/external/chromium_org/chrome/browser/ui/sync/ |
signin_histogram.h | 10 // Enum values used for use with the "Signin.Reauth" histogram. 12 // The user gave the wrong email when doing a reauth. 15 // The user given a reauth login screen.
|
one_click_signin_helper.cc | 715 UMA_HISTOGRAM_ENUMERATION("Signin.Reauth", [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 36 struct eap_sim_reauth *reauth; member in struct:eap_sim_data 51 case REAUTH: 52 return "REAUTH"; 131 /* Reauth id may have expired - try fullauth */ 298 if (data->reauth) { 333 case REAUTH: 383 case REAUTH: 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 460 data->reauth = eap_sim_db_get_reauth_entry [all...] |
eap_server_aka.c | 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 40 struct eap_sim_reauth *reauth; member in struct:eap_aka_data 67 case REAUTH: 68 return "REAUTH"; 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv, 104 if (data->reauth == NULL) { 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 112 os_strlcpy(data->permanent, data->reauth->permanent, 114 data->counter = data->reauth->counter [all...] |
eap_sim_db.c | 115 "CREATE TABLE reauth(" 126 "reauth information"); 154 if (!db_table_exists(db, "reauth") && 253 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth " 307 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; local 313 reauth->permanent = data->db_tmp_identity; 315 reauth->counter = atoi(argv[i]); 317 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk)); 319 hexstr2bin(argv[i], reauth->k_encr [all...] |
eap_sim_db.h | 83 struct eap_sim_reauth *reauth);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 41 int reauth; member in struct:eap_sim_data 384 data->reauth = 0; 388 data->reauth = 1; 407 if (!data->reauth) { 499 if (k_aut && data->reauth) { 610 data->reauth = 0; 682 * other words, if no new reauth identity is received, full 712 * reauth verification. */ 726 "reauth did not include encrypted data"); 741 "message does not match with counter in reauth " [all...] |
eap_aka.c | 40 int reauth; member in struct:eap_aka_data 495 data->reauth = 0; 499 data->reauth = 1; 604 if (k_aut && data->reauth) { 842 data->reauth = 0; 943 * reauth verification. */ 957 "reauth did not include encrypted data"); 972 "message does not match with counter in reauth " 999 if (data->reauth && 1002 "message after reauth"); [all...] |
eap_ttls.c | 55 int reauth; /* reauthentication */ member in struct:eap_ttls_data [all...] |
eap_peap.c | 57 int reauth; /* reauthentication */ member in struct:eap_peap_data 261 if (data->reauth && [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.txt | 67 pseudonyms and reauth information into a SQLite database. This is
|
ChangeLog | 55 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id 66 and reauth data [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
parallel_authenticator.cc | 448 NOTREACHED(); // Shouldn't be here at all, if online reauth isn't done!
|
/external/chromium_org/chrome/browser/ui/webui/ |
sync_setup_handler.cc | 506 UMA_HISTOGRAM_ENUMERATION("Signin.Reauth", [all...] |
/external/wpa_supplicant_8/src/ap/ |
sta_info.c | 703 * During 1x reauth, if the vlan id changes, then remove the old id and
|
/external/wpa_supplicant_8/wpa_supplicant/ |
README-HS20 | 384 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
|
/frameworks/base/wifi/java/android/net/wifi/ |
WifiMonitor.java | 168 * CTRL-EVENT-CONNECTED - Connection to 00:1e:58:ec:d5:6d completed (reauth) [id=1 id_str=]</pre> [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | [all...] |