Searched refs:eap_if (Results 1 – 8 of 8) sorted by relevance
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server.c | 225 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { in SM_STATE() 235 sm->eap_if.eapSuccess = FALSE; in SM_STATE() 236 sm->eap_if.eapFail = FALSE; in SM_STATE() 237 sm->eap_if.eapTimeout = FALSE; in SM_STATE() 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 239 sm->eap_if.eapKeyData = NULL; in SM_STATE() 240 sm->eap_if.eapKeyDataLen = 0; in SM_STATE() 241 os_free(sm->eap_if.eapSessionId); in SM_STATE() 242 sm->eap_if.eapSessionId = NULL; in SM_STATE() 243 sm->eap_if.eapSessionIdLen = 0; in SM_STATE() [all …]
|
D | eap_i.h | 126 struct eap_eapol_interface eap_if; member
|
/external/wpa_supplicant_8/src/eapol_auth/ |
D | eapol_auth_sm.c | 108 if (sm->eap_if->eapReqData == NULL || in eapol_auth_tx_req() 109 wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) { in eapol_auth_tx_req() 124 sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData); in eapol_auth_tx_req() 130 wpabuf_head(sm->eap_if->eapReqData), in eapol_auth_tx_req() 131 wpabuf_len(sm->eap_if->eapReqData)); in eapol_auth_tx_req() 133 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) in eapol_auth_tx_req() 179 if (state->eap_if->retransWhile > 0) { in eapol_port_timers_tick() 180 state->eap_if->retransWhile--; in eapol_port_timers_tick() 181 if (state->eap_if->retransWhile == 0) { in eapol_port_timers_tick() 254 sm->eap_if->eapRestart = TRUE; in SM_STATE() [all …]
|
D | eapol_auth_dump.c | 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 166 _SB(sm->eap_if->eapSuccess), in eapol_auth_dump_state() 167 _SB(sm->eap_if->eapTimeout), in eapol_auth_dump_state() 169 _SB(sm->eap_if->eapKeyAvailable), in eapol_auth_dump_state() 173 _SB(sm->eap_if->portEnabled), in eapol_auth_dump_state() 203 _SB(sm->eap_if->eapRestart), in eapol_auth_dump_state() 234 _SB(sm->eap_if->eapNoReq), in eapol_auth_dump_state() 235 _SB(sm->eap_if->eapReq), in eapol_auth_dump_state() 236 _SB(sm->eap_if->eapResp), in eapol_auth_dump_state()
|
D | eapol_auth_sm_i.h | 148 struct eap_eapol_interface *eap_if; member
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_1x.c | 178 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 193 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 202 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 220 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 791 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_response() 792 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_response() 823 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_initiate() 824 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_initiate() 1047 sta->eapol_sm->eap_if->portEnabled = TRUE; in ieee802_1x_receive() 1198 sta->eapol_sm->eap_if->portEnabled = TRUE; in ieee802_1x_new_station() [all …]
|
D | wpa_auth_glue.c | 214 sta->eapol_sm->eap_if->eapKeyAvailable = in hostapd_wpa_auth_set_eapol() 240 return sta->eapol_sm->eap_if->eapKeyAvailable; in hostapd_wpa_auth_get_eapol()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 80 struct eap_eapol_interface *eap_if; member 813 sess->eap_if = eap_get_interface(sess->eap); in radius_server_get_new_session() 814 sess->eap_if->eapRestart = TRUE; in radius_server_get_new_session() 815 sess->eap_if->portEnabled = TRUE; in radius_server_get_new_session() 1065 if (sess->eap_if->eapFail) { in radius_server_encapsulate_eap() 1066 sess->eap_if->eapFail = FALSE; in radius_server_encapsulate_eap() 1068 } else if (sess->eap_if->eapSuccess) { in radius_server_encapsulate_eap() 1069 sess->eap_if->eapSuccess = FALSE; in radius_server_encapsulate_eap() 1072 sess->eap_if->eapReq = FALSE; in radius_server_encapsulate_eap() 1089 if (sess->eap_if->eapReqData && in radius_server_encapsulate_eap() [all …]
|