Lines Matching refs:be

5 can be configured and how an external component on the client (e.g.,
21 wireless network, it should be noted that the use of the PIN and
23 not very secure. As such, use of WPS may not be suitable for
31 addition of new devices); this may be either in the AP ("internal
36 It should also be noted that the AP and a client device may change
48 wpa_supplicant includes an optional WPS component that can be used as
56 WPS is an optional component that needs to be enabled in
69 Following parameter can be used to enable support for NFC config method:
76 wpa_supplicant (if not set, UUID will be generated based on local MAC
84 to be added explicitly in the configuration file.
87 credentials. If these are to be stored for future use (after
88 restarting wpa_supplicant), wpa_supplicant will need to be configured
103 The PIN value used in the commands must be processed by an UI to
105 digit. "wpa_cli wps_check_pin <PIN>" can be used to do such processing.
110 If the client device has a display, a random PIN has to be generated
116 This will return the generated 8-digit PIN which will then need to be
118 the client will be enrolled with credentials needed to connect to the
123 random PIN, a hardcoded PIN that is printed on a label can be
133 interface, an optional timeout parameter can be used to specify
140 can be used to generate a new PIN without starting WPS negotiation.
141 This random PIN can then be passed as an argument to another wps_pin
142 call when the actual operation should be started.
145 be enabled by either a physical button in the client device or a
179 <auth> must be one of the following: OPEN WPAPSK WPA2PSK
180 <encr> must be one of the following: NONE WEP TKIP CCMP
189 flag will be included. If PIN method has been recently selected,
193 monitor events WPS-AP-AVAILABLE{,-PBC,-PIN} can be used to find out if
195 all the details in the GUI. These notification could be used, e.g., to
203 how WPS support can be integrated into the GUI. Its main window has a
205 selection. In addition, it shows how WPS can be started manually by
216 This internal processing can be disabled with wps_cred_processing=1
231 wpa_supplicant can be used as a WPS ER to configure an AP or enroll
234 can be either over a wired or wireless connection).
236 Separate wpa_supplicant process can be started for WPS ER
237 operations. A special "none" driver can be used in such a case to
239 example, following command could be used to start the ER:
253 - the optional IP address parameter can be used to filter operations only
267 only prepares a configuration to be used when enrolling a new device
275 <auth> must be one of the following: OPEN WPAPSK WPA2PSK
276 <encr> must be one of the following: NONE WEP TKIP CCMP
284 - if Enrollee UUID is not known, "any" can be used to add a wildcard PIN
285 - if the MAC address of the enrollee is known, it should be configured
320 WPS can be used with NFC-based configuration method. An NFC tag
321 containing a password token from the Enrollee can be used to
323 with a configuration token can be used to transfer AP settings without
327 token can be used by touching the NFC interface of a Registrar.
334 (build with "make nfc_pw_token") can be used to generate NFC password
338 The "wps_nfc_config_token <WPS/NDEF>" command can be used to build an
343 encapsulation to be included). This data needs to be written to an NFC
345 can be used to touch an NFC interface on a station to provision the
348 The "wps_nfc_config_token <WPS/NDEF> <network id>" command can be used
354 without NDEF encapsulation) can be delivered to wpa_supplicant using the
362 then be used with wps_reg command (when the NFC password token was from
368 "nfc_get_handover_req <NDEF> <WPS-CR>" command can be used to build the
374 "nfc_get_handover_sel <NDEF> <WPS> [UUID|BSSID]" command can be used to
385 <carrier from handover select>" can be used as an alternative way for
391 The "wps_er_nfc_config_token <WPS/NDEF> <UUID|BSSID>" command can be
396 requests additional NDEF encapsulation to be included). This data needs
397 to be written to an NFC tag with an external program. Once written, the
398 NFC configuration token can be used to touch an NFC interface on a