Lines Matching full:used
18 # This option can be used to allow wpa_supplicant to overwrite configuration
31 # interface mechanism is used. For all cases, the existence of this parameter
32 # in configuration is used to determine whether the control interface is
40 # interface is used.
48 # run as non-root users. However, since the control interface can be used to
63 # variable is just used to select that the control interface is to be created.
66 # For Windows Named Pipe: This value can be used to set the security descriptor
82 # to 1 by default. This configuration value can be used to set it to the new
97 # 0: This mode must only be used when using wired Ethernet drivers
100 # BSSID); this can be used, e.g., with ndiswrapper and NDIS drivers to
106 # Note: ap_scan=0/2 should not be used with the nl80211 driver interface (the
109 # be used with nl80211.
124 # This parameter can be used to force only passive scanning to be used
139 # always used.
150 # This timeout value is used in mesh STA to clean up inactive stations.
164 # support it. This variable can be used to disable fast re-authentication.
169 # These options can be used to load OpenSSL engines in special or legacy
175 # should not need to be used explicitly.
187 # by default) is used.
195 # loaded here before being used in the network blocks. By default, EAP methods
201 # This field can be used to configure arbitrary driver interface parameters. The
202 # format is specific to the selected driver interface. This field is not used
251 # Used format: <categ>-<OUI>-<subcateg>
298 # These parameters can be used to configure a fixed NFC password token for the
300 # parameters are used, the station is assumed to be deployed with a NFC tag
336 # This can be used to limit memory use on the BSS entries (cached scan
372 # Test backend which stores passwords in memory. Should only be used for
387 # This timeout value is used in P2P GO mode to clean up
405 # This parameter can be used to set the default behavior for the
413 # This parameter can be used to set the default behavior for the ieee80211w
426 # When enabled SAE will not be selected if PMF will not be used
435 # In the example WPA-PSK will be used if the device does not support
457 # Note that groups 1, 2, 5, 22, 23, and 24 should not be used in production
469 # When using SAE password identifier, the hash-to-element mechanism is used
480 # This parameter can be used to add additional vendor specific element(s) into
483 # one or more elements). This is used in AP and P2P GO modes.
490 # be used to configure such old information to be ignored instead of
508 # By default, permanent MAC address is used unless policy is changed by
509 # the per-network mac_addr parameter. Global mac_addr=1 can be used to
514 # This is used with mac_addr=3.
533 # Public Action frame exchanges before using GAS. That same address is then used
576 # If this is set, scans will be used to request response only from BSSes
577 # belonging to the specified Homogeneous ESS. This is used only if interworking
613 # Each credential used for automatic network selection is configured as a set
615 # interworking_select and interworking_connect commands are used.
623 # (0). This field can be used to give higher priority for credentials
640 # This field is used with Interworking networking selection for a case
641 # where client certificate/private key is used for authentication
642 # (EAP-TLS). Full path to the file should be used since working
649 # Alternatively, a named configuration blob can be used by setting
653 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
656 # used since working directory may change when wpa_supplicant is run
662 # Windows certificate store can be used by leaving client_cert out and
672 # certificate store (My user account) is used, whereas computer store
673 # (Computer account) is used when running wpasvc as a service.
675 # Alternatively, a named configuration blob can be used by setting
686 # This is used to compare against the Domain Name List to figure out
688 # be used to configure alternative FQDNs that will be considered home
712 # Roaming Consortium OI that can be used to determine which access
735 # This optional field can be used to specify which EAP method will be
736 # used with this credential. If not set, the EAP method is selected
740 # This optional field is used with like the 'eap' parameter.
743 # This optional field is used with like the 'eap' parameter.
746 # This optional field can be used to excluded specific SSID(s) from
747 # matching with the network. Multiple entries can be used to specify more
751 # This optional field can be used to configure preferences between roaming
761 # This optional field can be used to keep track of the SP that provisioned
765 # These fields can be used to specify minimum download/upload backhaul
776 # This value is used as the maximum channel utilization for network
783 # This value is used to configure set of required protocol/port pairs that
787 # network connection. This policy is not used in home networks.
789 # Multiple entries can be used to list multiple requirements.
885 # (the first match is used).
890 # 0 = this network can be used (default)
905 # 1 = scan with SSID-specific Probe Request frames (this can be used to
909 # bssid: BSSID (optional); if set, this network block is used only when
924 # networks are more desirable, this field can be used to change the order in
932 # networks in the order that used in the configuration file.
938 # Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP) and
946 # 2412 = IEEE 802.11b/g channel 1. This value is used to configure the initial
948 # In addition, this value is only used by the station that creates the IBSS. If
950 # the network will be used instead of this configured value.
956 # Used together with mode configuration. When mode is AP, it means to start a
965 # BSS. If the subset of channels used by the network is known, this option can
966 # be used to optimize scanning to not occur on channels that the network does
990 # learn - Learn channels used by the network and try to avoid bgscans on other
1004 # RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
1005 # Note that RSN is used also for WPA3.
1013 # NONE = WPA is not used; plaintext or static WEP could be used
1045 # (and similarly for WPA-PSK and WPA-PSK-SHA256 if WPA2-Personal is used)
1059 # LEAP = LEAP/Network EAP (only used with LEAP)
1060 # If not set, automatic selection is used (Open System with LEAP enabled if
1086 # The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
1090 # be used to indicate that the PSK/passphrase is stored in external storage.
