OVMS3-idf/components/wpa_supplicant/src/rsn_supp
kapil.gupta fb53a454b9 ESP-WIFI: Optimize 4way handshake failure time
In case of wrong passpharse, AP will keep on sending 1/4 multiple
times which may take around 10 secs to disconnect and detect
wrong password event.

Add changes to reject EAPOL1 after 3 consecutive reception
2020-05-19 16:55:42 +05:30
..
pmksa_cache.c esp_wifi: Support for additional WPA3 testcases 2020-03-03 19:01:51 +05:30
pmksa_cache.h esp_wifi: Support for additional WPA3 testcases 2020-03-03 19:01:51 +05:30
wpa.c ESP-WIFI: Optimize 4way handshake failure time 2020-05-19 16:55:42 +05:30
wpa.h esp_wifi: Support for additional WPA3 testcases 2020-03-03 19:01:51 +05:30
wpa_i.h ESP-WIFI: Optimize 4way handshake failure time 2020-05-19 16:55:42 +05:30
wpa_ie.c esp_wifi: Support for additional WPA3 testcases 2020-03-03 19:01:51 +05:30
wpa_ie.h supplicant/esp_wifi: move supplicant to idf 2019-06-29 22:46:52 +08:00