Searched refs:after (Results 1 – 24 of 24) sorted by relevance
/hostap-3.6.0/ |
D | COPYING | 22 after February 11, 2012 is no longer under the GPL v2 option.
|
/hostap-3.6.0/wpadebug/src/w1/fi/wpadebug/ |
D | InputUri.java | 54 int count, int after) { in onCreate()
|
/hostap-3.6.0/hostapd/ |
D | hostapd.eap_user | 31 # "prefix"* can be used to match the given prefix and anything after this. The 40 # [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP
|
D | ChangeLog | 8 after SAE Commit 199 * fixed EAPOL reauthentication after FT protocol run 200 * fixed FTIE generation for 4-way handshake after FT protocol run 227 received after the 4-way handshake 376 * enforce full EAP authentication after RADIUS Disconnect-Request by 501 * added a workaround for 4-way handshake to update SNonce even after 507 * changed WPS AP PIN disabling mechanism to disable the PIN after 10 523 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id 630 - Disable AP PIN after 10 consecutive failures. Slow down attacks 855 could have triggered a crash in some cases after a timeout [all …]
|
D | defconfig | 241 # secure than using the same sequence of random numbers after every reboot.
|
/hostap-3.6.0/doc/ |
D | ctrl_iface.doxygen | 797 WPS_EVENT_FAIL: WPS registration failed after M2/M2D 965 included after the event prefix: peer_address PIN. The PIN is a 979 PIN displayed on the peer. The following parameter is included after 991 using PBC. The following parameters are included after the event prefix: 1004 after the event prefix: peer_address. P2P_CONNECT command can be used to 1005 start GO Negotiation after this. 1014 request. The following parameters are included after the event prefix: 1025 response. The following parameters are included after the event prefix: 1036 Request. For persistent groups, the parameter after the event prefix
|
D | testing_tools.doxygen | 63 -S = save configuration after authentiation
|
D | p2p.doxygen | 191 after last result, the scan result processing is terminated with a 293 removed automatically after the response has been received.
|
/hostap-3.6.0/wpa_supplicant/ |
D | eap_testing.txt | 362 keys with outer EAP-Success message after this 368 keys with outer EAP-Success message after this 374 after this 390 keys with outer EAP-Success message after this
|
D | README-DPP | 171 Sample AP configuration files after provisioning 189 Sample station configuration file after provisioning
|
D | ChangeLog | 269 - indicate group completion in P2P Client role after data association 270 instead of already after the WPS provisioning step 300 * fixed EAPOL reauthentication after FT protocol run 301 * fixed FTIE generation for 4-way handshake after FT protocol run 340 * EAP-TTLS: fixed success after fragmented final Phase 2 message 929 * SME: do not use reassociation after explicit disconnection request 1004 available (e.g., after GAS/ANQP round for Interworking) 1085 before requesting a new scan after failing to find a suitable 1138 - Disable AP PIN after 10 consecutive failures. Slow down attacks on 1390 * fixed FT (IEEE 802.11r) authentication after a failed association to [all …]
|
D | pasn_supplicant.c | 1431 pasn_params.after); in wpas_pasn_auth_rx() 1433 if (!pasn_params.after) in wpas_pasn_auth_rx() 1440 pasn->comeback_after = pasn_params.after; in wpas_pasn_auth_rx()
|
D | todo.txt | 48 now IMSI is read only after receiving EAP-Identity/Request, but since it is
|
D | README-Windows.txt | 105 version, i.e., just run make after having created .config file. An
|
D | README-WPS | 87 credentials. If these are to be stored for future use (after
|
D | android.config | 423 # much more secure than using the same sequence of random numbers after every
|
D | defconfig | 457 # much more secure than using the same sequence of random numbers after every
|
D | README-P2P | 86 the specified channel after which only social channels are scanned.
|
/hostap-3.6.0/src/common/ |
D | wpa_common.c | 2549 u8 *after; in wpa_insert_pmkid() local 2561 after = rpos + 2 + num_pmkid * PMKID_LEN; in wpa_insert_pmkid() 2562 os_memmove(rpos + 2, after, end - after); in wpa_insert_pmkid() 3437 const struct wpabuf *comeback, int after) in wpa_pasn_add_parameter_ie() argument 3458 if (after >= 0) in wpa_pasn_add_parameter_ie() 3463 if (after >= 0) in wpa_pasn_add_parameter_ie() 3464 wpabuf_put_le16(buf, after); in wpa_pasn_add_parameter_ie() 3673 pasn_params->after = WPA_GET_LE16(pos); in wpa_pasn_parse_parameter_ie()
|
D | wpa_common.h | 541 u16 after; member 667 const struct wpabuf *comeback, int after);
|
/hostap-3.6.0/wpa_supplicant/doc/docbook/ |
D | eapol_test.sgml | 184 <listitem><para>Save configuration after authentication.
|
/hostap-3.6.0/tests/hwsim/ |
D | test_ap_ciphers.py | 863 after = get_rx_spec(phy, keytype=KT_GTK).splitlines() 875 a = int(after[i], 16)
|
D | test_ap_psk.py | 2563 after = binascii.hexlify(buf[pos + len(key):end]) 2564 …logger.debug("Memory context %d-%d: %s|%s|%s" % (start, end, before, binascii.hexlify(key), after))
|
/hostap-3.6.0/tests/ |
D | cipher-and-key-mgmt-testing.txt | 373 the following unicast Data frame after the last Reassociation Request
|