mirror of
https://github.com/openwrt/openwrt.git
synced 2025-01-04 04:54:18 +00:00
472fd98c5b
Upstream in commit 200c7693c9a1 ("Make WEP functionality an optional build parameter") has made WEP functionality an optional build parameter disabled as default, because WEP should not be used for anything anymore. As a step towards removing it completely, they moved all WEP related functionality behind CONFIG_WEP blocks and disabled it by default. This functionality is subject to be completely removed in a future release. So follow this good security advice, deprecation notice and disable WEP by default, but still allow custom builds with WEP support via CONFIG_WPA_ENABLE_WEP config option till upstream removes support for WEP completely. Signed-off-by: Petr Štetiar <ynezz@true.cz>
85 lines
2.3 KiB
Plaintext
85 lines
2.3 KiB
Plaintext
# wpa_supplicant config
|
|
config WPA_RFKILL_SUPPORT
|
|
bool "Add rfkill support"
|
|
depends on PACKAGE_wpa-supplicant || \
|
|
PACKAGE_wpa-supplicant-openssl || \
|
|
PACKAGE_wpa-supplicant-wolfssl || \
|
|
PACKAGE_wpa-supplicant-mesh-openssl || \
|
|
PACKAGE_wpa-supplicant-mesh-wolfssl || \
|
|
PACKAGE_wpa-supplicant-basic || \
|
|
PACKAGE_wpa-supplicant-mini || \
|
|
PACKAGE_wpa-supplicant-p2p || \
|
|
PACKAGE_wpad || \
|
|
PACKAGE_wpad-openssl || \
|
|
PACKAGE_wpad-wolfssl || \
|
|
PACKAGE_wpad-basic || \
|
|
PACKAGE_wpad-mini || \
|
|
PACKAGE_wpad-mesh-openssl || \
|
|
PACKAGE_wpad-mesh-wolfssl
|
|
default n
|
|
|
|
config WPA_MSG_MIN_PRIORITY
|
|
int "Minimum debug message priority"
|
|
depends on PACKAGE_wpa-supplicant || \
|
|
PACKAGE_wpa-supplicant-openssl || \
|
|
PACKAGE_wpa-supplicant-wolfssl || \
|
|
PACKAGE_wpa-supplicant-mesh-openssl || \
|
|
PACKAGE_wpa-supplicant-mesh-wolfssl || \
|
|
PACKAGE_wpa-supplicant-basic || \
|
|
PACKAGE_wpa-supplicant-mini || \
|
|
PACKAGE_wpa-supplicant-p2p || \
|
|
PACKAGE_wpad || \
|
|
PACKAGE_wpad-openssl || \
|
|
PACKAGE_wpad-wolfssl || \
|
|
PACKAGE_wpad-basic || \
|
|
PACKAGE_wpad-mini || \
|
|
PACKAGE_wpad-mesh-openssl || \
|
|
PACKAGE_wpad-mesh-wolfssl
|
|
default 3
|
|
help
|
|
Useful values are:
|
|
0 = all messages
|
|
1 = raw message dumps
|
|
2 = most debugging messages
|
|
3 = info messages
|
|
4 = warnings
|
|
5 = errors
|
|
|
|
config WPA_WOLFSSL
|
|
bool
|
|
default PACKAGE_wpa-supplicant-wolfssl ||\
|
|
PACKAGE_wpad-wolfssl ||\
|
|
PACKAGE_wpad-mesh-wolfssl ||\
|
|
PACKAGE_eapol-test-wolfssl
|
|
select WOLFSSL_HAS_AES_CCM
|
|
select WOLFSSL_HAS_ARC4
|
|
select WOLFSSL_HAS_DH
|
|
select WOLFSSL_HAS_OCSP
|
|
select WOLFSSL_HAS_SESSION_TICKET
|
|
select WOLFSSL_HAS_WPAS
|
|
|
|
config DRIVER_WEXT_SUPPORT
|
|
bool
|
|
default n
|
|
|
|
config DRIVER_11N_SUPPORT
|
|
bool
|
|
default n
|
|
|
|
config DRIVER_11AC_SUPPORT
|
|
bool
|
|
default n
|
|
|
|
config DRIVER_11W_SUPPORT
|
|
bool
|
|
default n
|
|
|
|
config WPA_ENABLE_WEP
|
|
bool "Enable support for unsecure and obsolete WEP"
|
|
help
|
|
Wired equivalent privacy (WEP) is an obsolete cryptographic data
|
|
confidentiality algorithm that is not considered secure. It should not be used
|
|
for anything anymore. The functionality needed to use WEP is available in the
|
|
current hostapd release under this optional build parameter and completely
|
|
removed in a future release.
|