Searched refs:eap_if (Results 1 – 8 of 8) sorted by relevance
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server.c | 228 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { in SM_STATE() 238 sm->eap_if.eapSuccess = FALSE; in SM_STATE() 239 sm->eap_if.eapFail = FALSE; in SM_STATE() 240 sm->eap_if.eapTimeout = FALSE; in SM_STATE() 241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 242 sm->eap_if.eapKeyData = NULL; in SM_STATE() 243 sm->eap_if.eapKeyDataLen = 0; in SM_STATE() 244 os_free(sm->eap_if.eapSessionId); in SM_STATE() 245 sm->eap_if.eapSessionId = NULL; in SM_STATE() 246 sm->eap_if.eapSessionIdLen = 0; in SM_STATE() [all …]
|
D | eap_i.h | 126 struct eap_eapol_interface eap_if; member
|
/external/wpa_supplicant_8/src/eapol_auth/ |
D | eapol_auth_sm.c | 108 if (sm->eap_if->eapReqData == NULL || in eapol_auth_tx_req() 109 wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) { in eapol_auth_tx_req() 124 sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData); in eapol_auth_tx_req() 130 wpabuf_head(sm->eap_if->eapReqData), in eapol_auth_tx_req() 131 wpabuf_len(sm->eap_if->eapReqData)); in eapol_auth_tx_req() 133 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) in eapol_auth_tx_req() 179 if (state->eap_if->retransWhile > 0) { in eapol_port_timers_tick() 180 state->eap_if->retransWhile--; in eapol_port_timers_tick() 181 if (state->eap_if->retransWhile == 0) { in eapol_port_timers_tick() 254 sm->eap_if->eapRestart = TRUE; in SM_STATE() [all …]
|
D | eapol_auth_dump.c | 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 166 _SB(sm->eap_if->eapSuccess), in eapol_auth_dump_state() 167 _SB(sm->eap_if->eapTimeout), in eapol_auth_dump_state() 169 _SB(sm->eap_if->eapKeyAvailable), in eapol_auth_dump_state() 173 _SB(sm->eap_if->portEnabled), in eapol_auth_dump_state() 203 _SB(sm->eap_if->eapRestart), in eapol_auth_dump_state() 234 _SB(sm->eap_if->eapNoReq), in eapol_auth_dump_state() 235 _SB(sm->eap_if->eapReq), in eapol_auth_dump_state() 236 _SB(sm->eap_if->eapResp), in eapol_auth_dump_state()
|
D | eapol_auth_sm_i.h | 148 struct eap_eapol_interface *eap_if; member
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_1x.c | 178 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 193 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 202 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 220 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 755 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_response() 756 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_response() 787 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_initiate() 788 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_initiate() 1011 sta->eapol_sm->eap_if->portEnabled = TRUE; in ieee802_1x_receive() 1162 sta->eapol_sm->eap_if->portEnabled = TRUE; in ieee802_1x_new_station() [all …]
|
D | wpa_auth_glue.c | 208 sta->eapol_sm->eap_if->eapKeyAvailable = in hostapd_wpa_auth_set_eapol() 234 return sta->eapol_sm->eap_if->eapKeyAvailable; in hostapd_wpa_auth_get_eapol()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 80 struct eap_eapol_interface *eap_if; member 711 sess->eap_if = eap_get_interface(sess->eap); in radius_server_get_new_session() 712 sess->eap_if->eapRestart = TRUE; in radius_server_get_new_session() 713 sess->eap_if->portEnabled = TRUE; in radius_server_get_new_session() 732 if (sess->eap_if->eapFail) { in radius_server_encapsulate_eap() 733 sess->eap_if->eapFail = FALSE; in radius_server_encapsulate_eap() 735 } else if (sess->eap_if->eapSuccess) { in radius_server_encapsulate_eap() 736 sess->eap_if->eapSuccess = FALSE; in radius_server_encapsulate_eap() 739 sess->eap_if->eapReq = FALSE; in radius_server_encapsulate_eap() 756 if (sess->eap_if->eapReqData && in radius_server_encapsulate_eap() [all …]
|