HomeSort by relevance Sort by last modified time
    Searched full:reauth (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
36 struct eap_sim_reauth *reauth; member in struct:eap_sim_data
51 case REAUTH:
52 return "REAUTH";
131 /* Reauth id may have expired - try fullauth */
298 if (data->reauth) {
333 case REAUTH:
383 case REAUTH:
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
460 data->reauth = eap_sim_db_get_reauth_entry
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
40 struct eap_sim_reauth *reauth; member in struct:eap_aka_data
67 case REAUTH:
68 return "REAUTH";
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv,
104 if (data->reauth == NULL) {
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
112 os_strlcpy(data->permanent, data->reauth->permanent,
114 data->counter = data->reauth->counter
    [all...]
eap_sim_db.c 114 "CREATE TABLE reauth("
125 "reauth information");
153 if (!db_table_exists(db, "reauth") &&
252 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth "
306 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; local
312 reauth->permanent = data->db_tmp_identity;
314 reauth->counter = atoi(argv[i]);
316 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk));
318 hexstr2bin(argv[i], reauth->k_encr
    [all...]
eap_sim_db.h 83 struct eap_sim_reauth *reauth);
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 41 int reauth; member in struct:eap_sim_data
133 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth)
135 if (!reauth) {
479 data->reauth = 0;
483 data->reauth = 1;
502 if (!data->reauth) {
595 if (k_aut && data->reauth) {
707 data->reauth = 0;
784 * other words, if no new reauth identity is received, full
814 * reauth verification. *
    [all...]
eap_aka.c 40 int reauth; member in struct:eap_aka_data
129 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth)
131 if (!reauth) {
600 data->reauth = 0;
604 data->reauth = 1;
710 if (k_aut && data->reauth) {
948 data->reauth = 0;
1052 * reauth verification. */
1066 "reauth did not include encrypted data");
1081 "message does not match with counter in reauth "
    [all...]
eap_peap.c 56 int reauth; /* reauthentication */ member in struct:eap_peap_data
269 if (data->reauth &&
    [all...]
eap_ttls.c 55 int reauth; /* reauthentication */ member in struct:eap_ttls_data
    [all...]
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.txt 67 pseudonyms and reauth information into a SQLite database. This is
ChangeLog 237 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id
248 and reauth data
    [all...]
  /external/tcpdump/
print-eap.c 153 { EAP_AKA_REAUTH, "Reauth" },
  /external/wpa_supplicant_8/wpa_supplicant/
README-HS20 475 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
  /external/wpa_supplicant_8/src/ap/
sta_info.c 896 /* During 1x reauth, if the vlan id changes, then remove the old id. */
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth");
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/
WifiMonitor.java 235 * CTRL-EVENT-CONNECTED - Connection to 00:1e:58:ec:d5:6d completed (reauth) [id=1 id_str=]</pre>
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c     [all...]

Completed in 4435 milliseconds