Home
last modified time | relevance | path

Searched refs:WEP (Results 1 – 25 of 44) sorted by relevance

12

/external/autotest/client/site_tests/network_RackWiFiConnect/
Dcontrol.WEP7 NAME = 'network_RackWiFiConnect.WEP'
13 case a WEP network.
19 test=wifi_rack_constants.WEP.testname)
Dcontrol.hiddenWEP13 case a hidden WEP network.
/external/autotest/client/common_lib/cros/network/
Dwifi_rack_constants.py33 WEP = NetworkServices('WEP', variable
64 WEP, PEAP, WPA2, EAP_TTLS]
/external/wpa_supplicant_8/hostapd/
DREADME58 and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)
196 Automatic WEP key configuration
199 EAP/TLS generates a session key that can be used to send WEP keys from
203 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,
208 WEP keys can be automatically updated by configuring rekeying. This
209 will improve security of the network since same WEP key will only be
245 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
256 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
258 hardware. It still uses RC4 for the encryption like WEP, but with
[all …]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml33 <para>IEEE 802.11 standard defined wired equivalent privacy (WEP)
34 algorithm for protecting wireless networks. WEP uses RC4 with
45 uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP
47 hardware. It still uses RC4 for the encryption like WEP, but with
Dwpa_supplicant.sgml39 included a simple encryption mechanism, WEP. However, that proved to
40 be flawed in many areas and network protected with WEP cannot be consider
41 secure. IEEE 802.1X authentication and frequently changed dynamic WEP keys
43 security issues due to the use of WEP for encryption. Wi-Fi Protected
208 with WPA or IEEE 802.1X WEP keying)</para></listitem>
Dwpa_supplicant.conf.sgml121 <para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui65 <string>Static WEP (no authentication)</string>
70 <string>Static WEP (Shared Key authentication)</string>
116 <string>WEP</string>
225 <string>WEP keys</string>
/external/autotest/server/site_tests/network_WiFi_Roam/
Dcontrol.wifi_roamWEP13 This test attempts to verify that we can roam between two WEP APs
/external/autotest/server/site_tests/network_WiFi_RoamSuspendTimeout/
Dcontrol.wep10413 This test case verifies that the DUT can reconnect to an AP using WEP
Dcontrol.wep4014 WEP open system authentication after deauthentication while the DUT is
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_check1x_WEP14 dynamic WEP encryption.
Dcontrol.wifi_checkHiddenWEP15 using all variants of 40/104 bit open/shared WEP encryption.
Dcontrol.wifi_checkWEP4014 WEP both open and shared system authentication and 40-bit
Dcontrol.wifi_checkWEP10413 This test case verifies that the DUT can connect to an AP using WEP both open
/external/autotest/server/site_tests/network_WiFi_Perf/
Dcontrol.11g_wep15 throughput on a DUT with an 802.11g network with WEP encryption.
/external/autotest/server/site_tests/network_WiFi_SuspendStress/
Dcontrol.WEP4015 wifi adapter is brought back up and connects to a WEP network.
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts110 <source>Static WEP (no authentication)</source>
111 <translation>Static WEP (keine Authentifizierung)</translation>
115 <source>Static WEP (Shared Key authentication)</source>
155 <source>WEP</source>
210 <source>WEP keys</source>
211 <translation>WEP Schlüssel</translation>
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-Windows.txt24 - static WEP / open system authentication
25 - static WEP / shared key authentication
26 - IEEE 802.1X with dynamic WEP keys
DChangeLog197 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
1284 WEP keys with IEEE 802.1X
1429 affects IEEE 802.1X with dynamic WEP keys)
1438 * driver_ndis: fixed static WEP configuration to avoid race condition
1439 issues with some NDIS drivers between association and setting WEP
1572 * driver_wext: fixed privacy configuration for static WEP keys mode
1751 - added WEP key configuration
1808 * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used
1895 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
2043 * driver_ndis: use ADD_WEP/REMOVE_WEP when configuring WEP keys
[all …]
DREADME85 material, they cannot be used with WPA or IEEE 802.1X WEP keying)
207 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
208 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
218 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
220 hardware. It still uses RC4 for the encryption like WEP, but with
590 4) IEEE 802.1X (i.e., no WPA) with dynamic WEP keys (require both unicast and
DREADME-WPS180 <encr> must be one of the following: NONE WEP TKIP CCMP
276 <encr> must be one of the following: NONE WEP TKIP CCMP
/external/scapy/
DREADME29 techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected
DREADME.md29 techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected
/external/scapy/doc/scapy/
Dinstallation.rst178 single: WEP, unwep()
180 * WEP decryption. ``unwep()`` needs `cryptography <https://cryptography.io>`_. Example using a `Wep…

12