Lines Matching refs:EAPOL
107 * fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
149 - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
183 * fixed TK configuration to the driver in EAPOL-Key 3/4 retry case
247 * fixed EAPOL reauthentication after FT protocol run
296 unencrypted EAPOL frames
301 * fixed EAPOL-Key Request Secure bit to be 1 if PTK is set
397 * increase postponing of EAPOL-Start by one second with AP/GO that
406 EAPOL-Key descriptor version 3 when the station supports PMF even if
638 * fixed EAPOL-Key exchange when GCMP is used with SHA256-based AKM
976 * extend EAPOL frames processing workaround for roaming cases
977 (postpone processing of unexpected EAPOL frame until association
1276 association event and the following EAPOL-Key
1381 * fixed EAPOL not to end up in infinite loop when processing dynamic
1405 * stop EAPOL timer tick when no timers are in use in order to reduce
1562 EAPOL-Key frames; previously, that source address was used as the
1563 destination for EAPOL-Key frames and in key derivation; now, BSSID is
1690 * added support for receiving EAPOL frames from a Linux bridge
1692 * fixed EAPOL re-authentication for sessions that used PMKSA caching
1771 reduce latency in EAPOL receive processing from about 100 ms to about
1852 received EAPOL frame due to incorrectly cancelled timeout
1856 * delay sending initial EAPOL-Start couple of seconds to speed up
1868 * use receipt of EAPOL-Key frame as a lower layer success indication
1871 * cleaned up internal EAPOL frame processing by not including link
1872 layer (Ethernet) header during WPA and EAPOL/EAP processing; this
1880 to be able to receive EAPOL frames with drivers that do not include
1934 * removed interface for external EAPOL/EAP supplicant (e.g.,
1974 specific TX/RX functions for EAPOL frames
1982 * driver_madwifi: fixed WPA/WPA2 mode configuration to allow EAPOL
2017 * fixed EAPOL-Key validation to drop packets with invalid Key Data
2088 (e.g., segfault when processing EAPOL-Key frames)
2243 * fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
2297 re-authentication by allowing unencrypted EAPOL frames when not using
2323 frontends: process pending EAPOL packets after getting new
2363 does not include key data in the EAPOL-Key frame (i.e., part of
2406 - EAPOL state machines for Supplicant [IEEE 802.1aa/D6.1]
2427 EAPOL-Key frames instead of WPA key handshakes)
2432 EAPOL-Key packets (this fixes 'Invalid EAPOL-Key MIC when using
2434 includes extra data after the EAPOL-Key)
2443 - EAPOL/EAP functions