Searched full:security (Results 1 – 25 of 75) sorted by relevance
123
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 19 <para>The original security mechanism of IEEE 802.11 standard was 21 most networks that require some kind of security. Task group I 22 (Security) of IEEE 802.11 working group 30 security enhancements that can be implemented with existing wlan 48 <para>WPA is an intermediate solution for the security issues. It 50 is a compromise on strong security and possibility to use existing
|
D | wpa_supplicant.conf.sgml | 19 file that lists all accepted networks and security policies, 38 the configuration file, network security level (WPA/WPA2 is 150 on what security policy is used in the selected SSID. This is
|
D | wpa_supplicant.sgml | 42 Link-layer encryption can be used to provide a layer of security for 47 can be used to improve the network security, but even that has inherited 48 security issues due to the use of WEP for encryption. Wi-Fi Protected
|
/hostap-latest/hostapd/ |
D | README | 150 with open systems authentication, so there is no security. After 175 used in normal use since it does not provide any security. This can be 209 will improve security of the network since same WEP key will only be 229 The original security mechanism of IEEE 802.11 standard was not 231 networks that require some kind of security. Task group I (Security) 239 IEEE 802.11i work (draft 3.0) to define a subset of the security 255 WPA is an intermediate solution for the security issues. It uses 257 compromise on strong security and possibility to use existing
|
D | ChangeLog | 43 [https://w1.fi/security/2022-1/] 52 [https://w1.fi/security/2022-1/] 54 [https://w1.fi/security/2020-1/] 56 [https://w1.fi/security/2019-7/] 78 automatically disable transition mode to improve security 87 [https://w1.fi/security/2019-6/] 91 [https://w1.fi/security/2019-6/] 122 [https://w1.fi/security/2019-1/] (CVE-2019-9494) 124 [https://w1.fi/security/2019-3/] (CVE-2019-9496) 127 [https://w1.fi/security/2019-2/] (CVE-2019-9495) [all …]
|
D | README-WPS | 219 AP PIN only based on user action (and even better security by using a 247 hostapd_cli wps_config "no security" OPEN NONE ""
|
D | sae_pk_gen.c | 176 printf("# Longer passwords can be used for improved security at the cost of usability:\n"); in main()
|
/hostap-latest/tests/remote/ |
D | rutils.py | 151 def get_ap_params(channel="1", bw="HT20", country="US", security="open", ht_capab=None, vht_capab=N… argument 152 ssid = "test_" + channel + "_" + security + "_" + bw 196 # now setup security params 197 if security == "tkip": 199 elif security == "ccmp": 201 elif security == "mixed": 203 elif security == "wep": 207 elif security == "wep_shared":
|
D | test_example.py | 48 security="open")
|
/hostap-latest/tests/hwsim/ |
D | test_he_mbssid.py | 179 """HE AP MBSSID with mixed security (STA SAE)""" 214 """HE AP MBSSID with mixed security (STA open)""" 245 """HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal)""" 275 """HE AP MBSSID with mixed security (WPA2-Personal + WPA3-Personal+beacon prot)""" 323 """HE AP MBSSID with mixed security and single SSID""" 354 """HE AP MBSSID with mixed security and single SSID and transition mode"""
|
D | test_ibss.py | 303 """IBSS open (no security)""" 340 """IBSS open (no security) and fixed BSSID""" 363 """IBSS open (no security) with cfg80211 retry workaround"""
|
D | test_ap_open.py | 24 """AP with open mode (no security) configuration""" 237 """AP with open mode (no security) configuration""" 739 """AP with open mode (no security) configuration and pmf=2""" 993 """AP with open mode (no security) and Layer 2 Update frame"""
|
/hostap-latest/wpa_supplicant/ |
D | README | 191 The original security mechanism of IEEE 802.11 standard was not 193 networks that require some kind of security. Task group I (Security) 200 IEEE 802.11i work (draft 3.0) to define a subset of the security 217 WPA is an intermediate solution for the security issues. It uses 219 compromise on strong security and possibility to use existing 509 networks and security policies, including pre-shared keys. See 520 file, network security level (WPA/WPA2 is preferred), and signal 612 configuration options are used based on what security policy is used in the 688 wpa_cli can show the current authentication status, selected security
