HomeSort by relevance Sort by last modified time
    Searched refs:eapFail (Results 1 - 6 of 6) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap.h 57 Boolean eapFail;
eap_server.c 239 sm->eap_if.eapFail = FALSE;
646 sm->eap_if.eapFail = TRUE;
750 sm->eap_if.eapFail = TRUE;
1110 sm->eap_if.eapFail = TRUE;
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 40 Boolean eapFail;
381 else if (sm->eapSuccess || sm->eapFail)
403 else if (sm->eapFail || (sm->keyDone && !sm->portValid))
569 * and SUCCESS based on eapFail and eapSuccess, respectively.
572 * eapFail which would mean that more than one of the
579 * either of eapSuccess or eapFail is set.
589 else if (sm->eapFail)
607 if (sm->eapFail && sm->suppStart)
620 else if (sm->eapFail)
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_dump.c 145 "eapFail=%s\n"
164 _SB(sm->eap_if->eapFail),
eapol_auth_sm.c 414 sm->eap_if->eapSuccess || sm->eap_if->eapFail)
572 else if (sm->eap_if->eapFail) {
590 if (sm->eap_if->eapFail && sm->authStart)
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_server.c 724 if (sess->eap_if->eapFail) {
725 sess->eap_if->eapFail = FALSE;
935 struct eap_hdr eapfail; local
947 os_memset(&eapfail, 0, sizeof(eapfail));
948 eapfail.code = EAP_CODE_FAILURE;
949 eapfail.identifier = 0;
950 eapfail.length = host_to_be16(sizeof(eapfail));
952 if (!radius_msg_add_eap(msg, (u8 *) &eapfail, sizeof(eapfail)))
    [all...]

Completed in 142 milliseconds