Lines Matching +full:channel +full:- +full:spacing
3 * Copyright (c) 2003-2013, Jouni Malinen <j@w1.fi>
17 #define DEFAULT_EAP_WORKAROUND ((unsigned int) -1)
31 #define DEFAULT_BG_SCAN_PERIOD -1
41 #define DEFAULT_TX_STBC -1 /* no change */
42 #define DEFAULT_RX_STBC -1 /* no change */
43 #define DEFAULT_DISABLE_MAX_AMSDU -1 /* no change */
44 #define DEFAULT_AMPDU_FACTOR -1 /* no change */
45 #define DEFAULT_AMPDU_DENSITY -1 /* no change */
47 #define DEFAULT_MAX_OPER_CHWIDTH -1
75 WPAS_MAC_ADDR_STYLE_NOT_SET = -1,
83 * struct wpa_ssid - Network configuration data
86 * data is included in the per-interface configuration data as an element of
92 * next - Next network in global list
100 * pnext - Next network in per-priority list
109 * id - Unique id for the network
119 * ro - Whether a network is declared as read-only
122 * wpa_supplicant using the -I option will be marked as read-only
124 * /etc/wpa_supplicant.conf (from -c argument) if, e.g., wpa_gui tells
134 * priority - Priority group
153 * ssid - Service set identifier (network name)
166 * ssid_len - Length of the SSID
171 * bssid - BSSID
182 * bssid_ignore - List of inacceptable BSSIDs
188 * bssid_accept - List of acceptable BSSIDs
194 * bssid_set - Whether BSSID is configured for this network
199 * bssid_hint - BSSID hint
207 * bssid_hint_set - Whether BSSID hint is configured for this network
212 * go_p2p_dev_addr - GO's P2P Device Address or all zeros if not set
217 * psk - WPA pre-shared key (256 bits)
222 * psk_set - Whether PSK field is configured
227 * passphrase - WPA ASCII passphrase
236 * sae_password - SAE password
240 * passphrase follows the WPA-PSK constraints (8..63 characters) even
246 * sae_password_id - SAE password identifier
256 * ext_psk - PSK/passphrase name in external storage
264 * mem_only_psk - Whether to keep PSK/passphrase only in memory
272 * pairwise_cipher - Bitfield of allowed pairwise ciphers, WPA_CIPHER_*
277 * group_cipher - Bitfield of allowed group ciphers, WPA_CIPHER_*
282 * group_mgmt_cipher - Bitfield of allowed group management ciphers
291 * key_mgmt - Bitfield of allowed key management protocols
298 * bg_scan_period - Background scan period in seconds, 0 to disable, or
299 * -1 to indicate no change to default driver configuration
304 * proto - Bitfield of allowed protocols, WPA_PROTO_*
309 * auth_alg - Bitfield of allowed authentication algorithms
316 * scan_ssid - Scan this SSID with Probe Requests
320 * such drivers to use hidden SSIDs. Note2: Most nl80211-based drivers
330 * eapol_flags - Bit field of IEEE 802.1X/EAPOL options (EAPOL_FLAG_*)
335 * eap - EAP peer configuration for this network
344 * wep_key - WEP keys
349 * wep_key_len - WEP key lengths
354 * wep_tx_keyidx - Default key index for TX frames using WEP
360 * proactive_key_caching - Enable proactive key caching
369 * doing RSN pre-authentication. This requires support from the AP side
370 * and is normally used with wireless switches that co-locate the
373 * Internally, special value -1 is used to indicate that the parameter
380 * mixed_cell - Whether mixed cells are allowed
392 * leap - Number of EAP methods using LEAP
400 * non_leap - Number of EAP methods not using LEAP
409 * eap_workaround - EAP workarounds enabled
424 * mode - IEEE 802.11 operation mode (Infrastucture/IBSS)
428 * 1 = IBSS (ad-hoc, peer-to-peer)
440 * WEP) and WPA-PSK (with proto=RSN). In addition, key_mgmt=WPA-NONE
442 * but its use is deprecated. WPA-None requires following network block
443 * options: proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or
450 * pbss - Whether to use PBSS. Relevant to DMG networks only.
463 * disabled - Whether this network is currently disabled
474 * disabled_for_connect - Whether this network was temporarily disabled
482 * id_str - Network identifier string for external scripts
491 * ieee80211w - Whether management frame protection is enabled
506 * ocv - Enable/disable operating channel validation
509 * to cryptographically verify the operating channel. Setting this
516 * frequency - Channel frequency in megahertz (MHz) for IBSS
518 * This value is used to configure the initial channel for IBSS (adhoc)
519 * networks, e.g., 2412 = IEEE 802.11b/g channel 1. It is ignored in
528 * enable_edmg - Enable EDMG feature in STA/AP mode
535 * edmg_channel - EDMG channel number
537 * This value is used to configure the EDMG channel bonding feature.
