Home | History | Annotate | Download | only in ap

Lines Matching defs:eap

19 #include "eap_server/eap.h"
281 const u8 *eap, size_t len)
287 eap[sizeof(struct eap_hdr)] != EAP_TYPE_IDENTITY)
290 identity = eap_get_identity(sm->eap, &identity_len);
538 const u8 *eap, size_t len)
546 ieee802_1x_learn_identity(hapd, sm, eap, len);
548 wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS "
582 if (eap && !radius_msg_add_eap(msg, eap, len)) {
583 wpa_printf(MSG_INFO, "Could not add EAP-Message");
669 struct sta_info *sta, struct eap_hdr *eap,
677 data = (u8 *) (eap + 1);
679 if (len < sizeof(*eap) + 1) {
687 HOSTAPD_LEVEL_DEBUG, "received EAP packet (code=%d "
688 "id=%d len=%d) from STA: EAP Response-%s (%d)",
689 eap->code, eap->identifier, be_to_host16(eap->length),
695 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len);
700 /* Process incoming EAP packet from Supplicant */
704 struct eap_hdr *eap;
707 if (len < sizeof(*eap)) {
708 wpa_printf(MSG_INFO, " too short EAP packet");
712 eap = (struct eap_hdr *) buf;
714 eap_len = be_to_host16(eap->length);
715 wpa_printf(MSG_DEBUG, "EAP: code=%d identifier=%d length=%d",
716 eap->code, eap->identifier, eap_len);
717 if (eap_len < sizeof(*eap)) {
718 wpa_printf(MSG_DEBUG, " Invalid EAP length");
721 wpa_printf(MSG_DEBUG, " Too short frame to contain this EAP "
725 wpa_printf(MSG_DEBUG, " Ignoring %lu extra bytes after EAP "
729 switch (eap->code) {
735 handle_eap_response(hapd, sta, eap, eap_len);
908 eap_server_clear_identity(sta->eapol_sm->eap);
921 eap_server_clear_identity(sta->eapol_sm->eap);
991 * reassociation change from WPA-EAP to PSK.
1032 "PMK from FT - skip IEEE 802.1X/EAP");
1041 if (sta->eapol_sm->eap)
1042 eap_sm_notify_cached(sta->eapol_sm->eap);
1054 "PMK from PMKSA cache - skip IEEE 802.1X/EAP");
1063 if (sta->eapol_sm->eap)
1064 eap_sm_notify_cached(sta->eapol_sm->eap);
1108 struct wpabuf *eap;
1123 eap = radius_msg_get_eap(msg);
1124 if (eap == NULL) {
1126 * RADIUS server SHOULD NOT send Access-Reject/no EAP-Message
1130 "EAP-Message from RADIUS message");
1135 if (wpabuf_len(eap) < sizeof(*hdr)) {
1137 HOSTAPD_LEVEL_WARNING, "too short EAP packet "
1139 wpabuf_free(eap);
1144 if (wpabuf_len(eap) > sizeof(*hdr))
1145 eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)];
1147 eap);
1152 os_snprintf(buf, sizeof(buf), "EAP-Request-%s (%d)",
1158 os_snprintf(buf, sizeof(buf), "EAP Response-%s (%d)",
1164 os_strlcpy(buf, "EAP Success", sizeof(buf));
1167 os_strlcpy(buf, "EAP Failure", sizeof(buf));
1170 os_strlcpy(buf, "unknown EAP code", sizeof(buf));
1175 HOSTAPD_LEVEL_DEBUG, "decapsulated EAP packet (code=%d "
1182 sm->eap_if->aaaEapReqData = eap;
1545 * present when packet contains an EAP-Message attribute */
1552 "EAP-Message");
1667 "using EAP timeout of %d seconds (from "
1672 * Use dynamic retransmission behavior per EAP
1707 * Disconnect the STA since it did not reply to the last EAP
1708 * request and we cannot continue EAP processing (EAP-Failure
1709 * could only be sent if the EAP peer actually replied).
1711 wpa_dbg(hapd->msg_ctx, MSG_DEBUG, "EAP Timeout, STA " MACSTR,
1817 identity = eap_get_identity(sm->eap, &identity_len);
2122 /* EAPOL EAP-Packet packets are eventually re-sent by either Supplicant
2457 * considerable amount of time and some EAP methods, like
2458 * EAP-FAST with anonymous provisioning, may require another
2462 "disconnection after EAP-Failure");
2464 * requested EAP-Failure TX getting out before this should the