identity - EAP Identity This field is used to set the real user identity or NAI (for EAP-PSK/PAX/SAKE/GPSK).
identity_len - EAP Identity length.
anonymous_identity - Anonymous EAP Identity This field is used for unencrypted use with EAP types that support different tunnelled identity, e.g., EAP-TTLS, in order to reveal the real identity (identity field) only to the authentication server. If not set, the identity field will be used for both unencrypted and protected fields. This field can also be used with EAP-SIM/AKA/AKA' to store the pseudonym identity.
anonymous_identity_len - Length of anonymous_identity.
password - Password string for EAP This field can include either the plaintext password (default option) or a NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password) if flags field has EAP_CONFIG_FLAGS_PASSWORD_NTHASH bit set to 1. NtPasswordHash can only be used with authentication mechanism that use this hash as the starting point for operation: MSCHAP and MSCHAPv2 (EAP-MSCHAPv2, EAP-TTLS/MSCHAPv2, EAP-TTLS/MSCHAP, LEAP). In addition, this field is used to configure a pre-shared key for EAP-PSK/PAX/SAKE/GPSK. The length of the PSK must be 16 for EAP-PSK and EAP-PAX and 32 for EAP-SAKE. EAP-GPSK can use a variable length PSK.
password_len - Length of password field.
ca_cert - File path to CA certificate file (PEM/DER) This file can have one or more trusted CA certificates. If ca_cert and ca_path are not included, server certificate will not be verified. This is insecure and a trusted CA certificate should always be configured when using EAP-TLS/TTLS/PEAP. Full path to the file should be used since working directory may change when wpa_supplicant is run in the background. Alternatively, a named configuration blob can be used by setting this to blob://blob_name. Alternatively, this can be used to only perform matching of the server certificate (SHA-256 hash of the DER encoded X.509 certificate). In this case, the possible CA certificates in the server certificate chain are ignored and only the server certificate is verified. This is configured with the following format: hash:://server/sha256/cert_hash_in_hex For example: "hash://server/sha256/ 5a1bc1296205e6fdbe3979728efe3920798885c1c4590b5f90f43222d239ca6a" On Windows, trusted CA certificates can be loaded from the system certificate store by setting this to cert_store://name, e.g., ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT". Note that when running wpa_supplicant as an application, the user certificate store (My user account) is used, whereas computer store (Computer account) is used when running wpasvc as a service.
ca_path - Directory path for CA certificate files (PEM) This path may contain multiple CA certificates in OpenSSL format. Common use for this is to point to system trusted CA list which is often installed into directory like /etc/ssl/certs. If configured, these certificates are added to the list of trusted CAs. ca_cert may also be included in that case, but it is not required.
client_cert - File path to client certificate file (PEM/DER) This field is used with EAP method that use TLS authentication. Usually, this is only configured for EAP-TLS, even though this could in theory be used with EAP-TTLS and EAP-PEAP, too. Full path to the file should be used since working directory may change when wpa_supplicant is run in the background. Alternatively, a named configuration blob can be used by setting this to blob://blob_name.
private_key - File path to client private key file (PEM/DER/PFX) When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be commented out. Both the private key and certificate will be read from the PKCS#12 file in this case. Full path to the file should be used since working directory may change when wpa_supplicant is run in the background. Windows certificate store can be used by leaving client_cert out and configuring private_key in one of the following formats: cert://substring_to_match hash://certificate_thumbprint_in_hex For example: private_key="hash://63093aa9c47f56ae88334c7b65a4" Note that when running wpa_supplicant as an application, the user certificate store (My user account) is used, whereas computer store (Computer account) is used when running wpasvc as a service. Alternatively, a named configuration blob can be used by setting this to blob://blob_name.
private_key_passwd - Password for private key file If left out, this will be asked through control interface.
ca_path2 - Directory path for CA certificate files (PEM) (Phase 2) This path may contain multiple CA certificates in OpenSSL format. Common use for this is to point to system trusted CA list which is often installed into directory like /etc/ssl/certs. If configured, these certificates are added to the list of trusted CAs. ca_cert may also be included in that case, but it is not required. This field is like ca_path, but used for phase 2 (inside EAP-TTLS/PEAP/FAST tunnel) authentication.
client_cert2 - File path to client certificate file This field is like client_cert, but used for phase 2 (inside EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the file should be used since working directory may change when wpa_supplicant is run in the background. Alternatively, a named configuration blob can be used by setting this to blob://blob_name.
private_key2 - File path to client private key file This field is like private_key, but used for phase 2 (inside EAP-TTLS/PEAP/FAST tunnel) authentication. Full path to the file should be used since working directory may change when wpa_supplicant is run in the background. Alternatively, a named configuration blob can be used by setting this to blob://blob_name.
eap_methods - Allowed EAP methods (vendor=EAP_VENDOR_IETF,method=EAP_TYPE_NONE) terminated list of allowed EAP methods or %NULL if all methods are accepted.
phase2 - Phase2 (inner authentication with TLS tunnel) parameters String with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS. "mschapv2_retry=0" can be used to disable MSCHAPv2 password retry in authentication failure cases.
pcsc - Parameters for PC/SC smartcard interface for USIM and GSM SIM This field is used to configure PC/SC smartcard interface. Currently, the only configuration is whether this field is %NULL (do not use PC/SC) or non-NULL (e.g., "") to enable PC/SC. This field is used for EAP-SIM and EAP-AKA.
pin - PIN for USIM, GSM SIM, and smartcards This field is used to configure PIN for SIM and smartcards for EAP-SIM and EAP-AKA. In addition, this is used with EAP-TLS if a smartcard is used for private key operations. If left out, this will be asked through control interface.
pending_req_identity - Whether there is a pending identity request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_password - Whether there is a pending password request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_pin - Whether there is a pending PIN request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_new_password - Pending password update request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_passphrase - Pending passphrase request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_sim - Pending SIM request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_otp - Whether there is a pending OTP request This field should not be set in configuration step. It is only used internally when control interface is used to request needed information.
pending_req_otp_len - Length of the pending OTP request.
pac_file - File path or blob name for the PAC entries (EAP-FAST) wpa_supplicant will need to be able to create this file and write updates to it when PAC is being provisioned or refreshed. Full path to the file should be used since working directory may change when wpa_supplicant is run in the background. Alternatively, a named configuration blob can be used by setting this to blob://blob_name.
mschapv2_retry - MSCHAPv2 retry in progress This field is used internally by EAP-MSCHAPv2 and should not be set as part of configuration.
new_password - New password for password update This field is used during MSCHAPv2 password update. This is normally requested from the user through the control interface and not set from configuration.
new_password_len - Length of new_password field.
fragment_size - Maximum EAP fragment size in bytes (default 1398) This value limits the fragment size for EAP methods that support fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set small enough to make the EAP messages fit in MTU of the network interface used for EAPOL. The default value is suitable for most cases.
flags - Network configuration flags (bitfield) This variable is used for internal flags to describe further details for the network parameters. bit 0 = password is represented as a 16-byte NtPasswordHash value instead of plaintext password bit 1 = password is stored in external storage; the value in the password field is the name of that external entry.
ocsp - Whether to use/require OCSP to check server certificate 0 = do not use OCSP stapling (TLS certificate status extension) 1 = try to use OCSP stapling, but not require response 2 = require valid OCSP stapling response.
erp - Whether EAP Re-authentication Protocol (ERP) is enabled.
pending_ext_cert_check - External server certificate check status This field should not be set in configuration step. It is only used internally when control interface is used to request external validation of server certificate chain.