blob can be used by setting
373 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
376 # used since working directory may change when wpa_supplicant is run
379 # Windows certificate store can be used by leaving client_cert out and
389 # certificate store (My user account) is used, whereas computer store
390 # (Computer account) is used when running wpasvc as a service.
392 # Alternatively, a named configuration blob can be used by setting
403 # This is used to compare against the Domain Name List to figure out
408 # Roaming Consortium OI that can be used to determine which access
416 # This optional field can be used to specify which EAP method will be
417 # used with this credential. If not set, the EAP method is selected
421 # This optional field is used with like the 'eap' parameter.
424 # This optional field is used with like the 'eap' parameter.
427 # This optional field can be used to excluded specific SSID(s) from
428 # matching with the network. Multiple entries can be used to specify more
464 # (the first match is used).
469 # 0 = this network can be used (default)
484 # 1 = scan with SSID-specific Probe Request frames (this can be used to
488 # bssid: BSSID (optional); if set, this network block is used only when
493 # networks are more desirable, this field can be used to change the order in
501 # networks in the order that used in the configuration file.
507 # Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP)
514 # 2412 = IEEE 802.11b/g channel 1. This value is used to configure the initial
516 # In addition, this value is only used by the station that creates the IBSS. If
518 # the network will be used instead of this configured value.
522 # BSS. If the subset of channels used by the network is known, this option can
523 # be used to optimize scanning to not occur on channels that the network does
545 # learn - Learn channels used by the network and try to avoid bgscans on other
553 # RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
561 # NONE = WPA is not used; plaintext or static WEP could be used
574 # (and similarly for WPA-PSK and WPA-WPSK-SHA256 if WPA2-Personal is used)
579 # LEAP = LEAP/Network EAP (only used with LEAP)
580 # If not set, automatic selection is used (Open System with LEAP enabled if
598 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
602 # be used to indicate that the PSK/passphrase is stored in external storage.
603 # This field is not needed, if WPA-EAP is used.
604 # Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys
617 # mixed_cell: This option can be used to configure whether so called mixed
633 # allowed. This is only used with RSN/WPA2.
638 # wpa_ptk_rekey: Maximum lifetime for PTK in seconds. This can be used to
641 # Following fields are only used with internal EAP implementation.
644 # cannot be used with WPA; to be used as a Phase 2 method
646 # MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
648 # OTP = EAP-OTP (cannot be used separately with WPA; to be used
650 # GTC = EAP-GTC (cannot be used separately with WPA; to be used
659 # This field is also used to configure user NAI for
661 # anonymous_identity: Anonymous identity string for EAP (to be used as the
663 # identity, e.g., EAP-TTLS). This field can also be used with
668 # NtPasswordHash can only be used when the password is for MSCHAPv2 or
673 # be used to indicate that the password is stored in external storage.
678 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
681 # Alternatively, this can be used to only perform matching of the server
694 # certificate store (My user account) is used, whereas computer store
695 # (Computer account) is used when running wpasvc as a service.
703 # Full path should be used since working directory may change when
705 # Alternatively, a named configuration blob can be used by setting this
708 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
710 # the PKCS#12 file in this case. Full path should be used since working
712 # Windows certificate store can be used by leaving client_cert out and
718 # certificate store (My user account) is used, whereas computer store
719 # (Computer account) is used when running wpasvc as a service.
720 # Alternatively, a named configuration blob can be used by setting this
729 # DSA keys always use ephemeral DH keys. This can be used to achieve
748 # 'peapver' can be used to force which PEAP version (0 or 1) is used.
749 # 'peaplabel=1' can be used to force new label, "client PEAP encryption",
750 # to be used during key derivation when PEAPv1 or newer. Most existing
755 # 'peap_outer_success=0' can be used to terminate PEAP authentication on
759 # include_tls_length=1 can be used to force wpa_supplicant to include
762 # sim_min_num_chal=3 can be used to configure EAP-SIM to require three
764 # result_ind=1 can be used to enable EAP-SIM and EAP-AKA to use
766 # 'crypto_binding' option can be used to control PEAPv0 cryptobinding
778 # (these are normally in the phase1 parameter, but can be used also in the
779 # phase2 parameter when EAP-TLS is used within the inner tunnel):
786 # used only for testing purposes)
788 # tls_disable_session_ticket=0 - allow TLS Session Ticket extension to be used
793 # default value to be used automatically).
795 # Following certificate/private key fields are used in inner Phase2
815 # interface used for EAPOL. The default value is suitable for most
826 # provisioned or refreshed. Full path to the file should be used since
828 # background. Alternatively, a named configuration blob can be used by
830 # phase1: fast_provisioning option can be used to enable in-line provisioning
836 # fast_max_pac_list_len=<num> option can be used to set the maximum
838 # fast_pac_format=binary option can be used to select binary format for
854 # disassociated and then deauthenticated. This feature is used to
859 # this inactivity poll is just used as a nicer way of verifying
932 # Only WPA-PSK is used. Any valid cipher combination is accepted.
954 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
1011 # WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner