Home
last modified time | relevance | path

Searched full:security (Results 1 – 25 of 75) sorted by relevance

123

/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml19 <para>The original security mechanism of IEEE 802.11 standard was
21 most networks that require some kind of security. Task group I
22 (Security) of IEEE 802.11 working group
30 security enhancements that can be implemented with existing wlan
48 <para>WPA is an intermediate solution for the security issues. It
50 is a compromise on strong security and possibility to use existing
Dwpa_supplicant.conf.sgml19 file that lists all accepted networks and security policies,
38 the configuration file, network security level (WPA/WPA2 is
150 on what security policy is used in the selected SSID. This is
Dwpa_supplicant.sgml42 Link-layer encryption can be used to provide a layer of security for
47 can be used to improve the network security, but even that has inherited
48 security issues due to the use of WEP for encryption. Wi-Fi Protected
/hostap-latest/hostapd/
DREADME150 with open systems authentication, so there is no security. After
175 used in normal use since it does not provide any security. This can be
209 will improve security of the network since same WEP key will only be
229 The original security mechanism of IEEE 802.11 standard was not
231 networks that require some kind of security. Task group I (Security)
239 IEEE 802.11i work (draft 3.0) to define a subset of the security
255 WPA is an intermediate solution for the security issues. It uses
257 compromise on strong security and possibility to use existing
DChangeLog43 [https://w1.fi/security/2022-1/]
52 [https://w1.fi/security/2022-1/]
54 [https://w1.fi/security/2020-1/]
56 [https://w1.fi/security/2019-7/]
78 automatically disable transition mode to improve security
87 [https://w1.fi/security/2019-6/]
91 [https://w1.fi/security/2019-6/]
122 [https://w1.fi/security/2019-1/] (CVE-2019-9494)
124 [https://w1.fi/security/2019-3/] (CVE-2019-9496)
127 [https://w1.fi/security/2019-2/] (CVE-2019-9495)
[all …]
DREADME-WPS219 AP PIN only based on user action (and even better security by using a
247 hostapd_cli wps_config "no security" OPEN NONE ""
Dsae_pk_gen.c176 printf("# Longer passwords can be used for improved security at the cost of usability:\n"); in main()
/hostap-latest/tests/remote/
Drutils.py151 def get_ap_params(channel="1", bw="HT20", country="US", security="open", ht_capab=None, vht_capab=N… argument
152 ssid = "test_" + channel + "_" + security + "_" + bw
196 # now setup security params
197 if security == "tkip":
199 elif security == "ccmp":
201 elif security == "mixed":
203 elif security == "wep":
207 elif security == "wep_shared":
Dtest_example.py48 security="open")
/hostap-latest/tests/hwsim/
Dtest_he_mbssid.py179 """HE AP MBSSID with mixed security (STA SAE)"""
214 """HE AP MBSSID with mixed security (STA open)"""
245 """HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal)"""
275 """HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal+beacon prot)"""
323 """HE AP MBSSID with mixed security and single SSID"""
354 """HE AP MBSSID with mixed security and single SSID and transition mode"""
Dtest_ibss.py303 """IBSS open (no security)"""
340 """IBSS open (no security) and fixed BSSID"""
363 """IBSS open (no security) with cfg80211 retry workaround"""
Dtest_ap_open.py24 """AP with open mode (no security) configuration"""
237 """AP with open mode (no security) configuration"""
739 """AP with open mode (no security) configuration and pmf=2"""
993 """AP with open mode (no security) and Layer 2 Update frame"""
/hostap-latest/wpa_supplicant/
DREADME191 The original security mechanism of IEEE 802.11 standard was not
193 networks that require some kind of security. Task group I (Security)
200 IEEE 802.11i work (draft 3.0) to define a subset of the security
217 WPA is an intermediate solution for the security issues. It uses
219 compromise on strong security and possibility to use existing
509 networks and security policies, including pre-shared keys. See
520 file, network security level (WPA/WPA2 is preferred), and signal
612 configuration options are used based on what security policy is used in the
688 wpa_cli can show the current authentication status, selected security
DChangeLog40 to improve security for still unfortunately common invalid
56 [https://w1.fi/security/2022-1/]
64 [https://w1.fi/security/2022-1/]
67 [https://w1.fi/security/2021-1/]
70 [https://w1.fi/security/2020-2/]
72 [https://w1.fi/security/2019-7/]
94 automatically disable transition mode to improve security
110 [https://w1.fi/security/2019-6/]
115 [https://w1.fi/security/2019-6/]
152 [https://w1.fi/security/2019-1/] (CVE-2019-9494)
[all …]
Dmesh_mpm.c221 int ampe = conf->security & MESH_CONF_SEC_AMPE; in mesh_mpm_send_plink_action()
650 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_connect_peer()
822 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_add_peer()
886 if (conf->security == MESH_CONF_SEC_NONE) { in wpa_mesh_new_mesh_peer()
918 if (conf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_plink_estab()
1055 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm()
1083 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm()
1255 (!(mconf->security & MESH_CONF_SEC_AMPE) || in mesh_mpm_action_rx()
1275 if (mconf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_action_rx()
DREADME-Windows.txt21 All security modes have been verified to work (at least complete
240 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/ace_strings.asp
242 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/sid_strings.asp
Dwpa_supplicant.conf66 # For Windows Named Pipe: This value can be used to set the security descriptor
67 # for controlling access to the control interface. Security descriptor can be
68 # set using Security Descriptor String Format (see http://msdn.microsoft.com/
69 # library/default.asp?url=/library/en-us/secauthz/security/
99 # 2: like 0, but associate with APs using security policy and SSID (but not
104 # explicit security policy (i.e., only one option in the lists) for
215 # Timeout for security association negotiation in seconds; default 60
458 # purposes due limited security (see RFC 8247). Groups that are not as strong as
939 # Within each priority group, networks will be selected based on security
1034 # authentication with stronger security than WPA-PSK especially when using
[all …]
Dconfig.h511 * 2: like 0, but associate with APs using security policy and SSID
516 * network block should have explicit security policy (i.e., only one
591 * For Windows Named Pipe: This value can be used to set the security
592 * descriptor for controlling access to the control interface. Security
593 * descriptor can be set using Security Descriptor String Format (see
594 …* http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/security_desc…
709 * dot11RSNAConfigSATimeout - Security association timeout
711 * dot11 MIB variable for the maximum time a security association
Dmesh.c96 conf->security |= MESH_CONF_SEC_AUTH | in mesh_config_create()
99 conf->security |= MESH_CONF_SEC_NONE; in mesh_config_create()
142 conf->mesh_auth_id = (conf->security & MESH_CONF_SEC_AUTH) ? 1 : 0; in mesh_config_create()
268 if (ifmsh->mconf->security != MESH_CONF_SEC_NONE && in wpas_mesh_complete()
/hostap-latest/zephyr/
Dmodule.yml4 security:
/hostap-latest/wpadebug/
DREADME15 result in complete loss of security protections on the device.
/hostap-latest/src/common/
Dnan.h44 NAN_ATTR_SCIA = 0x23, /* Security Context Info attribute */
/hostap-latest/src/crypto/
Drandom.c16 * calls to random_get_bytes() without reducing security.
22 * guaranteed to be secure for any of the security assumptions to hold.
/hostap-latest/src/rsn_supp/
Dpmksa_cache.h42 * network configuration (e.g., a specific SSID and security policy).
/hostap-latest/src/eap_peer/
Deap_vendor_test.c10 * security is provided.

123