Home
last modified time | relevance | path

Searched refs:after (Results 1 – 24 of 24) sorted by relevance

/hostap-3.6.0/
DCOPYING22 after February 11, 2012 is no longer under the GPL v2 option.
/hostap-3.6.0/wpadebug/src/w1/fi/wpadebug/
DInputUri.java54 int count, int after) { in onCreate()
/hostap-3.6.0/hostapd/
Dhostapd.eap_user31 # "prefix"* can be used to match the given prefix and anything after this. The
40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
DChangeLog8 after SAE Commit
199 * fixed EAPOL reauthentication after FT protocol run
200 * fixed FTIE generation for 4-way handshake after FT protocol run
227 received after the 4-way handshake
376 * enforce full EAP authentication after RADIUS Disconnect-Request by
501 * added a workaround for 4-way handshake to update SNonce even after
507 * changed WPS AP PIN disabling mechanism to disable the PIN after 10
523 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id
630 - Disable AP PIN after 10 consecutive failures. Slow down attacks
855 could have triggered a crash in some cases after a timeout
[all …]
Ddefconfig241 # secure than using the same sequence of random numbers after every reboot.
/hostap-3.6.0/doc/
Dctrl_iface.doxygen797 WPS_EVENT_FAIL: WPS registration failed after M2/M2D
965 included after the event prefix: peer_address PIN. The PIN is a
979 PIN displayed on the peer. The following parameter is included after
991 using PBC. The following parameters are included after the event prefix:
1004 after the event prefix: peer_address. P2P_CONNECT command can be used to
1005 start GO Negotiation after this.
1014 request. The following parameters are included after the event prefix:
1025 response. The following parameters are included after the event prefix:
1036 Request. For persistent groups, the parameter after the event prefix
Dtesting_tools.doxygen63 -S = save configuration after authentiation
Dp2p.doxygen191 after last result, the scan result processing is terminated with a
293 removed automatically after the response has been received.
/hostap-3.6.0/wpa_supplicant/
Deap_testing.txt362 keys with outer EAP-Success message after this
368 keys with outer EAP-Success message after this
374 after this
390 keys with outer EAP-Success message after this
DREADME-DPP171 Sample AP configuration files after provisioning
189 Sample station configuration file after provisioning
DChangeLog269 - indicate group completion in P2P Client role after data association
270 instead of already after the WPS provisioning step
300 * fixed EAPOL reauthentication after FT protocol run
301 * fixed FTIE generation for 4-way handshake after FT protocol run
340 * EAP-TTLS: fixed success after fragmented final Phase 2 message
929 * SME: do not use reassociation after explicit disconnection request
1004 available (e.g., after GAS/ANQP round for Interworking)
1085 before requesting a new scan after failing to find a suitable
1138 - Disable AP PIN after 10 consecutive failures. Slow down attacks on
1390 * fixed FT (IEEE 802.11r) authentication after a failed association to
[all …]
Dpasn_supplicant.c1431 pasn_params.after); in wpas_pasn_auth_rx()
1433 if (!pasn_params.after) in wpas_pasn_auth_rx()
1440 pasn->comeback_after = pasn_params.after; in wpas_pasn_auth_rx()
Dtodo.txt48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
DREADME-Windows.txt105 version, i.e., just run make after having created .config file. An
DREADME-WPS87 credentials. If these are to be stored for future use (after
Dandroid.config423 # much more secure than using the same sequence of random numbers after every
Ddefconfig457 # much more secure than using the same sequence of random numbers after every
DREADME-P2P86 the specified channel after which only social channels are scanned.
/hostap-3.6.0/src/common/
Dwpa_common.c2549 u8 *after; in wpa_insert_pmkid() local
2561 after = rpos + 2 + num_pmkid * PMKID_LEN; in wpa_insert_pmkid()
2562 os_memmove(rpos + 2, after, end - after); in wpa_insert_pmkid()
3437 const struct wpabuf *comeback, int after) in wpa_pasn_add_parameter_ie() argument
3458 if (after >= 0) in wpa_pasn_add_parameter_ie()
3463 if (after >= 0) in wpa_pasn_add_parameter_ie()
3464 wpabuf_put_le16(buf, after); in wpa_pasn_add_parameter_ie()
3673 pasn_params->after = WPA_GET_LE16(pos); in wpa_pasn_parse_parameter_ie()
Dwpa_common.h541 u16 after; member
667 const struct wpabuf *comeback, int after);
/hostap-3.6.0/wpa_supplicant/doc/docbook/
Deapol_test.sgml184 <listitem><para>Save configuration after authentication.
/hostap-3.6.0/tests/hwsim/
Dtest_ap_ciphers.py863 after = get_rx_spec(phy, keytype=KT_GTK).splitlines()
875 a = int(after[i], 16)
Dtest_ap_psk.py2563 after = binascii.hexlify(buf[pos + len(key):end])
2564 …logger.debug("Memory context %d-%d: %s|%s|%s" % (start, end, before, binascii.hexlify(key), after))
/hostap-3.6.0/tests/
Dcipher-and-key-mgmt-testing.txt373 the following unicast Data frame after the last Reassociation Request