wpa_supplicant is a userspace application which works as a WPA supplicant and SME (to handle initiating MLME commands). This page is dedicated only to the documentation relating to the Linux aspects of wpa_supplicant. For further documentation please refer to:
Please refer to the wpa_supplicant home page for release information
You can clone this tree:
If you have to use http you can also use:
For your convenience we have here a few shortcuts:
If you want to make sure your bug report of feature request does not get lost, please report it through the bug tracking system as a new bug/feature request.
You can add a line to your wpa_supplicant configuration file which specifies the ISO / IEC 3166 country code. This is available as of wpa_supplicant version 0.6.7.
New wpa_supplicant (as of commit cd27df100b from git) command line options
-o<driver> and -O<ctrl>
can now be used to override the parameters received in add interface command from dbus or global ctrl_interface. This can be used to enable a control interface when using NetworkManager or Connman or change the wpa_supplicant driver used.
The wpa_supplicant control interface is used by wpa_cli and wpa_gui to control wpa_supplicant. GUI applications use the DBUS service file to run wpa_supplicant with specific parameters. You can edit this file to take advantage of these new changes.
The wpa_supplicant service file is typically available on systems in the following location:
This service file typically looks like this:
[D-BUS Service] Name=fi.epitest.hostap.WPASupplicant Exec=/sbin/wpa_supplicant -u -f /var/log/wpa_supplicant.log User=root
Change it as follows to enable usage of wpa_cli or wpa_gui and also to use nl80211 when available:
[D-BUS Service] Name=fi.epitest.hostap.WPASupplicant Exec=/sbin/wpa_supplicant -u -onl80211 -O/var/run/wpa_supplicant User=root
If you are compiling the supplicant you will want CONFIG_CTRL_IFACE_DBUS=y to enable -u, CONFIG_DRIVER_NL80211=y for -onl80211 and CONFIG_CTRL_IFACE=y for the control interface. To enable usage of wpa_cli you will also want CONFIG_READLINE=y. Also enable CONFIG_DEBUG_FILE=y for the debug file.
The Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config, or WSC) 2.0 specification added explicit requirement that disallows use of WEP. wpa_supplicant complies with that requirement and rejects WEP networks if WPS 2.0 is enabled. It should also be noted that there has been a number of interoperability issues with WEP and WPS 1.0 since this combination has never been tested in WFA certification programs.
Hidden SSIDs are explicitly disallowed with WPS (any version of WPS), the protocol just does not work with hidden SSIDs.
Read hostapd's RSN pre authentication documentation for a review on what is expected on the AP configuration side of things. If APs are configured properly with RSN preauthentication wpa_supplicant will by default enable this so long as WPA2 networks are used.
Based on some events wpa_supplicant update our RSN PMKSA candidate list for preauthentication. The RSN PMKSA candidate list for wpa_supplicant is determined by rsn_preauth_scan_result(). rsn_preauth_scan_result() gets called today after a scan completion. For each BSS found it rsn_preauth_scan_result() will ensure: