Home
last modified time | relevance | path

Searched refs:reauth (Results 1 – 13 of 13) sorted by relevance

/external/wpa_supplicant_8/src/eap_server/
Deap_sim_db.c311 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; in get_reauth_cb() local
317 reauth->permanent = data->db_tmp_identity; in get_reauth_cb()
319 reauth->counter = atoi(argv[i]); in get_reauth_cb()
321 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk)); in get_reauth_cb()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb()
327 sizeof(reauth->k_aut)); in get_reauth_cb()
329 hexstr2bin(argv[i], reauth->k_re, in get_reauth_cb()
330 sizeof(reauth->k_re)); in get_reauth_cb()
[all …]
Deap_server_sim.c36 struct eap_sim_reauth *reauth; member
298 if (data->reauth) { in eap_sim_build_notification()
460 data->reauth = eap_sim_db_get_reauth_entry( in eap_sim_process_start()
463 if (data->reauth == NULL) { in eap_sim_process_start()
470 os_strlcpy(data->permanent, data->reauth->permanent, in eap_sim_process_start()
472 data->counter = data->reauth->counter; in eap_sim_process_start()
473 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_sim_process_start()
521 data->reauth = NULL; in eap_sim_process_start()
671 eap_sim_db_remove_reauth(sm->eap_sim_db_priv, data->reauth); in eap_sim_process_reauth()
672 data->reauth = NULL; in eap_sim_process_reauth()
[all …]
Deap_server_aka.c40 struct eap_sim_reauth *reauth; member
102 data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv, in eap_aka_check_identity_reauth()
104 if (data->reauth == NULL) { in eap_aka_check_identity_reauth()
112 os_strlcpy(data->permanent, data->reauth->permanent, in eap_aka_check_identity_reauth()
114 data->counter = data->reauth->counter; in eap_aka_check_identity_reauth()
116 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
118 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth()
120 os_memcpy(data->k_re, data->reauth->k_re, in eap_aka_check_identity_reauth()
123 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_aka_check_identity_reauth()
601 if (data->reauth) { in eap_aka_build_notification()
[all …]
Deap_sim_db.h83 struct eap_sim_reauth *reauth);
/external/wpa_supplicant_8/src/eap_peer/
Deap_sim.c41 int reauth; member
149 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth) in eap_sim_clear_keys() argument
151 if (!reauth) { in eap_sim_clear_keys()
500 data->reauth = 0; in eap_sim_response_start()
504 data->reauth = 1; in eap_sim_response_start()
523 if (!data->reauth) { in eap_sim_response_start()
616 if (k_aut && data->reauth) { in eap_sim_response_notification()
727 data->reauth = 0; in eap_sim_process_challenge()
900 if (data->reauth && in eap_sim_process_notification_auth()
963 data->reauth = 1; in eap_sim_process_reauthentication()
Deap_aka.c40 int reauth; member
147 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth) in eap_aka_clear_keys() argument
149 if (!reauth) { in eap_aka_clear_keys()
630 data->reauth = 0; in eap_aka_response_identity()
634 data->reauth = 1; in eap_aka_response_identity()
740 if (k_aut && data->reauth) { in eap_aka_response_notification()
991 data->reauth = 0; in eap_aka_process_challenge()
1160 if (data->reauth && in eap_aka_process_notification_auth()
1232 data->reauth = 1; in eap_aka_process_reauthentication()
Deap_peap.c56 int reauth; /* reauthentication */ member
270 data->reauth, resumed, data->phase2_eap_started, in eap_peap_derive_cmk()
272 if (data->reauth && !data->phase2_eap_started && resumed) { in eap_peap_derive_cmk()
1206 data->reauth = 1; in eap_peap_init_for_reauth()
Deap_ttls.c56 int reauth; /* reauthentication */ member
1377 if (data->reauth && in eap_ttls_phase2_start()
1702 data->reauth = 1; in eap_ttls_init_for_reauth()
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt67 pseudonyms and reauth information into a SQLite database. This is
DChangeLog401 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id
412 and reauth data
982 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
/external/wpa_supplicant_8/src/common/
Dwpa_common.h355 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
Dwpa_common.c526 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, in fils_pmkid_erp() argument
535 addr[0] = reauth; in fils_pmkid_erp()
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-HS20490 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]