Home
last modified time | relevance | path

Searched refs:completed (Results 1 – 21 of 21) sorted by relevance

/hostap-3.7.0/wpa_supplicant/
DREADME-HS20434 <3>ANQP fetch completed
453 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
454 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
455 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (auth) [id=0 id_str=]
485 <3>ANQP fetch completed
494 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
495 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
496 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
587 <3>ANQP fetch completed
Dpasn_supplicant.c401 pasn->fils.completed); in wpas_pasn_wd_fils_auth()
404 if (pasn->fils.completed) in wpas_pasn_wd_fils_auth()
579 pasn->fils.completed = true; in wpas_pasn_wd_fils_rx()
Dtodo.txt5 authentication has been completed (cache scard data based on serial#(?)
DREADME196 completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
848 completed before data frames can be exchanged, so wpa_supplicant
1023 radio work items on the same channel may be completed in
1033 the operation has been completed, "RADIO_WORK done <id>" is used to
Dwpa_supplicant_i.h549 bool completed; member
DREADME-P2P295 step. If the WPS provisioning step has been completed, the group is not
813 P2PS-PROV-DONE: When provisioning is completed then this event gets triggered.
DREADME-WPS386 reporting completed NFC connection handover. The first parameter
DChangeLog386 * removed unmaintained and not yet completed SChannel/CryptoAPI support
2099 wpa_supplicant events, e.g., when authentication has been completed
2185 could cause a segfault when RSN pre-authentication was completed
/hostap-3.7.0/tests/
Dcipher-and-key-mgmt-testing.txt170 This indicates that the connection was completed successfully.
211 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP]
212 <3>CTRL-EVENT-CONNECTED - Connection to <DUT MAC address> completed [id=0 id_str=]
335 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP]
336 <3>CTRL-EVENT-CONNECTED - Connection to <DUT MAC address> completed [id=0 id_str=]
DMakefile94 @echo All tests completed successfully.
/hostap-3.7.0/tests/hwsim/vm/
Dexample-vm-setup.txt84 Test run completed
/hostap-3.7.0/doc/
Dctrl_iface.doxygen711 WPA_EVENT_CONNECTED: Indicate successfully completed authentication
724 WPA_EVENT_PASSWORD_CHANGED: Password change was completed successfully
741 WPA_EVENT_EAP_SUCCESS: EAP authentication completed successfully
801 WPS_EVENT_SUCCESS: WPS registration completed successfully
874 WPS_EVENT_REG_SUCCESS: WPS provisioning was completed successfully
931 has been completed successfully.
Dp2p.doxygen189 full scan to be completed by calling \ref p2p_config::p2p_scan(). Results
248 Once the group owner negotiation has been completed, its results will
255 provisioning if it cannot be completed in 15 seconds.
336 Once the group formation has been completed (or if it is skipped in
Dtesting_tools.doxygen129 exit code if all tests were completed successfully.
Ddbus.doxygen708 …ting", "associating", "associated", "4way_handshake", "group_handshake", "completed","unknown".</p>
/hostap-3.7.0/wpa_supplicant/doc/docbook/
Dwpa_background.sgml24 the base standard and has in practice completed its work in May
/hostap-3.7.0/hostapd/
DREADME155 with the Authentication Server. After this is completed successfully,
234 completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
DREADME-WPS348 <carrier from handover select>" is used to report completed NFC
DChangeLog978 * fixed a segmentation fault when RSN pre-authentication was completed
/hostap-3.7.0/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts28 <source>Add interface command could not be completed.</source>
/hostap-3.7.0/tests/hwsim/
Dtest_ap_wps.py3666 completed = False
3672 completed = True
3676 if completed: