/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 119 "CREATE TABLE reauth(" 130 "reauth information"); 158 if (!db_table_exists(db, "reauth") && 257 pos += os_snprintf(pos, end - pos, "INSERT OR REPLACE INTO reauth " 311 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; local 317 reauth->permanent = data->db_tmp_identity; 319 reauth->counter = atoi(argv[i]); 321 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk)); 323 hexstr2bin(argv[i], reauth->k_encr [all...] |
eap_sim_db.h | 83 struct eap_sim_reauth *reauth);
|
eap_server_sim.c | 31 START, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 36 struct eap_sim_reauth *reauth; member in struct:eap_sim_data 51 case REAUTH: 52 return "REAUTH"; 131 /* Reauth id may have expired - try fullauth */ 298 if (data->reauth) { 333 case REAUTH: 383 case REAUTH: 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 460 data->reauth = eap_sim_db_get_reauth_entry [all...] |
eap_server_aka.c | 35 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 40 struct eap_sim_reauth *reauth; member in struct:eap_aka_data 67 case REAUTH: 68 return "REAUTH"; 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv, 104 if (data->reauth == NULL) { 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 112 os_strlcpy(data->permanent, data->reauth->permanent, 114 data->counter = data->reauth->counter [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sim.c | 41 int reauth; member in struct:eap_sim_data 135 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth) 137 if (!reauth) { 486 data->reauth = 0; 490 data->reauth = 1; 509 if (!data->reauth) { 602 if (k_aut && data->reauth) { 714 data->reauth = 0; 791 * other words, if no new reauth identity is received, full 821 * reauth verification. * [all...] |
eap_aka.c | 40 int reauth; member in struct:eap_aka_data 131 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth) 133 if (!reauth) { 605 data->reauth = 0; 609 data->reauth = 1; 715 if (k_aut && data->reauth) { 953 data->reauth = 0; 1057 * reauth verification. */ 1071 "reauth did not include encrypted data"); 1086 "message does not match with counter in reauth " [all...] |
eap_peap.c | 56 int reauth; /* reauthentication */ member in struct:eap_peap_data 269 "EAP-PEAP: CMK derivation - reauth=%d resumed=%d phase2_eap_started=%d phase2_success=%d", 270 data->reauth, resumed, data->phase2_eap_started, 272 if (data->reauth && !data->phase2_eap_started && resumed) { [all...] |
eap_ttls.c | 56 int reauth; /* reauthentication */ member in struct:eap_ttls_data [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 342 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
|
wpa_common.c | 280 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, 288 /* PMKID = Truncate-128(Hash(EAP-Initiate/Reauth)) */ 289 addr[0] = reauth; [all...] |