|
D | ChangeLog | 40 to improve security for still unfortunately common invalid 56 [https://w1.fi/security/2022-1/] 64 [https://w1.fi/security/2022-1/] 67 [https://w1.fi/security/2021-1/] 70 [https://w1.fi/security/2020-2/] 72 [https://w1.fi/security/2019-7/] 94 automatically disable transition mode to improve security 110 [https://w1.fi/security/2019-6/] 115 [https://w1.fi/security/2019-6/] 152 [https://w1.fi/security/2019-1/] (CVE-2019-9494) [all …]
|
D | mesh_mpm.c | 221 int ampe = conf->security & MESH_CONF_SEC_AMPE; in mesh_mpm_send_plink_action() 650 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_connect_peer() 822 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_add_peer() 886 if (conf->security == MESH_CONF_SEC_NONE) { in wpa_mesh_new_mesh_peer() 918 if (conf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_plink_estab() 1055 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm() 1083 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm() 1255 (!(mconf->security & MESH_CONF_SEC_AMPE) || in mesh_mpm_action_rx() 1275 if (mconf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_action_rx()
|
D | README-Windows.txt | 21 All security modes have been verified to work (at least complete 240 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/ace_strings.asp 242 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/sid_strings.asp
|
D | wpa_supplicant.conf | 66 # For Windows Named Pipe: This value can be used to set the security descriptor 67 # for controlling access to the control interface. Security descriptor can be 68 # set using Security Descriptor String Format (see http://msdn.microsoft.com/ 69 # library/default.asp?url=/library/en-us/secauthz/security/ 99 # 2: like 0, but associate with APs using security policy and SSID (but not 104 # explicit security policy (i.e., only one option in the lists) for 215 # Timeout for security association negotiation in seconds; default 60 458 # purposes due limited security (see RFC 8247). Groups that are not as strong as 939 # Within each priority group, networks will be selected based on security 1034 # authentication with stronger security than WPA-PSK especially when using [all …]
|
D | config.h | 511 * 2: like 0, but associate with APs using security policy and SSID 516 * network block should have explicit security policy (i.e., only one 591 * For Windows Named Pipe: This value can be used to set the security 592 * descriptor for controlling access to the control interface. Security 593 * descriptor can be set using Security Descriptor String Format (see 594 …* http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/security_desc… 709 * dot11RSNAConfigSATimeout - Security association timeout 711 * dot11 MIB variable for the maximum time a security association
|
D | mesh.c | 96 conf->security |= MESH_CONF_SEC_AUTH | in mesh_config_create() 99 conf->security |= MESH_CONF_SEC_NONE; in mesh_config_create() 142 conf->mesh_auth_id = (conf->security & MESH_CONF_SEC_AUTH) ? 1 : 0; in mesh_config_create() 268 if (ifmsh->mconf->security != MESH_CONF_SEC_NONE && in wpas_mesh_complete()
|
/hostap-latest/zephyr/ |
D | module.yml | 4 security:
|
/hostap-latest/wpadebug/ |
D | README | 15 result in complete loss of security protections on the device.
|
/hostap-latest/src/common/ |
D | nan.h | 44 NAN_ATTR_SCIA = 0x23, /* Security Context Info attribute */
|
/hostap-latest/src/crypto/ |
D | random.c | 16 * calls to random_get_bytes() without reducing security. 22 * guaranteed to be secure for any of the security assumptions to hold.
|
/hostap-latest/src/rsn_supp/ |
D | pmksa_cache.h | 42 * network configuration (e.g., a specific SSID and security policy).
|
/hostap-latest/src/eap_peer/ |
D | eap_vendor_test.c | 10 * security is provided.
|
123