2018-08-13 04:37:56 -04:00
|
|
|
menu "Supplicant"
|
|
|
|
|
2019-07-03 08:09:52 -04:00
|
|
|
config WPA_MBEDTLS_CRYPTO
|
|
|
|
bool "Use MbedTLS crypto API's"
|
|
|
|
default y
|
|
|
|
help
|
|
|
|
Select this option to use MbedTLS crypto API's which utilize hardware acceleration.
|
|
|
|
|
2020-04-28 01:16:59 -04:00
|
|
|
config WPA_TLS_V12
|
|
|
|
bool "Enable TLS v1.2"
|
|
|
|
default n
|
|
|
|
help
|
|
|
|
Select this to enable TLS v1.2 for WPA2-Enterprise Authentication.
|
|
|
|
|
2020-05-11 01:48:12 -04:00
|
|
|
config WPA_WPS_WARS
|
|
|
|
bool "Add WPS Inter operatability Fixes"
|
|
|
|
default n
|
|
|
|
help
|
|
|
|
Select this option to enable WPS related IOT fixes with
|
|
|
|
different APs. This option fixes IOT related issues with
|
|
|
|
APs which do not follow some of the standards of WPS-2.0
|
|
|
|
specification. These do not include any of the security
|
|
|
|
related bypassing, just simple configuration corrections.
|
|
|
|
|
|
|
|
Current fixes under this flag.
|
|
|
|
1. Allow NULL-padded WPS attributes: Some APs keep NULL-padding
|
|
|
|
at the end of some variable length WPS Attributes.
|
|
|
|
This is not as par the WPS2.0 specs, but to avoid interop issues,
|
|
|
|
ignore the padding by reducing the attribute length by 1.
|
|
|
|
2. Bypass WPS-Config method validation: Some APs set display/pbc
|
|
|
|
button bit without setting virtual/physical display/button bit which
|
|
|
|
will cause M2 validation fail, bypassing WPS-Config method validation.
|
|
|
|
|
2018-08-13 04:37:56 -04:00
|
|
|
endmenu
|