Lines Matching full:be
5 can be configured and how an external component on the client (e.g.,
21 wireless network, it should be noted that the use of the PIN and
23 not very secure. As such, use of WPS may not be suitable for
31 addition of new devices); this may be either in the AP ("internal
36 It should also be noted that the AP and a client device may change
48 wpa_supplicant includes an optional WPS component that can be used as
56 WPS is an optional component that needs to be enabled in
69 The following parameter can be used to enable support for NFC config
76 wpa_supplicant (if not set, UUID will be generated based on local MAC
84 to be added explicitly in the configuration file.
87 credentials. If these are to be stored for future use (after
88 restarting wpa_supplicant), wpa_supplicant will need to be configured
102 The PIN value used in the commands must be processed by an UI to
104 digit. "wpa_cli wps_check_pin <PIN>" can be used to do such processing.
109 If the client device has a display, a random PIN has to be generated
115 This will return the generated 8-digit PIN which will then need to be
117 the client will be enrolled with credentials needed to connect to the
121 random PIN, a hardcoded PIN that is printed on a label can be
131 interface, an optional timeout parameter can be used to specify
137 can be used to generate a new PIN without starting WPS negotiation.
138 This random PIN can then be passed as an argument to another wps_pin
139 call when the actual operation should be started.
142 be enabled by either a physical button in the client device or a
175 <auth> must be one of the following: OPEN WPAPSK WPA2PSK
176 <encr> must be one of the following: NONE WEP TKIP CCMP
185 flag will be included. If PIN method has been recently selected,
189 monitor events WPS-AP-AVAILABLE{,-PBC,-PIN} can be used to find out if
191 all the details in the GUI. These notification could be used, e.g., to
199 how WPS support can be integrated into the GUI. Its main window has a
201 selection. In addition, it shows how WPS can be started manually by
212 This internal processing can be disabled with wps_cred_processing=1
228 wpa_supplicant can be used as a WPS ER to configure an AP or enroll
231 can be either over a wired or wireless connection).
233 Separate wpa_supplicant process can be started for WPS ER
234 operations. A special "none" driver can be used in such a case to
236 example, the following command could be used to start the ER:
249 - the optional IP address parameter can be used to filter operations only
263 only prepares a configuration to be used when enrolling a new device
271 <auth> must be one of the following: OPEN WPAPSK WPA2PSK
272 <encr> must be one of the following: NONE WEP TKIP CCMP
279 - if Enrollee UUID is not known, "any" can be used to add a wildcard PIN
280 - if the MAC address of the enrollee is known, it should be configured
314 WPS can be used with NFC-based configuration method. An NFC tag
315 containing a password token from the Enrollee can be used to
317 with a configuration token can be used to transfer AP settings without
321 token can be used by touching the NFC interface of a Registrar.
328 (build with "make nfc_pw_token") can be used to generate NFC password
332 The "wps_nfc_config_token <WPS/NDEF>" command can be used to build an
337 encapsulation to be included). This data needs to be written to an NFC
339 can be used to touch an NFC interface on a station to provision the
342 The "wps_nfc_config_token <WPS/NDEF> <network id>" command can be used
348 without NDEF encapsulation) can be delivered to wpa_supplicant using the
356 then be used with wps_reg command (when the NFC password token was from
362 "nfc_get_handover_req <NDEF> <WPS-CR>" command can be used to build the
368 "nfc_get_handover_sel <NDEF> <WPS> [UUID|BSSID]" command can be used to
379 <carrier from handover select>" can be used as an alternative way for
385 The "wps_er_nfc_config_token <WPS/NDEF> <UUID|BSSID>" command can be
390 requests additional NDEF encapsulation to be included). This data needs
391 to be written to an NFC tag with an external program. Once written, the
392 NFC configuration token can be used to touch an NFC interface on a