/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 159 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 168 sm->eap_if.eapSuccess = FALSE; 169 sm->eap_if.eapFail = FALSE; 170 sm->eap_if.eapTimeout = FALSE; 171 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 172 sm->eap_if.eapKeyData = NULL; 173 sm->eap_if.eapKeyDataLen = 0; 174 sm->eap_if.eapKeyAvailable = FALSE; 175 sm->eap_if.eapRestart = FALSE [all...] |
eap_i.h | 112 struct eap_eapol_interface eap_if; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_dump.c | 164 _SB(sm->eap_if->eapFail), 166 _SB(sm->eap_if->eapSuccess), 167 _SB(sm->eap_if->eapTimeout), 169 _SB(sm->eap_if->eapKeyAvailable), 173 _SB(sm->eap_if->portEnabled), 203 _SB(sm->eap_if->eapRestart), 234 _SB(sm->eap_if->eapNoReq), 235 _SB(sm->eap_if->eapReq), 236 _SB(sm->eap_if->eapResp),
|
eapol_auth_sm.c | 107 if (sm->eap_if->eapReqData == NULL || 108 wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) { 123 sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData); 129 wpabuf_head(sm->eap_if->eapReqData), 130 wpabuf_len(sm->eap_if->eapReqData)); 132 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) 178 if (state->eap_if->retransWhile > 0) { 179 state->eap_if->retransWhile--; 180 if (state->eap_if->retransWhile == 0) { 241 sm->eap_if->eapRestart = TRUE [all...] |
eapol_auth_sm_i.h | 148 struct eap_eapol_interface *eap_if; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 75 struct eap_eapol_interface *eap_if; member in struct:radius_session 685 sess->eap_if = eap_get_interface(sess->eap); 686 sess->eap_if->eapRestart = TRUE; 687 sess->eap_if->portEnabled = TRUE; 706 if (sess->eap_if->eapFail) { 707 sess->eap_if->eapFail = FALSE; 709 } else if (sess->eap_if->eapSuccess) { 710 sess->eap_if->eapSuccess = FALSE; 713 sess->eap_if->eapReq = FALSE; 730 if (sess->eap_if->eapReqData & [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 156 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { 171 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 180 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, 198 if (sm == NULL || !sm->eap_if->eapKeyData) 694 wpabuf_free(sm->eap_if->eapRespData); 695 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); 878 sta->eapol_sm->eap_if->portEnabled = TRUE; 1026 sta->eapol_sm->eap_if->portEnabled = TRUE; 1036 sta->eapol_sm->eap_if->eapKeyAvailable = TRUE [all...] |
wpa_auth_glue.c | 174 sta->eapol_sm->eap_if->eapKeyAvailable = 200 return sta->eapol_sm->eap_if->eapKeyAvailable;
|