Home
last modified time | relevance | path

Searched refs:completed (Results 1 – 21 of 21) sorted by relevance

/hostap-latest/wpa_supplicant/
DREADME-HS20465 <3>ANQP fetch completed
484 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
485 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
486 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (auth) [id=0 id_str=]
516 <3>ANQP fetch completed
525 <3>CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
526 <3>WPA: Key negotiation completed with 02:00:00:00:01:00 [PTK=CCMP GTK=CCMP]
527 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
618 <3>ANQP fetch completed
Dtodo.txt5 authentication has been completed (cache scard data based on serial#(?)
DREADME196 completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
850 completed before data frames can be exchanged, so wpa_supplicant
1025 radio work items on the same channel may be completed in
1035 the operation has been completed, "RADIO_WORK done <id>" is used to
DREADME-P2P295 step. If the WPS provisioning step has been completed, the group is not
813 P2PS-PROV-DONE: When provisioning is completed then this event gets triggered.
DREADME-WPS380 reporting completed NFC connection handover. The first parameter
DChangeLog436 * removed unmaintained and not yet completed SChannel/CryptoAPI support
2149 wpa_supplicant events, e.g., when authentication has been completed
2235 could cause a segfault when RSN pre-authentication was completed
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt170 This indicates that the connection was completed successfully.
211 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP]
212 <3>CTRL-EVENT-CONNECTED - Connection to <DUT MAC address> completed [id=0 id_str=]
335 <3>WPA: Key negotiation completed with <DUT MAC address> [PTK=CCMP GTK=CCMP]
336 <3>CTRL-EVENT-CONNECTED - Connection to <DUT MAC address> completed [id=0 id_str=]
DMakefile153 @echo All tests completed successfully.
/hostap-latest/src/pasn/
Dpasn_common.h31 bool completed; member
Dpasn_initiator.c285 pasn->fils.completed); in wpas_pasn_wd_fils_auth()
288 if (pasn->fils.completed) in wpas_pasn_wd_fils_auth()
444 pasn->fils.completed = true; in wpas_pasn_wd_fils_rx()
/hostap-latest/doc/
Dctrl_iface.doxygen711 WPA_EVENT_CONNECTED: Indicate successfully completed authentication
724 WPA_EVENT_PASSWORD_CHANGED: Password change was completed successfully
741 WPA_EVENT_EAP_SUCCESS: EAP authentication completed successfully
801 WPS_EVENT_SUCCESS: WPS registration completed successfully
874 WPS_EVENT_REG_SUCCESS: WPS provisioning was completed successfully
931 has been completed successfully.
Dp2p.doxygen189 full scan to be completed by calling \ref p2p_config::p2p_scan(). Results
248 Once the group owner negotiation has been completed, its results will
255 provisioning if it cannot be completed in 15 seconds.
336 Once the group formation has been completed (or if it is skipped in
Dtesting_tools.doxygen129 exit code if all tests were completed successfully.
Ddbus.doxygen758 …ting", "associating", "associated", "4way_handshake", "group_handshake", "completed","unknown".</p>
/hostap-latest/tests/hwsim/vm/
Dexample-vm-setup.txt103 Test run completed
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml24 the base standard and has in practice completed its work in May
/hostap-latest/hostapd/
DREADME155 with the Authentication Server. After this is completed successfully,
234 completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
DREADME-WPS348 <carrier from handover select>" is used to report completed NFC
DChangeLog1015 * fixed a segmentation fault when RSN pre-authentication was completed
/hostap-latest/wpa_supplicant/wpa_gui-qt4/lang/
Dwpa_gui_de.ts28 <source>Add interface command could not be completed.</source>
/hostap-latest/tests/hwsim/
Dtest_ap_wps.py3686 completed = False
3692 completed = True
3696 if completed: