Home | History | Annotate | Download | only in eapol_supp

Lines Matching defs:eap

18 #include "eap_peer/eap.h"
36 unsigned int idleWhile; /* for EAP state machine */
123 struct eap_sm *eap;
128 struct wpabuf *eapReqData; /* for EAP */
129 Boolean altAccept; /* for EAP */
130 Boolean altReject; /* for EAP */
481 if (eap_key_available(sm->eap)) {
756 * Anyway, taking the beginning of the keying material from EAP
761 wpa_hexdump_key(MSG_DEBUG, "EAPOL: using part of EAP keying "
812 /* EAP layer processing; no special code is needed, since Supplicant
814 * and these are only set in the EAP state machine when the processing
827 /* Get EAP Response from EAP Proxy */
830 wpa_printf(MSG_WARNING, "EAPOL: txSuppRsp - EAP Proxy "
837 resp = eap_get_eapRespData(sm->eap);
839 wpa_printf(MSG_WARNING, "EAPOL: txSuppRsp - EAP response data "
844 /* Send EAP-Packet from the EAP layer to the Authenticator */
869 eap_sm_abort(sm->eap);
926 /* Drive the EAP proxy state machine */
927 if (eap_proxy_sm_step(sm->eap_proxy, sm->eap))
931 if (eap_peer_sm_step(sm->eap))
948 else if (eap_peer_was_failure_expected(sm->eap))
1064 * Returns: Static string containing name of current eap method or NULL
1072 return eap_sm_get_method_name(sm->eap);
1131 len += eap_sm_get_status(sm->eap, buf + len, buflen - len, verbose);
1258 * Buffalo WHR-G125 Ver.1.47 seems to send EAP-WPS
1262 * correct length in the EAP packet.
1265 "payload length based on EAP header: "
1277 * An AP has been reported to send out EAP message with
1279 * completion of EAP authentication. This can result in
1280 * issues with the unexpected EAP message triggering
1288 wpa_printf(MSG_DEBUG, "EAPOL: Ignore EAP packet with unknown code 10");
1303 wpa_printf(MSG_DEBUG, "EAPOL: Received EAP-Packet "
1313 "EAP Req updated");
1421 * eapol_sm_notify_eap_success - Notification of external EAP success trigger
1425 * Notify the EAPOL state machine that external event has forced EAP state to
1428 * This function is called to update EAP state when WPA-PSK key handshake has
1429 * been completed successfully since WPA-PSK does not use EAP state machine.
1436 "EAP success=%d", success);
1440 eap_notify_success(sm->eap);
1446 * eapol_sm_notify_eap_fail - Notification of external EAP failure trigger
1450 * Notify EAPOL state machine that external event has forced EAP state to
1458 "EAP fail=%d", fail);
1468 * @config: Pointer to current network EAP configuration
1473 * the stored pointed. conf will be copied to local EAPOL/EAP configuration
1499 /* Using EAP Proxy, so skip EAP state machine update */
1503 if (sm->eap) {
1504 eap_set_fast_reauth(sm->eap, conf->fast_reauth);
1505 eap_set_workaround(sm->eap, conf->workaround);
1506 eap_set_force_disabled(sm->eap, conf->eap_disabled);
1507 eap_set_external_sim(sm->eap, conf->external_sim);
1513 * eapol_sm_get_key - Get master session key (MSK) from EAP
1520 * Fetch EAP keying material (MSK, eapKeyData) from EAP state machine. The key
1530 /* Get key from EAP proxy */
1532 wpa_printf(MSG_DEBUG, "EAPOL: EAP key not available");
1544 if (sm == NULL || !eap_key_available(sm->eap)) {
1545 wpa_printf(MSG_DEBUG, "EAPOL: EAP key not available");
1548 eap_key = eap_get_eapKeyData(sm->eap, &eap_len);
1570 * eapol_sm_get_session_id - Get EAP Session-Id
1573 * Returns: Pointer to the EAP Session-Id or %NULL on failure
1579 if (sm == NULL || !eap_key_available(sm->eap)) {
1580 wpa_printf(MSG_DEBUG, "EAPOL: EAP Session-Id not available");
1583 return eap_get_eapSessionId(sm->eap, len);
1612 * to move EAPOL and EAP state machines into authenticated/successful state.
1620 eap_notify_success(sm->eap);
1649 "doing full EAP authentication");
1678 eap_register_scard_ctx(sm->eap, ctx);
1712 eap_sm_notify_ctrl_attached(sm->eap);
1721 * input, was received in order to trigger retrying of a pending EAP request.
1729 "input) notification - retrying pending EAP "
1759 * Notify EAPOL (and EAP) state machines that a lower layer has detected a
1760 * successful authentication. This is used to recover from dropped EAP-Success
1767 eap_notify_lower_layer_success(sm->eap);
1774 * eapol_sm_invalidate_cached_session - Mark cached EAP session data invalid
1780 eap_invalidate_cached_session(sm->eap);
1928 wpa_printf(MSG_DEBUG, "EAPOL: received notification from EAP "
1929 "state machine - retrying pending EAP Request");
1942 wpa_printf(MSG_DEBUG, "EAPOL: EAP parameter needed");
2032 sm->eap = eap_peer_sm_init(sm, &eapol_cb, sm->ctx->msg_ctx, &conf);
2033 if (sm->eap == NULL) {
2042 wpa_printf(MSG_ERROR, "Unable to initialize EAP Proxy");
2072 eap_peer_sm_deinit(sm->eap);
2086 if (sm && sm->eap)
2087 eap_sm_set_ext_pw_ctx(sm->eap, ext);