538 * In AP mode it defines the EDMG channel to start the AP on.
539 * in STA mode it defines the EDMG channel to use for connection
545 * fixed_freq - Use fixed frequency for IBSS
551 * ACS - Automatic Channel Selection for AP mode
555 * used for both hardware mode and channel when used alone. This will
556 * force the channel to be set to 0, thus enabling ACS.
562 * mesh_basic_rates - BSS Basic rate set for mesh network
576 * Mesh network layer-2 forwarding (dot11MeshForwarding)
595 * wpa_ptk_rekey - Maximum lifetime for PTK in seconds
602 /** wpa_deny_ptk0_rekey - Control PTK0 rekeying
616 * group_rekey - Group rekeying time in seconds
618 * This value, if non-zero, is used as the dot11RSNAConfigGroupRekeyTime
624 * scan_freq - Array of frequencies to scan or %NULL for all
626 * This is an optional zero-terminated array of frequencies in
634 * bgscan - Background scan and roaming parameters or %NULL if none
643 * ignore_broadcast_ssid - Hide SSID in AP mode
657 * freq_list - Array of allowed frequencies or %NULL for all
659 * This is an optional zero-terminated array of frequencies in
667 * p2p_client_list - List of P2P Clients in a persistent group (GO)
676 * num_p2p_clients - Number of entries in p2p_client_list
685 * psk_list - Per-client PSKs (struct psk_list_entry)
690 * p2p_group - Network generated as a P2P group (used internally)
695 * p2p_persistent_group - Whether this is a persistent group
700 * temporary - Whether this network is temporary and not to be saved
705 * export_keys - Whether keys may be exported
714 * disable_ht - Disable HT (IEEE 802.11n) for this network
722 * disable_ht40 - Disable HT40 for this network
730 * disable_sgi - Disable SGI (Short Guard Interval) for this network
738 * disable_ldpc - Disable LDPC for this network
746 * ht40_intolerant - Indicate 40 MHz intolerant for this network
751 * disable_max_amsdu - Disable MAX A-MSDU
753 * A-MDSU will be 3839 bytes when disabled, or 7935
755 * -1 (default) means do not apply any settings to the kernel.
760 * ampdu_factor - Maximum A-MPDU Length Exponent
762 * Value: 0-3, see 7.3.2.56.3 in IEEE Std 802.11n-2009.
767 * ampdu_density - Minimum A-MPDU Start Spacing
769 * Value: 0-7, see 7.3.2.56.3 in IEEE Std 802.11n-2009.
774 * ht_mcs - Allowed HT-MCS rates, in ASCII hex: ffff0000...
781 * tx_stbc - Indicate STBC support for TX streams
783 * Value: -1..1, by default (-1): use whatever the OS or card has
784 * configured. See IEEE Std 802.11-2016, 9.4.2.56.2.
789 * rx_stbc - Indicate STBC support for RX streams
791 * Value: -1..3, by default (-1): use whatever the OS or card has
792 * configured. See IEEE Std 802.11-2016, 9.4.2.56.2.
