Searched refs:replay (Results 1 – 6 of 6) sorted by relevance
/hostap-3.6.0/tests/ |
D | cipher-and-key-mgmt-testing.txt | 157 clearing its packet number to test replay protection. That can help in 159 supposed to drop due replay. 162 Testing replay protection on a station device 183 does not implement replay protection correctly for unicast frames. Note 195 does not implement replay protection correctly for broadcast 201 Testing replay protection on an AP device 221 does not implement replay protection correctly. Note that unicast 226 there is no need to test AP replay protection behavior separately with 234 Use the procedure describe above for testing replay protection, but with 252 Use the procedure described above for testing replay protection for [all …]
|
/hostap-3.6.0/wlantest/ |
D | rx_data.c | 247 int replay = 0; in rx_data_bss_prot_group() local 324 replay = 1; in rx_data_bss_prot_group() 360 if (!replay) in rx_data_bss_prot_group() 412 int replay = 0; in rx_data_bss_prot() local 601 replay = 1; in rx_data_bss_prot() 675 if (!replay && rsc) in rx_data_bss_prot()
|
/hostap-3.6.0/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 44 makes attacks easier, there is no replay protection, and non-keyed 52 per-packet RC4 keys. In addition, it implements replay protection,
|
/hostap-3.6.0/hostapd/ |
D | README | 251 too small and IV reuse makes attacks easier, there is no replay 259 per-packet RC4 keys. In addition, it implements replay protection,
|
D | ChangeLog | 1273 cases where STAs dropped multicast frames as replay attacks
|
/hostap-3.6.0/wpa_supplicant/ |
D | README | 213 too small and IV reuse makes attacks easier, there is no replay 221 per-packet RC4 keys. In addition, it implements replay protection,
|