/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sim.c | 37 struct eap_sim_reauth *reauth; member 315 if (data->reauth) { in eap_sim_build_notification() 477 data->reauth = eap_sim_db_get_reauth_entry( in eap_sim_process_start() 480 if (data->reauth == NULL) { in eap_sim_process_start() 487 os_strlcpy(data->permanent, data->reauth->permanent, in eap_sim_process_start() 489 data->counter = data->reauth->counter; in eap_sim_process_start() 490 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_sim_process_start() 538 data->reauth = NULL; in eap_sim_process_start() 690 data->reauth); in eap_sim_process_reauth() 691 data->reauth = NULL; in eap_sim_process_reauth() [all …]
|
D | eap_server_aka.c | 41 struct eap_sim_reauth *reauth; member 103 data->reauth = eap_sim_db_get_reauth_entry(sm->cfg->eap_sim_db_priv, in eap_aka_check_identity_reauth() 105 if (data->reauth == NULL) { in eap_aka_check_identity_reauth() 113 os_strlcpy(data->permanent, data->reauth->permanent, in eap_aka_check_identity_reauth() 115 data->counter = data->reauth->counter; in eap_aka_check_identity_reauth() 117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth() 119 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth() 121 os_memcpy(data->k_re, data->reauth->k_re, in eap_aka_check_identity_reauth() 124 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_aka_check_identity_reauth() 618 if (data->reauth) { in eap_aka_build_notification() [all …]
|
D | eap_sim_db.c | 311 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; in get_reauth_cb() local 317 reauth->permanent = data->db_tmp_identity; in get_reauth_cb() 319 reauth->counter = atoi(argv[i]); in get_reauth_cb() 321 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk)); in get_reauth_cb() 323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb() 324 sizeof(reauth->k_encr)); in get_reauth_cb() 326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb() 327 sizeof(reauth->k_aut)); in get_reauth_cb() 329 hexstr2bin(argv[i], reauth->k_re, in get_reauth_cb() 330 sizeof(reauth->k_re)); in get_reauth_cb() [all …]
|
D | eap_sim_db.h | 83 struct eap_sim_reauth *reauth);
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sim.c | 42 int reauth; member 142 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth) in eap_sim_clear_keys() argument 144 if (!reauth) { in eap_sim_clear_keys() 493 data->reauth = 0; in eap_sim_response_start() 497 data->reauth = 1; in eap_sim_response_start() 529 if (!data->reauth) { in eap_sim_response_start() 618 if (k_aut && data->reauth) { in eap_sim_response_notification() 736 data->reauth = 0; in eap_sim_process_challenge() 916 if (data->reauth && in eap_sim_process_notification_auth() 979 data->reauth = 1; in eap_sim_process_reauthentication() [all …]
|
D | eap_aka.c | 41 int reauth; member 138 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth) in eap_aka_clear_keys() argument 140 if (!reauth) { in eap_aka_clear_keys() 629 data->reauth = 0; in eap_aka_response_identity() 633 data->reauth = 1; in eap_aka_response_identity() 746 if (k_aut && data->reauth) { in eap_aka_response_notification() 1007 data->reauth = 0; in eap_aka_process_challenge() 1183 if (data->reauth && in eap_aka_process_notification_auth() 1260 data->reauth = 1; in eap_aka_process_reauthentication() 1547 if (!data->reauth) in eap_aka_get_session_id() [all …]
|
D | eap_peap.c | 56 int reauth; /* reauthentication */ member 270 data->reauth, resumed, data->phase2_eap_started, in eap_peap_derive_cmk() 272 if (data->reauth && !data->phase2_eap_started && resumed) { in eap_peap_derive_cmk() 1239 data->reauth = 1; in eap_peap_init_for_reauth()
|
D | eap_ttls.c | 56 int reauth; /* reauthentication */ member 1406 if (data->reauth && in eap_ttls_phase2_start() 1746 data->reauth = 1; in eap_ttls_init_for_reauth()
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.txt | 67 pseudonyms and reauth information into a SQLite database. This is
|
D | ChangeLog | 480 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id 491 and reauth data 1061 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 396 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
|
D | wpa_common.c | 566 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, in fils_pmkid_erp() argument 575 addr[0] = reauth; in fils_pmkid_erp()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | README-HS20 | 490 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]
|