/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.c | 311 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; in get_reauth_cb() local 317 reauth->permanent = data->db_tmp_identity; in get_reauth_cb() 319 reauth->counter = atoi(argv[i]); in get_reauth_cb() 321 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk)); in get_reauth_cb() 323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb() 324 sizeof(reauth->k_encr)); in get_reauth_cb() 326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb() 327 sizeof(reauth->k_aut)); in get_reauth_cb() 329 hexstr2bin(argv[i], reauth->k_re, in get_reauth_cb() 330 sizeof(reauth->k_re)); in get_reauth_cb() [all …]
|
D | eap_server_sim.c | 36 struct eap_sim_reauth *reauth; member 298 if (data->reauth) { in eap_sim_build_notification() 460 data->reauth = eap_sim_db_get_reauth_entry( in eap_sim_process_start() 463 if (data->reauth == NULL) { in eap_sim_process_start() 470 os_strlcpy(data->permanent, data->reauth->permanent, in eap_sim_process_start() 472 data->counter = data->reauth->counter; in eap_sim_process_start() 473 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_sim_process_start() 521 data->reauth = NULL; in eap_sim_process_start() 671 eap_sim_db_remove_reauth(sm->eap_sim_db_priv, data->reauth); in eap_sim_process_reauth() 672 data->reauth = NULL; in eap_sim_process_reauth() [all …]
|
D | eap_server_aka.c | 40 struct eap_sim_reauth *reauth; member 102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv, in eap_aka_check_identity_reauth() 104 if (data->reauth == NULL) { in eap_aka_check_identity_reauth() 112 os_strlcpy(data->permanent, data->reauth->permanent, in eap_aka_check_identity_reauth() 114 data->counter = data->reauth->counter; in eap_aka_check_identity_reauth() 116 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth() 118 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth() 120 os_memcpy(data->k_re, data->reauth->k_re, in eap_aka_check_identity_reauth() 123 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_aka_check_identity_reauth() 601 if (data->reauth) { in eap_aka_build_notification() [all …]
|
D | eap_sim_db.h | 83 struct eap_sim_reauth *reauth);
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sim.c | 41 int reauth; member 149 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth) in eap_sim_clear_keys() argument 151 if (!reauth) { in eap_sim_clear_keys() 500 data->reauth = 0; in eap_sim_response_start() 504 data->reauth = 1; in eap_sim_response_start() 523 if (!data->reauth) { in eap_sim_response_start() 616 if (k_aut && data->reauth) { in eap_sim_response_notification() 727 data->reauth = 0; in eap_sim_process_challenge() 900 if (data->reauth && in eap_sim_process_notification_auth() 963 data->reauth = 1; in eap_sim_process_reauthentication()
|
D | eap_aka.c | 40 int reauth; member 147 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth) in eap_aka_clear_keys() argument 149 if (!reauth) { in eap_aka_clear_keys() 630 data->reauth = 0; in eap_aka_response_identity() 634 data->reauth = 1; in eap_aka_response_identity() 740 if (k_aut && data->reauth) { in eap_aka_response_notification() 991 data->reauth = 0; in eap_aka_process_challenge() 1160 if (data->reauth && in eap_aka_process_notification_auth() 1232 data->reauth = 1; in eap_aka_process_reauthentication()
|
D | eap_peap.c | 56 int reauth; /* reauthentication */ member 270 data->reauth, resumed, data->phase2_eap_started, in eap_peap_derive_cmk() 272 if (data->reauth && !data->phase2_eap_started && resumed) { in eap_peap_derive_cmk() 1206 data->reauth = 1; in eap_peap_init_for_reauth()
|
D | eap_ttls.c | 56 int reauth; /* reauthentication */ member 1377 if (data->reauth && in eap_ttls_phase2_start() 1702 data->reauth = 1; in eap_ttls_init_for_reauth()
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.txt | 67 pseudonyms and reauth information into a SQLite database. This is
|
D | ChangeLog | 401 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id 412 and reauth data 982 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
|
D | wpa_common.c | 526 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, in fils_pmkid_erp() argument 535 addr[0] = reauth; in fils_pmkid_erp()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | README-HS20 | 490 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
|