Deleted Added
sdiff udiff text old ( 189902 ) new ( 214734 )
full compact
1##### Example wpa_supplicant configuration file ###############################
2#
3# ***** Please check wpa_supplicant.conf(5) for details on these options *****
4#
5# This file describes configuration file format and lists all available option.
6# Please also take a look at simpler configuration examples in 'examples'
7# subdirectory.
8#

--- 64 unchanged lines hidden (view full) ---

73eapol_version=1
74
75# AP scanning/selection
76# By default, wpa_supplicant requests driver to perform AP scanning and then
77# uses the scan results to select a suitable AP. Another alternative is to
78# allow the driver to take care of AP scanning and selection and use
79# wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association
80# information from the driver.
81# 1: wpa_supplicant initiates scanning and AP selection
82# 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
83# parameters (e.g., WPA IE generation); this mode can also be used with
84# non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
85# APs (i.e., external program needs to control association). This mode must
86# also be used when using wired Ethernet drivers.
87# 2: like 0, but associate with APs using security policy and SSID (but not
88# BSSID); this can be used, e.g., with ndiswrapper and NDIS drivers to
89# enable operation with hidden SSIDs and optimized roaming; in this mode,
90# the network blocks in the configuration file are tried one by one until
91# the driver reports successful association; each network block should have
92# explicit security policy (i.e., only one option in the lists) for
93# key_mgmt, pairwise, group, proto variables
94#
95# For use in FreeBSD with the wlan module ap_scan must be set to 1.
96ap_scan=1
97
98# EAP fast re-authentication
99# By default, fast re-authentication is enabled for all EAP methods that
100# support it. This variable can be used to disable fast re-authentication.
101# Normally, there is no need to disable this.
102fast_reauth=1
103

--- 72 unchanged lines hidden (view full) ---

176# 5-0050F204-1 (Storage / NAS)
177# 6-0050F204-1 (Network Infrastructure / AP)
178#device_type=1-0050F204-1
179
180# OS Version
181# 4-octet operating system version number (hex string)
182#os_version=01020300
183
184# Credential processing
185# 0 = process received credentials internally (default)
186# 1 = do not process received credentials; just pass them over ctrl_iface to
187# external program(s)
188# 2 = process received credentials internally and pass them over ctrl_iface
189# to external program(s)
190#wps_cred_processing=0
191
192# network block
193#
194# Each network (usually AP's sharing the same SSID) is configured as a separate
195# block in this configuration file. The network blocks are in preference order
196# (the first match is used).
197#
198# network block fields:
199#

--- 28 unchanged lines hidden (view full) ---

228# policy, signal strength, etc.
229# Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not
230# using this priority to select the order for scanning. Instead, they try the
231# networks in the order that they are listed in the configuration file.
232#
233# mode: IEEE 802.11 operation mode
234# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default)
235# 1 = IBSS (ad-hoc, peer-to-peer)
236# Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP)
237# and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
238# to be set to 2 for IBSS. WPA-None requires following network block options:
239# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
240# both), and psk must also be set.
241#
242# frequency: Channel frequency in megahertz (MHz) for IBSS, e.g.,
243# 2412 = IEEE 802.11b/g channel 1. This value is used to configure the initial
244# channel for IBSS (adhoc) networks. It is ignored in the infrastructure mode.
245# In addition, this value is only used by the station that creates the IBSS. If
246# an IBSS network with the configured SSID is already present, the frequency of
247# the network will be used instead of this configured value.
248#
249# proto: list of accepted protocols
250# WPA = WPA/IEEE 802.11i/D3.0
251# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
252# If not set, this defaults to: WPA RSN
253#
254# key_mgmt: list of accepted authenticated key management protocols
255# WPA-PSK = WPA pre-shared key (this requires 'psk' field)
256# WPA-EAP = WPA using EAP authentication

--- 100 unchanged lines hidden (view full) ---

357# PSK) is also configured using this field. For EAP-GPSK, this is a
358# variable length PSK.
359# ca_cert: File path to CA certificate file (PEM/DER). This file can have one
360# or more trusted CA certificates. If ca_cert and ca_path are not
361# included, server certificate will not be verified. This is insecure and
362# a trusted CA certificate should always be configured when using
363# EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
364# change when wpa_supplicant is run in the background.
365# On Windows, trusted CA certificates can be loaded from the system
366# certificate store by setting this to cert_store://<name>, e.g.,
367# ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT".
368# Note that when running wpa_supplicant as an application, the user
369# certificate store (My user account) is used, whereas computer store
370# (Computer account) is used when running wpasvc as a service.
371# ca_path: Directory path for CA certificate files (PEM). This path may
372# contain multiple CA certificates in OpenSSL format. Common use for this

--- 459 unchanged lines hidden ---