HomeSort by relevance Sort by last modified time
    Searched full:reauth (Results 1 - 19 of 19) sorted by null

  /external/chromium_org/chrome/browser/ui/sync/
signin_histogram.h 10 // Enum values used for use with the "Signin.Reauth" histogram.
12 // The user gave the wrong email when doing a reauth.
15 // The user given a reauth login screen.
one_click_signin_helper.cc 715 UMA_HISTOGRAM_ENUMERATION("Signin.Reauth",
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
36 struct eap_sim_reauth *reauth; member in struct:eap_sim_data
51 case REAUTH:
52 return "REAUTH";
131 /* Reauth id may have expired - try fullauth */
298 if (data->reauth) {
333 case REAUTH:
383 case REAUTH:
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
460 data->reauth = eap_sim_db_get_reauth_entry
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
40 struct eap_sim_reauth *reauth; member in struct:eap_aka_data
67 case REAUTH:
68 return "REAUTH";
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv,
104 if (data->reauth == NULL) {
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
112 os_strlcpy(data->permanent, data->reauth->permanent,
114 data->counter = data->reauth->counter
    [all...]
eap_sim_db.c 115 "CREATE TABLE reauth("
126 "reauth information");
154 if (!db_table_exists(db, "reauth") &&
253 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth "
307 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; local
313 reauth->permanent = data->db_tmp_identity;
315 reauth->counter = atoi(argv[i]);
317 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk));
319 hexstr2bin(argv[i], reauth->k_encr
    [all...]
eap_sim_db.h 83 struct eap_sim_reauth *reauth);
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 41 int reauth; member in struct:eap_sim_data
384 data->reauth = 0;
388 data->reauth = 1;
407 if (!data->reauth) {
499 if (k_aut && data->reauth) {
610 data->reauth = 0;
682 * other words, if no new reauth identity is received, full
712 * reauth verification. */
726 "reauth did not include encrypted data");
741 "message does not match with counter in reauth "
    [all...]
eap_aka.c 40 int reauth; member in struct:eap_aka_data
495 data->reauth = 0;
499 data->reauth = 1;
604 if (k_aut && data->reauth) {
842 data->reauth = 0;
943 * reauth verification. */
957 "reauth did not include encrypted data");
972 "message does not match with counter in reauth "
999 if (data->reauth &&
1002 "message after reauth");
    [all...]
eap_ttls.c 55 int reauth; /* reauthentication */ member in struct:eap_ttls_data
    [all...]
eap_peap.c 57 int reauth; /* reauthentication */ member in struct:eap_peap_data
261 if (data->reauth &&
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.txt 67 pseudonyms and reauth information into a SQLite database. This is
ChangeLog 55 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id
66 and reauth data
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
parallel_authenticator.cc 448 NOTREACHED(); // Shouldn't be here at all, if online reauth isn't done!
  /external/chromium_org/chrome/browser/ui/webui/
sync_setup_handler.cc 506 UMA_HISTOGRAM_ENUMERATION("Signin.Reauth",
    [all...]
  /external/wpa_supplicant_8/src/ap/
sta_info.c 703 * During 1x reauth, if the vlan id changes, then remove the old id and
  /external/wpa_supplicant_8/wpa_supplicant/
README-HS20 384 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
  /frameworks/base/wifi/java/android/net/wifi/
WifiMonitor.java 168 * CTRL-EVENT-CONNECTED - Connection to 00:1e:58:ec:d5:6d completed (reauth) [id=1 id_str=]</pre>
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c     [all...]

Completed in 316 milliseconds