/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server.c | 225 if (sm->eap_if.eapRestart && !sm->cfg->eap_server && sm->identity) { in SM_STATE() 235 sm->eap_if.eapSuccess = false; in SM_STATE() 236 sm->eap_if.eapFail = false; in SM_STATE() 237 sm->eap_if.eapTimeout = false; in SM_STATE() 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 239 sm->eap_if.eapKeyData = NULL; in SM_STATE() 240 sm->eap_if.eapKeyDataLen = 0; in SM_STATE() 241 os_free(sm->eap_if.eapSessionId); in SM_STATE() 242 sm->eap_if.eapSessionId = NULL; in SM_STATE() 243 sm->eap_if.eapSessionIdLen = 0; in SM_STATE() [all …]
|
D | eap_i.h | 125 struct eap_eapol_interface eap_if; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server.c | 225 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { in SM_STATE() 235 sm->eap_if.eapSuccess = FALSE; in SM_STATE() 236 sm->eap_if.eapFail = FALSE; in SM_STATE() 237 sm->eap_if.eapTimeout = FALSE; in SM_STATE() 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 239 sm->eap_if.eapKeyData = NULL; in SM_STATE() 240 sm->eap_if.eapKeyDataLen = 0; in SM_STATE() 241 os_free(sm->eap_if.eapSessionId); in SM_STATE() 242 sm->eap_if.eapSessionId = NULL; in SM_STATE() 243 sm->eap_if.eapSessionIdLen = 0; in SM_STATE() [all …]
|
D | eap_i.h | 126 struct eap_eapol_interface eap_if; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_auth/ |
D | eapol_auth_sm.c | 109 if (sm->eap_if->eapReqData == NULL || in eapol_auth_tx_req() 110 wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) { in eapol_auth_tx_req() 125 sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData); in eapol_auth_tx_req() 131 wpabuf_head(sm->eap_if->eapReqData), in eapol_auth_tx_req() 132 wpabuf_len(sm->eap_if->eapReqData)); in eapol_auth_tx_req() 134 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) in eapol_auth_tx_req() 180 if (state->eap_if->retransWhile > 0) { in eapol_port_timers_tick() 181 state->eap_if->retransWhile--; in eapol_port_timers_tick() 182 if (state->eap_if->retransWhile == 0) { in eapol_port_timers_tick() 255 sm->eap_if->eapRestart = true; in SM_STATE() [all …]
|
D | eapol_auth_dump.c | 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 166 _SB(sm->eap_if->eapSuccess), in eapol_auth_dump_state() 167 _SB(sm->eap_if->eapTimeout), in eapol_auth_dump_state() 169 _SB(sm->eap_if->eapKeyAvailable), in eapol_auth_dump_state() 173 _SB(sm->eap_if->portEnabled), in eapol_auth_dump_state() 203 _SB(sm->eap_if->eapRestart), in eapol_auth_dump_state() 234 _SB(sm->eap_if->eapNoReq), in eapol_auth_dump_state() 235 _SB(sm->eap_if->eapReq), in eapol_auth_dump_state() 236 _SB(sm->eap_if->eapResp), in eapol_auth_dump_state()
|
D | eapol_auth_sm_i.h | 148 struct eap_eapol_interface *eap_if; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_auth/ |
D | eapol_auth_sm.c | 108 if (sm->eap_if->eapReqData == NULL || in eapol_auth_tx_req() 109 wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) { in eapol_auth_tx_req() 124 sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData); in eapol_auth_tx_req() 130 wpabuf_head(sm->eap_if->eapReqData), in eapol_auth_tx_req() 131 wpabuf_len(sm->eap_if->eapReqData)); in eapol_auth_tx_req() 133 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) in eapol_auth_tx_req() 179 if (state->eap_if->retransWhile > 0) { in eapol_port_timers_tick() 180 state->eap_if->retransWhile--; in eapol_port_timers_tick() 181 if (state->eap_if->retransWhile == 0) { in eapol_port_timers_tick() 254 sm->eap_if->eapRestart = TRUE; in SM_STATE() [all …]
|
