Searched refs:security (Results 1 – 21 of 21) sorted by relevance
| /hostap-latest/wpa_supplicant/doc/docbook/ |
| D | wpa_background.sgml | 19 <para>The original security mechanism of IEEE 802.11 standard was 21 most networks that require some kind of security. Task group I 30 security enhancements that can be implemented with existing wlan 48 <para>WPA is an intermediate solution for the security issues. It 50 is a compromise on strong security and possibility to use existing
|
| D | wpa_supplicant.conf.sgml | 19 file that lists all accepted networks and security policies, 38 the configuration file, network security level (WPA/WPA2 is 150 on what security policy is used in the selected SSID. This is
|
| D | wpa_supplicant.sgml | 42 Link-layer encryption can be used to provide a layer of security for 47 can be used to improve the network security, but even that has inherited 48 security issues due to the use of WEP for encryption. Wi-Fi Protected
|
| D | wpa_cli.sgml | 41 security mode, dot11 and dot1x MIBs, etc. In addition, it can
|
| /hostap-latest/tests/remote/ |
| D | rutils.py | 151 def get_ap_params(channel="1", bw="HT20", country="US", security="open", ht_capab=None, vht_capab=N… argument 152 ssid = "test_" + channel + "_" + security + "_" + bw 197 if security == "tkip": 199 elif security == "ccmp": 201 elif security == "mixed": 203 elif security == "wep": 207 elif security == "wep_shared":
|
| D | test_example.py | 48 security="open")
|
| /hostap-latest/wpa_supplicant/ |
| D | mesh_mpm.c | 221 int ampe = conf->security & MESH_CONF_SEC_AMPE; in mesh_mpm_send_plink_action() 650 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_connect_peer() 822 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_add_peer() 886 if (conf->security == MESH_CONF_SEC_NONE) { in wpa_mesh_new_mesh_peer() 918 if (conf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_plink_estab() 1055 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm() 1083 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm() 1255 (!(mconf->security & MESH_CONF_SEC_AMPE) || in mesh_mpm_action_rx() 1275 if (mconf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_action_rx()
|
| D | mesh.c | 96 conf->security |= MESH_CONF_SEC_AUTH | in mesh_config_create() 99 conf->security |= MESH_CONF_SEC_NONE; in mesh_config_create() 142 conf->mesh_auth_id = (conf->security & MESH_CONF_SEC_AUTH) ? 1 : 0; in mesh_config_create() 268 if (ifmsh->mconf->security != MESH_CONF_SEC_NONE && in wpas_mesh_complete()
|
| D | ChangeLog | 40 to improve security for still unfortunately common invalid 56 [https://w1.fi/security/2022-1/] 64 [https://w1.fi/security/2022-1/] 67 [https://w1.fi/security/2021-1/] 70 [https://w1.fi/security/2020-2/] 72 [https://w1.fi/security/2019-7/] 94 automatically disable transition mode to improve security 110 [https://w1.fi/security/2019-6/] 115 [https://w1.fi/security/2019-6/] 152 [https://w1.fi/security/2019-1/] (CVE-2019-9494) [all …]
|
| D | README-Windows.txt | 21 All security modes have been verified to work (at least complete 240 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/ace_strings.asp 242 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/sid_strings.asp
|
| D | README | 191 The original security mechanism of IEEE 802.11 standard was not 193 networks that require some kind of security. Task group I (Security) 200 IEEE 802.11i work (draft 3.0) to define a subset of the security 217 WPA is an intermediate solution for the security issues. It uses 219 compromise on strong security and possibility to use existing 509 networks and security policies, including pre-shared keys. See 520 file, network security level (WPA/WPA2 is preferred), and signal 612 configuration options are used based on what security policy is used in the 688 wpa_cli can show the current authentication status, selected security
|
| D | README-HS20 | 537 pairwise_cipher=CCMP <--- link layer security indication 566 command output. Link layer security is indicated with the
|
| /hostap-latest/hostapd/ |
| D | README | 150 with open systems authentication, so there is no security. After 175 used in normal use since it does not provide any security. This can be 209 will improve security of the network since same WEP key will only be 229 The original security mechanism of IEEE 802.11 standard was not 231 networks that require some kind of security. Task group I (Security) 239 IEEE 802.11i work (draft 3.0) to define a subset of the security 255 WPA is an intermediate solution for the security issues. It uses 257 compromise on strong security and possibility to use existing
|
| D | ChangeLog | 43 [https://w1.fi/security/2022-1/] 52 [https://w1.fi/security/2022-1/] 54 [https://w1.fi/security/2020-1/] 56 [https://w1.fi/security/2019-7/] 78 automatically disable transition mode to improve security 87 [https://w1.fi/security/2019-6/] 91 [https://w1.fi/security/2019-6/] 122 [https://w1.fi/security/2019-1/] (CVE-2019-9494) 124 [https://w1.fi/security/2019-3/] (CVE-2019-9496) 127 [https://w1.fi/security/2019-2/] (CVE-2019-9495) [all …]
|
| D | README-WPS | 219 AP PIN only based on user action (and even better security by using a 247 hostapd_cli wps_config "no security" OPEN NONE ""
|
| /hostap-latest/wpadebug/ |
| D | README | 15 result in complete loss of security protections on the device.
|
| /hostap-latest/tests/hwsim/ |
| D | example-setup.txt | 126 Test: AP with open mode (no security) configuration
|
| /hostap-latest/hs20/server/ |
| D | hs20-osu-server.txt | 13 considerable amount of modification and review for security issues.
|
| /hostap-latest/doc/ |
| D | driver_wrapper.doxygen | 57 example implementations include full support for all security modes.
|
| /hostap-latest/src/ap/ |
| D | ap_config.h | 50 unsigned int security; member
|
| /hostap-latest/tests/ |
| D | cipher-and-key-mgmt-testing.txt | 375 of a likely security vulnerability. The AP's TK configuration should be
|