Searched refs:WEP (Results 1 – 25 of 44) sorted by relevance
12
7 NAME = 'network_RackWiFiConnect.WEP'13 case a WEP network.19 test=wifi_rack_constants.WEP.testname)
13 case a hidden WEP network.
33 WEP = NetworkServices('WEP', variable64 WEP, PEAP, WPA2, EAP_TTLS]
58 and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)196 Automatic WEP key configuration199 EAP/TLS generates a session key that can be used to send WEP keys from203 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,208 WEP keys can be automatically updated by configuring rekeying. This209 will improve security of the network since same WEP key will only be245 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,256 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a258 hardware. It still uses RC4 for the encryption like WEP, but with[all …]
33 <para>IEEE 802.11 standard defined wired equivalent privacy (WEP)34 algorithm for protecting wireless networks. WEP uses RC4 with45 uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP47 hardware. It still uses RC4 for the encryption like WEP, but with
39 included a simple encryption mechanism, WEP. However, that proved to40 be flawed in many areas and network protected with WEP cannot be consider41 secure. IEEE 802.1X authentication and frequently changed dynamic WEP keys43 security issues due to the use of WEP for encryption. Wi-Fi Protected208 with WPA or IEEE 802.1X WEP keying)</para></listitem>
121 <para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys
65 <string>Static WEP (no authentication)</string>70 <string>Static WEP (Shared Key authentication)</string>116 <string>WEP</string>225 <string>WEP keys</string>
13 This test attempts to verify that we can roam between two WEP APs
13 This test case verifies that the DUT can reconnect to an AP using WEP
14 WEP open system authentication after deauthentication while the DUT is
14 dynamic WEP encryption.
15 using all variants of 40/104 bit open/shared WEP encryption.
14 WEP both open and shared system authentication and 40-bit
13 This test case verifies that the DUT can connect to an AP using WEP both open
15 throughput on a DUT with an 802.11g network with WEP encryption.
15 wifi adapter is brought back up and connects to a WEP network.
110 <source>Static WEP (no authentication)</source>111 <translation>Static WEP (keine Authentifizierung)</translation>115 <source>Static WEP (Shared Key authentication)</source>155 <source>WEP</source>210 <source>WEP keys</source>211 <translation>WEP Schlüssel</translation>
24 - static WEP / open system authentication25 - static WEP / shared key authentication26 - IEEE 802.1X with dynamic WEP keys
197 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use1284 WEP keys with IEEE 802.1X1429 affects IEEE 802.1X with dynamic WEP keys)1438 * driver_ndis: fixed static WEP configuration to avoid race condition1439 issues with some NDIS drivers between association and setting WEP1572 * driver_wext: fixed privacy configuration for static WEP keys mode1751 - added WEP key configuration1808 * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used1895 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys2043 * driver_ndis: use ADD_WEP/REMOVE_WEP when configuring WEP keys[all …]
85 material, they cannot be used with WPA or IEEE 802.1X WEP keying)207 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm208 for protecting wireless networks. WEP uses RC4 with 40-bit keys,218 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a220 hardware. It still uses RC4 for the encryption like WEP, but with590 4) IEEE 802.1X (i.e., no WPA) with dynamic WEP keys (require both unicast and
180 <encr> must be one of the following: NONE WEP TKIP CCMP276 <encr> must be one of the following: NONE WEP TKIP CCMP
29 techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected
178 single: WEP, unwep()180 * WEP decryption. ``unwep()`` needs `cryptography <https://cryptography.io>`_. Example using a `Wep…