D | eapol_auth_dump.c | 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 166 _SB(sm->eap_if->eapSuccess), in eapol_auth_dump_state() 167 _SB(sm->eap_if->eapTimeout), in eapol_auth_dump_state() 169 _SB(sm->eap_if->eapKeyAvailable), in eapol_auth_dump_state() 173 _SB(sm->eap_if->portEnabled), in eapol_auth_dump_state() 203 _SB(sm->eap_if->eapRestart), in eapol_auth_dump_state() 234 _SB(sm->eap_if->eapNoReq), in eapol_auth_dump_state() 235 _SB(sm->eap_if->eapReq), in eapol_auth_dump_state() 236 _SB(sm->eap_if->eapResp), in eapol_auth_dump_state()
|
D | eapol_auth_sm_i.h | 148 struct eap_eapol_interface *eap_if; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_1x.c | 201 if (!sm->eap_if->eapKeyData || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 247 if (!sm || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 879 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_response() 880 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_response() 910 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_initiate() 911 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_initiate() 1143 sta->eapol_sm->eap_if->portEnabled = true; in ieee802_1x_receive() 1300 sta->eapol_sm->eap_if->portEnabled = true; in ieee802_1x_new_station() [all …]
|
D | wpa_auth_glue.c | 298 sta->eapol_sm->eap_if->eapKeyAvailable = value; in hostapd_wpa_auth_set_eapol() 323 return sta->eapol_sm->eap_if->eapKeyAvailable; in hostapd_wpa_auth_get_eapol()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | ieee802_1x.c | 201 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 247 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 878 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_response() 879 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_response() 910 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_initiate() 911 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_initiate() 1134 sta->eapol_sm->eap_if->portEnabled = TRUE; in ieee802_1x_receive() 1292 sta->eapol_sm->eap_if->portEnabled = TRUE; in ieee802_1x_new_station() [all …]
|
D | wpa_auth_glue.c | 218 sta->eapol_sm->eap_if->eapKeyAvailable = in hostapd_wpa_auth_set_eapol() 244 return sta->eapol_sm->eap_if->eapKeyAvailable; in hostapd_wpa_auth_get_eapol()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 75 struct eap_eapol_interface *eap_if; member 654 sess->eap_if = eap_get_interface(sess->eap); in radius_server_get_new_session() 655 sess->eap_if->eapRestart = true; in radius_server_get_new_session() 656 sess->eap_if->portEnabled = true; in radius_server_get_new_session() 906 if (sess->eap_if->eapFail) { in radius_server_encapsulate_eap() 907 sess->eap_if->eapFail = false; in radius_server_encapsulate_eap() 909 } else if (sess->eap_if->eapSuccess) { in radius_server_encapsulate_eap() 910 sess->eap_if->eapSuccess = false; in radius_server_encapsulate_eap() 913 sess->eap_if->eapReq = false; in radius_server_encapsulate_eap() 930 if (sess->eap_if->eapReqData && in radius_server_encapsulate_eap() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 80 struct eap_eapol_interface *eap_if; member 821 sess->eap_if = eap_get_interface(sess->eap); in radius_server_get_new_session() 822 sess->eap_if->eapRestart = TRUE; in radius_server_get_new_session() 823 sess->eap_if->portEnabled = TRUE; in radius_server_get_new_session() 1073 if (sess->eap_if->eapFail) { in radius_server_encapsulate_eap() 1074 sess->eap_if->eapFail = FALSE; in radius_server_encapsulate_eap() 1076 } else if (sess->eap_if->eapSuccess) { in radius_server_encapsulate_eap() 1077 sess->eap_if->eapSuccess = FALSE; in radius_server_encapsulate_eap() 1080 sess->eap_if->eapReq = FALSE; in radius_server_encapsulate_eap() 1097 if (sess->eap_if->eapReqData && in radius_server_encapsulate_eap() [all …]
|