1091 # This field is not needed, if WPA-EAP is used.
1092 # Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys
1103 # This parameter can be used to set a password for SAE. By default, the
1104 # passphrase from the psk parameter is used if this separate parameter is not
1105 # used, but psk follows the WPA-PSK constraints (8..63 characters) even though
1109 # This parameter can be used to set an identifier for the SAE password. By
1110 # default, no such identifier is used. If set, the specified identifier value
1111 # is used by the other peer to select which password to use for authentication.
1176 # mixed_cell: This option can be used to configure whether so called mixed
1199 # wpa_ptk_rekey: Maximum lifetime for PTK in seconds. This can be used to
1214 # group_rekey: Group rekeying time in seconds. This value, if non-zero, is used
1218 # Following fields are only used with internal EAP implementation.
1221 # cannot be used with WPA; to be used as a Phase 2 method
1223 # MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
1225 # OTP = EAP-OTP (cannot be used separately with WPA; to be used
1227 # GTC = EAP-GTC (cannot be used separately with WPA; to be used
1236 # This field is also used to configure user NAI for
1238 # anonymous_identity: Anonymous identity string for EAP (to be used as the
1240 # identity, e.g., EAP-TTLS). This field can also be used with
1245 # NtPasswordHash can only be used when the password is for MSCHAPv2 or
1250 # be used to indicate that the password is stored in external storage.
1255 # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may
1258 # Alternatively, this can be used to only perform matching of the server
1271 # certificate store (My user account) is used, whereas computer store
1272 # (Computer account) is used when running wpasvc as a service.
1280 # Full path should be used since working directory may change when
1282 # Alternatively, a named configuration blob can be used by setting this
1285 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
1287 # the PKCS#12 file in this case. Full path should be used since working
1289 # Windows certificate store can be used by leaving client_cert out and
1295 # certificate store (My user account) is used, whereas computer store
1296 # (Computer account) is used when running wpasvc as a service.
1297 # Alternatively, a named configuration blob can be used by setting this
1306 # Note: Since this is a substring match, this cannot be used securely to
1308 # such a use case, domain_suffix_match or domain_match should be used
1319 # used as a suffix match requirement for the AAA server certificate in
1339 # If set, this FQDN is used as a full match requirement for the
1346 # comparison is used, so "Example.com" matches "example.com", but would
1357 # 'peapver' can be used to force which PEAP version (0 or 1) is used.
1358 # 'peaplabel=1' can be used to force new label, "client PEAP encryption",
1359 # to be used during key derivation when PEAPv1 or newer. Most existing
1364 # 'peap_outer_success=0' can be used to terminate PEAP authentication on
1368 # include_tls_length=1 can be used to force wpa_supplicant to include
1371 # sim_min_num_chal=3 can be used to configure EAP-SIM to require three
1373 # result_ind=1 can be used to enable EAP-SIM and EAP-AKA to use
1375 # 'crypto_binding' option can be used to control PEAPv0 cryptobinding
1380 # 'phase2_auth' option can be used to control Phase 2 (i.e., within TLS
1384 # (private_key/client_cert) is no used and TLS session resumption was
1385 # not used (default)
1391 # used to configure a mode that allows EAP-Success (and EAP-Failure)
1396 # by rogue devices, but this option can be used to disable that protection
1402 # used to disable MSCHAPv2 password retry in authentication failure cases.
1405 # (these are normally in the phase1 parameter, but can be used also in the
1406 # phase2 parameter when EAP-TLS is used within the inner tunnel):
1413 # used only for testing purposes)
1415 # tls_disable_session_ticket=0 - allow TLS Session Ticket extension to be used
1420 # default value to be used automatically).
1442 # tls_suiteb=1 - apply Suite B 192-bit constraints on TLS; this is used in
1450 # Following certificate/private key fields are used in inner Phase2
1479 # interface used for EAPOL. The default value is suitable for most
1490 # This can be used to override the global openssl_ciphers configuration
1498 # provisioned or refreshed. Full path to the file should be used since
1500 # background. Alternatively, a named configuration blob can be used by
1502 # phase1: fast_provisioning option can be used to enable in-line provisioning
1508 # fast_max_pac_list_len=<num> option can be used to set the maximum
1510 # fast_pac_format=binary option can be used to select binary format for
1525 # The matching Roaming Consortium OI that was used to generate this
1533 # disassociated and then deauthenticated. This feature is used to
1538 # this inactivity poll is just used as a nicer way of verifying
1562 # 0: allow PFS to be used or not used (default)
1563 # 1: require PFS to be used (note: not compatible with DPP R1)
1564 # 2: do not allow PFS to be used
1594 # Initial OWE implementation used SHA256 when deriving the PTK for all
1596 # SHA512 for group 21. This parameter can be used to enable older
1608 # indication is used, the stations are expected to automatically
1614 # and only allow SAE to be used)
1738 # Default LLT value for this interface in milliseconds. The value used in case
1753 # This value is used to configure the channel bonding feature.
1783 # Only WPA-PSK is used. Any valid cipher combination is accepted.
1805 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
1862 # WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner