Lines Matching refs:EAPOL
111 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
120 * added option to configure EAPOL-Key retry limits
156 * fixed EAPOL reauthentication after FT protocol run
191 unencrypted EAPOL frames
263 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce
268 * fixed AP IE in EAPOL-Key 3/4 when both WPA and FT was enabled
439 use of the Secure bit in EAPOL-Key msg 3/4
459 having sent EAPOL-Key 3/4 to avoid issues with some supplicant
461 * added a workaround for EAPOL-Key 4/4 using incorrect type value in
512 * changed EAPOL transmission to use AC_VO if WMM is active
523 * fixed EAPOL frame transmission to non-QoS STAs with nl80211
698 * fixed EAPOL/EAP reauthentication when using an external RADIUS
810 * fixed EAPOL state machine to handle a case in which no response is
943 set EAPOL version to 1 (default is 2) to work around broken client
944 implementations that drop EAPOL frames which use version number 2
1003 * driver_wired: fixed EAPOL sending to optionally use PAE group address
1019 * driver_madwifi: fixed EAPOL packet receive for configuration where
1022 * fixed EAPOL state machine step function to process all state
1024 condition in which EAPOL-Start message could trigger hostapd to send
1121 * fixed EAPOL-Start processing to trigger WPA reauthentication
1122 (previously, only EAPOL authentication was done)
1158 * fixed EAPOL reauthentication to trigger WPA/WPA2 reauthentication
1159 * fixed EAPOL state machine to stop if STA is removed during
1222 * fixed couple of cases where EAPOL state for a station was freed
1229 * fixed group rekeying to send zero TSC in EAPOL-Key messages to fix
1236 not start EAPOL state machines if the STA selected to use WPA-PSK)