Lines Matching +full:conversion +full:- +full:interval
1 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
5 Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> and contributors
17 -------
33 3. Neither the name(s) of the above-listed copyright holder(s) nor the
68 ------------
71 - drivers:
73 (http://w1.fi/hostap-driver.html)
77 mac80211-based drivers that support AP mode (with driver=nl80211).
84 FreeBSD -current
89 -------------------
101 IEEE Std 802.1X-2001 is a standard for port-based network access
145 controlling virtual port authorization, i.e., station-AP
160 -------------------------------------
173 hostapd includes a minimal co-located IEEE 802.1X server which can be
182 configuration, the co-located Authentication Server is not used and EAP
186 to the case with the co-located Authentication Server.
189 ---------------------
197 -------------------------------
203 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,
211 interval for rekeying in seconds.
218 --------
221 - WPA-PSK ("WPA-Personal")
222 - WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
223 - key management for CCMP, TKIP, WEP104, WEP40
224 - RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authentication
227 ---
238 Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the
241 is called Wi-Fi Protected Access<TM> (WPA). This has now become a
243 by Wi-Fi Alliance.
246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
247 24-bit initialization vector (IV), and CRC32 to protect against packet
252 protection, and non-keyed authentication does not protect against bit
259 per-packet RC4 keys. In addition, it implements replay protection,
264 IEEE 802.1X is using or pre-shared keys without need for additional
265 servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",
269 WPA implements a new key handshake (4-Way Handshake and Group Key
279 -------------------
283 June 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new
285 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
287 messages in initial key handshake, pre-authentication, and PMKSA caching).
297 ----------------------------------
302 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
303 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
304 # For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
305 # RADIUS authentication server must be configured, and WPA-EAP must be included
313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
315 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
322 #wpa_key_mgmt=WPA-PSK WPA-EAP
326 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]
334 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
338 # Time interval for rekeying GMK (master key used internally to generate GTKs
342 # Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
343 # roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
347 # Space separated list of interfaces from which pre-authentication frames are
352 # pre-authentication is only used with APs other than the currently associated