799 * disable_vht - Disable VHT (IEEE 802.11ac) for this network
807 * vht_capa - VHT capabilities to use
812 * vht_capa_mask - mask for VHT capabilities
828 * disable_he - Disable HE (IEEE 802.11ax) for this network
837 * ap_max_inactivity - Timeout in seconds to detect STA's inactivity
845 * dtim_period - DTIM period in Beacon intervals
851 * beacon_int - Beacon interval (default: 100 TU)
856 * auth_failures - Number of consecutive authentication failures
861 * disabled_until - Network block disabled until this time if non-zero
866 * disabled_due_to - BSSID of the disabling failure
874 * parent_cred - Pointer to parent wpa_cred entry
884 * macsec_policy - Determines the policy for MACsec secure session
887 * 1: MACsec enabled - Should secure, accept key server's advice to
893 * macsec_integ_only - Determines how MACsec are transmitted
896 * - macsec_policy is enabled
897 * - the key server has decided to enable MACsec
905 * macsec_replay_protect - Enable MACsec replay protection
908 * - macsec_policy is enabled
909 * - the key server has decided to enable MACsec
917 * macsec_replay_window - MACsec replay protection window
923 * - macsec_replay_protect is enabled
924 * - the key server has decided to enable MACsec
927 * 1..2^32-1: number of packets that could be misordered
932 * macsec_offload - Enable MACsec hardware offload
935 * - the key server has decided to enable MACsec
944 * macsec_port - MACsec port (in SCI)
948 * Range: 1-65534 (default: 1)
953 * mka_priority - Priority of MKA Actor
955 * Range: 0-255 (default: 255)
960 * macsec_csindex - Cipher suite index for MACsec
962 * Range: 0-1 (default: 0)
967 * mka_ckn - MKA pre-shared CKN
974 * mka_cak - MKA pre-shared CAK
984 * mka_psk_set - Whether mka_ckn and mka_cak are set
993 * roaming_consortium_selection - Roaming Consortium Selection
1001 * roaming_consortium_selection_len - roaming_consortium_selection len
1009 * mac_addr - MAC address policy
1016 * Internally, special value -1 is used to indicate that the parameter
1023 * mac_value - Specific MAC address to be used
1031 * no_auto_peer - Do not automatically peer with compatible mesh peers
1039 * mesh_rssi_threshold - Set mesh parameter mesh_rssi_threshold (dBm)
1041 * -255..-1 = threshold value in dBm
1048 * wps_disabled - WPS disabled in AP mode
1056 * fils_dh_group - FILS DH Group
1059 * 1-65535 DH Group to use for FILS PFS
1064 * dpp_connector - DPP Connector (signedConnector as string)
1069 * dpp_netaccesskey - DPP netAccessKey (own private key)
1074 * dpp_netaccesskey_len - DPP netAccessKey length in octets
1079 * net_access_key_expiry - DPP netAccessKey expiry in UNIX time stamp
1086 * dpp_csign - C-sign-key (Configurator public key)
1091 * dpp_csign_len - C-sign-key length in octets
1096 * dpp_pp_key - ppKey (Configurator privacy protection public key)
1101 * dpp_pp_key_len - ppKey length in octets
1106 * dpp_pfs - DPP PFS
1114 * dpp_pfs_fallback - DPP PFS fallback selection
1122 * dpp_connector_privacy - Network introduction type
1130 * owe_group - OWE DH Group
1134 * 1-65535 DH Group to use for OWE
1136 * Groups 19 (NIST P-256), 20 (NIST P-384), and 21 (NIST P-521) are
1142 * owe_only - OWE-only mode (disable transition mode)
1151 * owe_ptk_workaround - OWE PTK derivation workaround
1158 * SHA256-based PTK derivation which will not work with the updated
1164 * owe_transition_bss_select_count - OWE transition BSS select count
1174 * multi_ap_backhaul_sta - Multi-AP backhaul STA
1175 * 0 = normal (non-Multi-AP) station
1176 * 1 = Multi-AP backhaul station
1181 * ft_eap_pmksa_caching - Whether FT-EAP PMKSA caching is allowed
1182 * 0 = do not try to use PMKSA caching with FT-EAP
1183 * 1 = try to use PMKSA caching with FT-EAP
1185 * This controls whether to try to use PMKSA caching with FT-EAP for the
1191 * multi_ap_profile - Supported Multi-AP profile
1196 * beacon_prot - Whether Beacon protection is enabled
1204 * transition_disable - Transition Disable indication
1214 * bit 0 (0x01): WPA3-Personal (i.e., disable WPA2-Personal = WPA-PSK
1216 * bit 1 (0x02): SAE-PK (disable SAE without use of SAE-PK)
1217 * bit 2 (0x04): WPA3-Enterprise (move to requiring PMF)
1224 * sae_pk - SAE-PK mode
1225 * 0 = automatic SAE/SAE-PK selection based on password; enable
1226 * transition mode (allow SAE authentication without SAE-PK)
1227 * 1 = SAE-PK only (disable transition mode; allow SAE authentication
1228 * only with SAE-PK)
1229 * 2 = disable SAE-PK (allow SAE authentication only without SAE-PK)
1234 * was_recently_reconfigured - Whether this SSID config has been changed
1243 * sae_pwe - SAE mechanism for PWE derivation
1249 * 0 = hunting-and-pecking loop only
1250 * 1 = hash-to-element only
1251 * 2 = both hunting-and-pecking loop and hash-to-element enabled
1256 * disable_eht - Disable EHT (IEEE 802.11be) for this network
1264 * enable_4addr_mode - Set 4addr mode after association
1275 * max_idle - BSS max idle period to request
1283 * ssid_protection - Whether to use SSID protection in 4-way handshake