Lines Matching +full:secure +full:- +full:reg +full:- +full:access

1 hostapd and Wi-Fi Protected Setup (WPS)
10 -------------------
12 Wi-Fi Protected Setup (WPS) is a mechanism for easy configuration of a
14 passphrase/PSK) and configuration of an access point and client
16 with PIN method and push-button configuration (PBC) being the most
22 not very secure. As such, use of WPS may not be suitable for
23 environments that require secure network access without chance for
24 allowing outsiders to gain access during the setup phase.
28 - access point: the WLAN access point
29 - Registrar: a device that control a network and can authorize
33 - Enrollee: a device that is being authorized to use the network
37 when WPS is used to configure the access point.
40 More information about WPS is available from Wi-Fi Alliance:
41 http://www.wi-fi.org/wifi-protected-setup
45 ----------------------
50 be used to allow external WPS Registrars to configure the access
57 ---------------------
79 # WPA2-Personal configuration for the AP
80 ssid=wps-test
82 wpa_key_mgmt=WPA-PSK
84 # Default WPA passphrase for legacy (non-WPS) clients
86 # Enable random per-device PSK generation for WPS clients
94 # Enable internal EAP server for EAP-WSC (part of Wi-Fi Protected Setup)
101 uuid=87654321-9abc-def0-1234-56789abc0000
102 wps_pin_requests=/var/run/hostapd.pin-req
108 device_type=6-0050F204-1
114 #friendly_name=WPS Access Point
118 -------------------
120 WPS requires either a device PIN code (usually, 8-digit number) or a
126 remove non-digit characters and potentially, to verify the checksum
128 processing. It returns FAIL if the PIN is invalid, or FAIL-CHECKSUM if
129 the checksum digit is incorrect, or the processed PIN (non-digit
136 that requires user interaction (assuming there are no pre-configured
140 wps_pin_requests file (/var/run/hostapd.pin-req in this example). In
148 - timestamp (seconds from 1970-01-01)
149 - Enrollee UUID
150 - MAC address
151 - Device name
152 - Manufacturer
153 - Model Name
154 - Model Number
155 - Serial Number
156 - Device category
158 Example line in the /var/run/hostapd.pin-req file:
159 1200188391 53b63a98-d29e-4457-a2ed-094d7e6a669c Intel(R) Centrino(R) Intel Corporation Intel(R) Cen…
162 WPS-PIN-NEEDED [UUID-E|MAC Address|Device Name|Manufacturer|Model Name|Model Number|Serial Number|D…
164 <2>WPS-PIN-NEEDED [53b63a98-d29e-4457-a2ed-094d7e6a669c|02:12:34:56:78:9a|Device|Manuf|Model|Model …
169 -based control interface directly (src/common/wpa_ctrl.c provides
174 hostapd_cli wps_pin 53b63a98-d29e-4457-a2ed-094d7e6a669c 12345670
176 If the UUID-E is not available (e.g., Enrollee waits for the Registrar
192 hostapd_cli wps_pin 53b63a98-d29e-4457-a2ed-094d7e6a669c \
199 AP to access the network.
218 secure option is to use hostapd_cli wps_ap_pin command to enable the
225 - disable AP PIN (i.e., do not allow external Registrars to use it to
229 - generate a random AP PIN and enable it
230 - if the optional timeout parameter is given, the AP PIN will be enabled
234 - fetch the current AP PIN
237 - set the AP PIN and enable it
238 - if the optional timeout parameter is given, the AP PIN will be enabled
242 - display the current configuration
254 -----------------------------------------------
262 then need to be used to provide pre-configured Credential attribute(s)
278 WPS-REG-SUCCESS <Enrollee MAC address <UUID-E>
280 <2>WPS-REG-SUCCESS 02:66:a0:ee:17:27 2b7093f1-d6fb-5108-adbb-bea66bb87333
288 WPS-NEW-AP-SETTINGS <hexdump of AP Setup attributes>
290 <2>WPS-NEW-AP-SETTINGS 10260001011045000c6a6b6d2d7770732d74657374100300020020100f000200081027004030…
297 ------------
299 WPS can be used with NFC-based configuration method. An NFC tag
312 The NFC password token that is either pre-configured in the
326 credentials needed to access the network.
345 Wi-Fi handover as specified in WSC 2.0).