Home
last modified time | relevance | path

Searched refs:WEP (Results 1 – 25 of 42) sorted by relevance

12

/external/autotest/client/site_tests/network_RackWiFiConnect/
Dcontrol.WEP7 NAME = 'network_RackWiFiConnect.WEP'
13 case a WEP network.
19 test=wifi_rack_constants.WEP.testname)
Dcontrol.hiddenWEP13 case a hidden WEP network.
/external/autotest/client/common_lib/cros/network/
Dwifi_rack_constants.py33 WEP = NetworkServices('WEP', variable
64 WEP, PEAP, WPA2, EAP_TTLS]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml37 <para>IEEE 802.11 standard defined wired equivalent privacy (WEP)
38 algorithm for protecting wireless networks. WEP uses RC4 with
49 uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP
51 hardware. It still uses RC4 for the encryption like WEP, but with
Dwpa_supplicant.sgml43 included a simple encryption mechanism, WEP. However, that proved to
44 be flawed in many areas and network protected with WEP cannot be consider
45 secure. IEEE 802.1X authentication and frequently changed dynamic WEP keys
47 security issues due to the use of WEP for encryption. Wi-Fi Protected
212 with WPA or IEEE 802.1X WEP keying)</para></listitem>
Dwpa_supplicant.conf.sgml125 <para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys
/external/wpa_supplicant_8/hostapd/
DREADME58 and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)
196 Automatic WEP key configuration
199 EAP/TLS generates a session key that can be used to send WEP keys from
203 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,
208 WEP keys can be automatically updated by configuring rekeying. This
209 will improve security of the network since same WEP key will only be
245 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
256 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
258 hardware. It still uses RC4 for the encryption like WEP, but with
[all …]
Dandroid.config235 # Wired equivalent privacy (WEP)
236 # WEP is an obsolete cryptographic data confidentiality algorithm that is not
238 # functionality needed to use WEP is available in the current hostapd
Ddefconfig389 # Wired equivalent privacy (WEP)
390 # WEP is an obsolete cryptographic data confidentiality algorithm that is not
392 # functionality needed to use WEP is available in the current hostapd
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui65 <string>Static WEP (no authentication)</string>
70 <string>Static WEP (Shared Key authentication)</string>
116 <string>WEP</string>
225 <string>WEP keys</string>
/external/autotest/server/site_tests/network_WiFi_Roam/
Dcontrol.wifi_roamWEP13 This test attempts to verify that we can roam between two WEP APs
/external/autotest/server/site_tests/network_WiFi_RoamSuspendTimeout/
Dcontrol.wep4014 WEP open system authentication after deauthentication while the DUT is
Dcontrol.wep10413 This test case verifies that the DUT can reconnect to an AP using WEP
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_check1x_WEP14 dynamic WEP encryption.
Dcontrol.wifi_checkHiddenWEP14 using all variants of 40/104 bit open/shared WEP encryption.
Dcontrol.wifi_checkWEP10413 This test case verifies that the DUT can connect to an AP using WEP both open
Dcontrol.wifi_checkWEP4014 WEP both open and shared system authentication and 40-bit
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts110 <source>Static WEP (no authentication)</source>
111 <translation>Static WEP (keine Authentifizierung)</translation>
115 <source>Static WEP (Shared Key authentication)</source>
155 <source>WEP</source>
210 <source>WEP keys</source>
211 <translation>WEP Schlüssel</translation>
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-Windows.txt24 - static WEP / open system authentication
25 - static WEP / shared key authentication
26 - IEEE 802.1X with dynamic WEP keys
DChangeLog295 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
1382 WEP keys with IEEE 802.1X
1527 affects IEEE 802.1X with dynamic WEP keys)
1536 * driver_ndis: fixed static WEP configuration to avoid race condition
1537 issues with some NDIS drivers between association and setting WEP
1670 * driver_wext: fixed privacy configuration for static WEP keys mode
1849 - added WEP key configuration
1906 * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used
1993 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
2141 * driver_ndis: use ADD_WEP/REMOVE_WEP when configuring WEP keys
[all …]
DREADME85 material, they cannot be used with WPA or IEEE 802.1X WEP keying)
207 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
208 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
218 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
220 hardware. It still uses RC4 for the encryption like WEP, but with
590 4) IEEE 802.1X (i.e., no WPA) with dynamic WEP keys (require both unicast and
Dandroid.config552 # Wired equivalent privacy (WEP)
553 # WEP is an obsolete cryptographic data confidentiality algorithm that is not
555 # functionality needed to use WEP is available in the current wpa_supplicant
Ddefconfig614 # Wired equivalent privacy (WEP)
615 # WEP is an obsolete cryptographic data confidentiality algorithm that is not
617 # functionality needed to use WEP is available in the current wpa_supplicant
/external/scapy/
DREADME29 techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected
DREADME.md29 techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected

12