HomeSort by relevance Sort by last modified time
    Searched refs:eapFail (Results 1 - 6 of 6) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap.h 57 Boolean eapFail;
eap_server.c 238 sm->eap_if.eapFail = FALSE;
645 sm->eap_if.eapFail = TRUE;
749 sm->eap_if.eapFail = TRUE;
1109 sm->eap_if.eapFail = TRUE;
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 40 Boolean eapFail;
370 else if (sm->eapSuccess || sm->eapFail)
392 else if (sm->eapFail || (sm->keyDone && !sm->portValid))
558 * and SUCCESS based on eapFail and eapSuccess, respectively.
561 * eapFail which would mean that more than one of the
568 * either of eapSuccess or eapFail is set.
578 else if (sm->eapFail)
596 if (sm->eapFail && sm->suppStart)
609 else if (sm->eapFail)
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_dump.c 145 "eapFail=%s\n"
164 _SB(sm->eap_if->eapFail),
eapol_auth_sm.c 402 sm->eap_if->eapSuccess || sm->eap_if->eapFail)
560 else if (sm->eap_if->eapFail) {
578 if (sm->eap_if->eapFail && sm->authStart)
  /external/wpa_supplicant_8/src/radius/
radius_server.c 721 if (sess->eap_if->eapFail) {
722 sess->eap_if->eapFail = FALSE;
932 struct eap_hdr eapfail; local
944 os_memset(&eapfail, 0, sizeof(eapfail));
945 eapfail.code = EAP_CODE_FAILURE;
946 eapfail.identifier = 0;
947 eapfail.length = host_to_be16(sizeof(eapfail));
949 if (!radius_msg_add_eap(msg, (u8 *) &eapfail, sizeof(eapfail)))
    [all...]

Completed in 34 milliseconds