mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
0263a182fc
Add support for mbedtls based tls handshake, this removes dependency from internal implementation of EAP client.
29 lines
1.2 KiB
Plaintext
29 lines
1.2 KiB
Plaintext
menu "Supplicant"
|
|
|
|
config WPA_MBEDTLS_CRYPTO
|
|
bool "Use MbedTLS crypto API's"
|
|
default y
|
|
help
|
|
Select this option to use MbedTLS crypto API's which utilize hardware acceleration.
|
|
|
|
config WPA_WPS_WARS
|
|
bool "Add WPS Inter operatability Fixes"
|
|
default n
|
|
help
|
|
Select this option to enable WPS related IOT fixes with
|
|
different APs. This option fixes IOT related issues with
|
|
APs which do not follow some of the standards of WPS-2.0
|
|
specification. These do not include any of the security
|
|
related bypassing, just simple configuration corrections.
|
|
|
|
Current fixes under this flag.
|
|
1. Allow NULL-padded WPS attributes: Some APs keep NULL-padding
|
|
at the end of some variable length WPS Attributes.
|
|
This is not as par the WPS2.0 specs, but to avoid interop issues,
|
|
ignore the padding by reducing the attribute length by 1.
|
|
2. Bypass WPS-Config method validation: Some APs set display/pbc
|
|
button bit without setting virtual/physical display/button bit which
|
|
will cause M2 validation fail, bypassing WPS-Config method validation.
|
|
|
|
endmenu
|