HomeSort by relevance Sort by last modified time
    Searched refs:reauth (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_sim_db.c 119 "CREATE TABLE reauth("
130 "reauth information");
158 if (!db_table_exists(db, "reauth") &&
257 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth "
311 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; local
317 reauth->permanent = data->db_tmp_identity;
319 reauth->counter = atoi(argv[i]);
321 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk));
323 hexstr2bin(argv[i], reauth->k_encr
    [all...]
eap_sim_db.h 83 struct eap_sim_reauth *reauth);
eap_server_sim.c 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
36 struct eap_sim_reauth *reauth; member in struct:eap_sim_data
51 case REAUTH:
52 return "REAUTH";
131 /* Reauth id may have expired - try fullauth */
298 if (data->reauth) {
333 case REAUTH:
383 case REAUTH:
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
460 data->reauth = eap_sim_db_get_reauth_entry
    [all...]
eap_server_aka.c 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
40 struct eap_sim_reauth *reauth; member in struct:eap_aka_data
67 case REAUTH:
68 return "REAUTH";
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv,
104 if (data->reauth == NULL) {
105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
112 os_strlcpy(data->permanent, data->reauth->permanent,
114 data->counter = data->reauth->counter
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 41 int reauth; member in struct:eap_sim_data
135 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth)
137 if (!reauth) {
486 data->reauth = 0;
490 data->reauth = 1;
509 if (!data->reauth) {
602 if (k_aut && data->reauth) {
714 data->reauth = 0;
791 * other words, if no new reauth identity is received, full
821 * reauth verification. *
    [all...]
eap_aka.c 40 int reauth; member in struct:eap_aka_data
131 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth)
133 if (!reauth) {
605 data->reauth = 0;
609 data->reauth = 1;
715 if (k_aut && data->reauth) {
953 data->reauth = 0;
1057 * reauth verification. */
1071 "reauth did not include encrypted data");
1086 "message does not match with counter in reauth "
    [all...]
eap_peap.c 56 int reauth; /* reauthentication */ member in struct:eap_peap_data
269 "EAP-PEAP: CMK derivation - reauth=%d resumed=%d phase2_eap_started=%d phase2_success=%d",
270 data->reauth, resumed, data->phase2_eap_started,
272 if (data->reauth && !data->phase2_eap_started && resumed) {
    [all...]
eap_ttls.c 56 int reauth; /* reauthentication */ member in struct:eap_ttls_data
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 342 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
wpa_common.c 280 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
288 /* PMKID = Truncate-128(Hash(EAP-Initiate/Reauth)) */
289 addr[0] = reauth;
    [all...]

Completed in 562 milliseconds