HomeSort by relevance Sort by last modified time
    Searched refs:eapFail (Results 1 - 6 of 6) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap.h 53 Boolean eapFail;
eap_server.c 143 sm->eap_if.eapFail = FALSE;
435 sm->eap_if.eapFail = TRUE;
585 sm->eap_if.eapFail = TRUE;
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 40 Boolean eapFail;
364 else if (sm->eapSuccess || sm->eapFail)
386 else if (sm->eapFail || (sm->keyDone && !sm->portValid))
550 * and SUCCESS based on eapFail and eapSuccess, respectively.
553 * eapFail which would mean that more than one of the
560 * either of eapSuccess or eapFail is set.
570 else if (sm->eapFail)
588 if (sm->eapFail && sm->suppStart)
601 else if (sm->eapFail)
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_dump.c 130 "%s authTimeout=%s authSuccess=%s eapFail=%s eapolEap=%s\n"
138 _SB(sm->eap_if->eapFail), _SB(sm->eapolEap),
eapol_auth_sm.c 400 sm->eap_if->eapSuccess || sm->eap_if->eapFail)
558 else if (sm->eap_if->eapFail) {
576 if (sm->eap_if->eapFail && sm->authStart)
  /external/wpa_supplicant_8/src/radius/
radius_server.c 550 if (sess->eap_if->eapFail) {
551 sess->eap_if->eapFail = FALSE;
639 struct eap_hdr eapfail; local
651 os_memset(&eapfail, 0, sizeof(eapfail));
652 eapfail.code = EAP_CODE_FAILURE;
653 eapfail.identifier = 0;
654 eapfail.length = host_to_be16(sizeof(eapfail));
656 if (!radius_msg_add_eap(msg, (u8 *) &eapfail, sizeof(eapfail)))
    [all...]

Completed in 818 milliseconds