Home
last modified time | relevance | path

Searched refs:WEP (Results 1 – 25 of 30) sorted by relevance

12

/external/autotest/client/site_tests/network_RackWiFiConnect/
Dcontrol.WEP7 NAME = 'network_RackWiFiConnect.WEP'
13 case a WEP network.
19 test=wifi_rack_constants.WEP.testname)
Dcontrol.hiddenWEP13 case a hidden WEP network.
/external/autotest/client/common_lib/cros/network/
Dwifi_rack_constants.py33 WEP = NetworkServices('WEP', variable
64 WEP, PEAP, WPA2, EAP_TTLS]
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml33 <para>IEEE 802.11 standard defined wired equivalent privacy (WEP)
34 algorithm for protecting wireless networks. WEP uses RC4 with
45 uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP
47 hardware. It still uses RC4 for the encryption like WEP, but with
Dwpa_supplicant.sgml39 included a simple encryption mechanism, WEP. However, that proved to
40 be flawed in many areas and network protected with WEP cannot be consider
41 secure. IEEE 802.1X authentication and frequently changed dynamic WEP keys
43 security issues due to the use of WEP for encryption. Wi-Fi Protected
208 with WPA or IEEE 802.1X WEP keying)</para></listitem>
Dwpa_supplicant.conf.sgml121 <para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys
/external/wpa_supplicant_8/hostapd/
DREADME58 and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)
207 Automatic WEP key configuration
210 EAP/TLS generates a session key that can be used to send WEP keys from
214 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,
219 WEP keys can be automatically updated by configuring rekeying. This
220 will improve security of the network since same WEP key will only be
257 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
258 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
268 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
270 hardware. It still uses RC4 for the encryption like WEP, but with
[all …]
DChangeLog56 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
410 * Allow coexistance of HT BSSes with WEP/TKIP BSSes.
602 * fixed WEP authentication (both Open System and Shared Key) with
768 and IEEE 802.1X without WEP)
1013 this enabled dynamic keying (WPA2/WPA/IEEE 802.1X/WEP) without
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.ui65 <string>Static WEP (no authentication)</string>
70 <string>Static WEP (Shared Key authentication)</string>
116 <string>WEP</string>
225 <string>WEP keys</string>
/external/autotest/server/site_tests/network_WiFi_Roam/
Dcontrol.wifi_roamWEP14 This test attempts to verify that we can roam between two WEP APs
/external/autotest/server/site_tests/network_WiFi_RoamSuspendTimeout/
Dcontrol.wep4014 WEP open system authentication after deauthentication while the DUT is
Dcontrol.wep10413 This test case verifies that the DUT can reconnect to an AP using WEP
/external/autotest/server/site_tests/network_WiFi_SimpleConnect/
Dcontrol.wifi_check1x_WEP16 dynamic WEP encryption.
Dcontrol.wifi_checkHiddenWEP17 using all variants of 40/104 bit open/shared WEP encryption.
Dcontrol.wifi_checkWEP4017 WEP both open and shared system authentication and 40-bit
Dcontrol.wifi_checkWEP10416 This test case verifies that the DUT can connect to an AP using WEP both open
/external/autotest/server/site_tests/network_WiFi_Perf/
Dcontrol.11g_wep14 throughput on a DUT with an 802.11g network with WEP encryption.
Dcontrol.11a_wep14 throughput on a DUT with an 802.11a network with WEP encryption.
Dcontrol.11b_wep14 throughput on a DUT with an 802.11b network with WEP encryption.
/external/autotest/server/site_tests/network_WiFi_SuspendStress/
Dcontrol.WEP4015 wifi adapter is brought back up and connects to a WEP network.
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts110 <source>Static WEP (no authentication)</source>
111 <translation>Static WEP (keine Authentifizierung)</translation>
115 <source>Static WEP (Shared Key authentication)</source>
155 <source>WEP</source>
210 <source>WEP keys</source>
211 <translation>WEP Schlüssel</translation>
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-Windows.txt24 - static WEP / open system authentication
25 - static WEP / shared key authentication
26 - IEEE 802.1X with dynamic WEP keys
DChangeLog127 - fix IEEE 802.1X/WEP EAP reauthentication and rekeying to use
1214 WEP keys with IEEE 802.1X
1359 affects IEEE 802.1X with dynamic WEP keys)
1368 * driver_ndis: fixed static WEP configuration to avoid race condition
1369 issues with some NDIS drivers between association and setting WEP
1502 * driver_wext: fixed privacy configuration for static WEP keys mode
1681 - added WEP key configuration
1738 * allow non-WPA modes (e.g., IEEE 802.1X with dynamic WEP) to be used
1825 * fixed association with IEEE 802.1X (no WPA) when dynamic WEP keys
1973 * driver_ndis: use ADD_WEP/REMOVE_WEP when configuring WEP keys
[all …]
DREADME85 material, they cannot be used with WPA or IEEE 802.1X WEP keying)
207 IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
208 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
218 Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
220 hardware. It still uses RC4 for the encryption like WEP, but with
590 4) IEEE 802.1X (i.e., no WPA) with dynamic WEP keys (require both unicast and
DREADME-WPS180 <encr> must be one of the following: NONE WEP TKIP CCMP
276 <encr> must be one of the following: NONE WEP TKIP CCMP

12