mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
ab7eafa3b8
Add WPS IOT fixes under config option Current fixes under this flag. 1. Allow NULL-padded WPS attributes. 2. Bypass WPS-Config method validation
35 lines
1.4 KiB
Plaintext
35 lines
1.4 KiB
Plaintext
menu "Supplicant"
|
|
|
|
config WPA_MBEDTLS_CRYPTO
|
|
bool "Use MbedTLS crypto API's"
|
|
default y
|
|
help
|
|
Select this option to use MbedTLS crypto API's which utilize hardware acceleration.
|
|
|
|
config WPA_TLS_V12
|
|
bool "Enable TLS v1.2"
|
|
default n
|
|
help
|
|
Select this to enable TLS v1.2 for WPA2-Enterprise Authentication.
|
|
|
|
config WPA_WPS_WARS
|
|
bool "Add WPS Inter operatability Fixes"
|
|
default n
|
|
help
|
|
Select this option to enable WPS related IOT fixes with
|
|
different APs. This option fixes IOT related issues with
|
|
APs which do not follow some of the standards of WPS-2.0
|
|
specification. These do not include any of the security
|
|
related bypassing, just simple configuration corrections.
|
|
|
|
Current fixes under this flag.
|
|
1. Allow NULL-padded WPS attributes: Some APs keep NULL-padding
|
|
at the end of some variable length WPS Attributes.
|
|
This is not as par the WPS2.0 specs, but to avoid interop issues,
|
|
ignore the padding by reducing the attribute length by 1.
|
|
2. Bypass WPS-Config method validation: Some APs set display/pbc
|
|
button bit without setting virtual/physical display/button bit which
|
|
will cause M2 validation fail, bypassing WPS-Config method validation.
|
|
|
|
endmenu
|