esp-idf/components/wpa_supplicant
kapil.gupta 2c995da190 ESP-WIFI: Optimize 4way handshake failure time
In case of wrong passpharse, AP will keep on sending 1/4 multiple
times which may take around 10 secs to disconnect and detect
wrong password event.

Add changes to reject EAPOL1 after 3 consecutive reception
2020-11-20 19:33:43 +08:00
..
include esp_wifi: Support for additional WPA3 testcases 2020-03-05 12:15:03 +05:30
port wpa_supplicant: Support for mbedtls tls handshake 2020-10-13 08:09:00 +00:00
src ESP-WIFI: Optimize 4way handshake failure time 2020-11-20 19:33:43 +08:00
test hw crypto: activated hardware acceleration for esp32s2beta 2019-12-12 12:37:29 +08:00
CMakeLists.txt Merge branch 'feature/esp_tls_for_supplicant_v4.1' into 'release/v4.1' 2020-10-28 19:29:55 +08:00
component.mk wpa_supplicant: Support for mbedtls tls handshake 2020-10-13 08:09:00 +00:00
COPYING wpa_supplicant: replace pre-built crypto library with source code 2016-11-04 14:58:47 +08:00
Kconfig wpa_supplicant: WPS Inter operatability Fixes 2020-08-26 08:49:43 +00:00