Home
last modified time | relevance | path

Searched refs:reauth (Results 1 – 13 of 13) sorted by relevance

/external/wpa_supplicant_8/src/eap_server/
Deap_server_sim.c37 struct eap_sim_reauth *reauth; member
315 if (data->reauth) { in eap_sim_build_notification()
477 data->reauth = eap_sim_db_get_reauth_entry( in eap_sim_process_start()
480 if (data->reauth == NULL) { in eap_sim_process_start()
487 os_strlcpy(data->permanent, data->reauth->permanent, in eap_sim_process_start()
489 data->counter = data->reauth->counter; in eap_sim_process_start()
490 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_sim_process_start()
538 data->reauth = NULL; in eap_sim_process_start()
690 data->reauth); in eap_sim_process_reauth()
691 data->reauth = NULL; in eap_sim_process_reauth()
[all …]
Deap_server_aka.c41 struct eap_sim_reauth *reauth; member
103 data->reauth = eap_sim_db_get_reauth_entry(sm->cfg->eap_sim_db_priv, in eap_aka_check_identity_reauth()
105 if (data->reauth == NULL) { in eap_aka_check_identity_reauth()
113 os_strlcpy(data->permanent, data->reauth->permanent, in eap_aka_check_identity_reauth()
115 data->counter = data->reauth->counter; in eap_aka_check_identity_reauth()
117 os_memcpy(data->k_encr, data->reauth->k_encr, in eap_aka_check_identity_reauth()
119 os_memcpy(data->k_aut, data->reauth->k_aut, in eap_aka_check_identity_reauth()
121 os_memcpy(data->k_re, data->reauth->k_re, in eap_aka_check_identity_reauth()
124 os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN); in eap_aka_check_identity_reauth()
618 if (data->reauth) { in eap_aka_build_notification()
[all …]
Deap_sim_db.c311 struct eap_sim_reauth *reauth = &data->db_tmp_reauth; in get_reauth_cb() local
317 reauth->permanent = data->db_tmp_identity; in get_reauth_cb()
319 reauth->counter = atoi(argv[i]); in get_reauth_cb()
321 hexstr2bin(argv[i], reauth->mk, sizeof(reauth->mk)); in get_reauth_cb()
323 hexstr2bin(argv[i], reauth->k_encr, in get_reauth_cb()
324 sizeof(reauth->k_encr)); in get_reauth_cb()
326 hexstr2bin(argv[i], reauth->k_aut, in get_reauth_cb()
327 sizeof(reauth->k_aut)); in get_reauth_cb()
329 hexstr2bin(argv[i], reauth->k_re, in get_reauth_cb()
330 sizeof(reauth->k_re)); in get_reauth_cb()
[all …]
Deap_sim_db.h83 struct eap_sim_reauth *reauth);
/external/wpa_supplicant_8/src/eap_peer/
Deap_sim.c42 int reauth; member
142 static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth) in eap_sim_clear_keys() argument
144 if (!reauth) { in eap_sim_clear_keys()
493 data->reauth = 0; in eap_sim_response_start()
497 data->reauth = 1; in eap_sim_response_start()
529 if (!data->reauth) { in eap_sim_response_start()
618 if (k_aut && data->reauth) { in eap_sim_response_notification()
736 data->reauth = 0; in eap_sim_process_challenge()
916 if (data->reauth && in eap_sim_process_notification_auth()
979 data->reauth = 1; in eap_sim_process_reauthentication()
[all …]
Deap_aka.c41 int reauth; member
138 static void eap_aka_clear_keys(struct eap_aka_data *data, int reauth) in eap_aka_clear_keys() argument
140 if (!reauth) { in eap_aka_clear_keys()
629 data->reauth = 0; in eap_aka_response_identity()
633 data->reauth = 1; in eap_aka_response_identity()
746 if (k_aut && data->reauth) { in eap_aka_response_notification()
1007 data->reauth = 0; in eap_aka_process_challenge()
1183 if (data->reauth && in eap_aka_process_notification_auth()
1260 data->reauth = 1; in eap_aka_process_reauthentication()
1547 if (!data->reauth) in eap_aka_get_session_id()
[all …]
Deap_peap.c56 int reauth; /* reauthentication */ member
270 data->reauth, resumed, data->phase2_eap_started, in eap_peap_derive_cmk()
272 if (data->reauth && !data->phase2_eap_started && resumed) { in eap_peap_derive_cmk()
1239 data->reauth = 1; in eap_peap_init_for_reauth()
Deap_ttls.c56 int reauth; /* reauthentication */ member
1406 if (data->reauth && in eap_ttls_phase2_start()
1746 data->reauth = 1; in eap_ttls_init_for_reauth()
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.txt67 pseudonyms and reauth information into a SQLite database. This is
DChangeLog480 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id
491 and reauth data
1061 * driver_madwifi: fixed pairwise key removal to allow WPA reauth
/external/wpa_supplicant_8/src/common/
Dwpa_common.h396 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len,
Dwpa_common.c566 int fils_pmkid_erp(int akmp, const u8 *reauth, size_t reauth_len, in fils_pmkid_erp() argument
575 addr[0] = reauth; in fils_pmkid_erp()
/external/wpa_supplicant_8/wpa_supplicant/
DREADME-HS20490 <3>CTRL-EVENT-CONNECTED - Connection to 02:00:00:00:01:00 completed (reauth) [id=0 id_str=]