Home
last modified time | relevance | path

Searched refs:security (Results 1 – 21 of 21) sorted by relevance

/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml19 <para>The original security mechanism of IEEE 802.11 standard was
21 most networks that require some kind of security. Task group I
30 security enhancements that can be implemented with existing wlan
48 <para>WPA is an intermediate solution for the security issues. It
50 is a compromise on strong security and possibility to use existing
Dwpa_supplicant.conf.sgml19 file that lists all accepted networks and security policies,
38 the configuration file, network security level (WPA/WPA2 is
150 on what security policy is used in the selected SSID. This is
Dwpa_supplicant.sgml42 Link-layer encryption can be used to provide a layer of security for
47 can be used to improve the network security, but even that has inherited
48 security issues due to the use of WEP for encryption. Wi-Fi Protected
Dwpa_cli.sgml41 security mode, dot11 and dot1x MIBs, etc. In addition, it can
/hostap-latest/tests/remote/
Drutils.py151 def get_ap_params(channel="1", bw="HT20", country="US", security="open", ht_capab=None, vht_capab=N… argument
152 ssid = "test_" + channel + "_" + security + "_" + bw
197 if security == "tkip":
199 elif security == "ccmp":
201 elif security == "mixed":
203 elif security == "wep":
207 elif security == "wep_shared":
Dtest_example.py48 security="open")
/hostap-latest/wpa_supplicant/
Dmesh_mpm.c221 int ampe = conf->security & MESH_CONF_SEC_AMPE; in mesh_mpm_send_plink_action()
650 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_connect_peer()
822 if (conf->security == MESH_CONF_SEC_NONE) { in mesh_mpm_add_peer()
886 if (conf->security == MESH_CONF_SEC_NONE) { in wpa_mesh_new_mesh_peer()
918 if (conf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_plink_estab()
1055 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm()
1083 if (conf->security & MESH_CONF_SEC_AMPE) in mesh_mpm_fsm()
1255 (!(mconf->security & MESH_CONF_SEC_AMPE) || in mesh_mpm_action_rx()
1275 if (mconf->security & MESH_CONF_SEC_AMPE) { in mesh_mpm_action_rx()
Dmesh.c96 conf->security |= MESH_CONF_SEC_AUTH | in mesh_config_create()
99 conf->security |= MESH_CONF_SEC_NONE; in mesh_config_create()
142 conf->mesh_auth_id = (conf->security & MESH_CONF_SEC_AUTH) ? 1 : 0; in mesh_config_create()
268 if (ifmsh->mconf->security != MESH_CONF_SEC_NONE && in wpas_mesh_complete()
DChangeLog40 to improve security for still unfortunately common invalid
56 [https://w1.fi/security/2022-1/]
64 [https://w1.fi/security/2022-1/]
67 [https://w1.fi/security/2021-1/]
70 [https://w1.fi/security/2020-2/]
72 [https://w1.fi/security/2019-7/]
94 automatically disable transition mode to improve security
110 [https://w1.fi/security/2019-6/]
115 [https://w1.fi/security/2019-6/]
152 [https://w1.fi/security/2019-1/] (CVE-2019-9494)
[all …]
DREADME-Windows.txt21 All security modes have been verified to work (at least complete
240 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/ace_strings.asp
242 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/secauthz/security/sid_strings.asp
DREADME191 The original security mechanism of IEEE 802.11 standard was not
193 networks that require some kind of security. Task group I (Security)
200 IEEE 802.11i work (draft 3.0) to define a subset of the security
217 WPA is an intermediate solution for the security issues. It uses
219 compromise on strong security and possibility to use existing
509 networks and security policies, including pre-shared keys. See
520 file, network security level (WPA/WPA2 is preferred), and signal
612 configuration options are used based on what security policy is used in the
688 wpa_cli can show the current authentication status, selected security
DREADME-HS20537 pairwise_cipher=CCMP <--- link layer security indication
566 command output. Link layer security is indicated with the
/hostap-latest/hostapd/
DREADME150 with open systems authentication, so there is no security. After
175 used in normal use since it does not provide any security. This can be
209 will improve security of the network since same WEP key will only be
229 The original security mechanism of IEEE 802.11 standard was not
231 networks that require some kind of security. Task group I (Security)
239 IEEE 802.11i work (draft 3.0) to define a subset of the security
255 WPA is an intermediate solution for the security issues. It uses
257 compromise on strong security and possibility to use existing
DChangeLog43 [https://w1.fi/security/2022-1/]
52 [https://w1.fi/security/2022-1/]
54 [https://w1.fi/security/2020-1/]
56 [https://w1.fi/security/2019-7/]
78 automatically disable transition mode to improve security
87 [https://w1.fi/security/2019-6/]
91 [https://w1.fi/security/2019-6/]
122 [https://w1.fi/security/2019-1/] (CVE-2019-9494)
124 [https://w1.fi/security/2019-3/] (CVE-2019-9496)
127 [https://w1.fi/security/2019-2/] (CVE-2019-9495)
[all …]
DREADME-WPS219 AP PIN only based on user action (and even better security by using a
247 hostapd_cli wps_config "no security" OPEN NONE ""
/hostap-latest/wpadebug/
DREADME15 result in complete loss of security protections on the device.
/hostap-latest/tests/hwsim/
Dexample-setup.txt126 Test: AP with open mode (no security) configuration
/hostap-latest/hs20/server/
Dhs20-osu-server.txt13 considerable amount of modification and review for security issues.
/hostap-latest/doc/
Ddriver_wrapper.doxygen57 example implementations include full support for all security modes.
/hostap-latest/src/ap/
Dap_config.h50 unsigned int security; member
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt375 of a likely security vulnerability. The AP's TK configuration should be