HomeSort by relevance Sort by last modified time
    Searched refs:eapFail (Results 1 - 6 of 6) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap.h 57 Boolean eapFail;
eap_server.c 239 sm->eap_if.eapFail = FALSE;
648 sm->eap_if.eapFail = TRUE;
752 sm->eap_if.eapFail = TRUE;
1112 sm->eap_if.eapFail = TRUE;
    [all...]
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.c 41 Boolean eapFail;
384 else if (sm->eapSuccess || sm->eapFail)
406 else if (sm->eapFail || (sm->keyDone && !sm->portValid))
583 * and SUCCESS based on eapFail and eapSuccess, respectively.
586 * eapFail which would mean that more than one of the
593 * either of eapSuccess or eapFail is set.
603 else if (sm->eapFail)
621 if (sm->eapFail && sm->suppStart)
634 else if (sm->eapFail)
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_dump.c 145 "eapFail=%s\n"
164 _SB(sm->eap_if->eapFail),
eapol_auth_sm.c 414 sm->eap_if->eapSuccess || sm->eap_if->eapFail)
572 else if (sm->eap_if->eapFail) {
590 if (sm->eap_if->eapFail && sm->authStart)
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_server.c 732 if (sess->eap_if->eapFail) {
733 sess->eap_if->eapFail = FALSE;
943 struct eap_hdr eapfail; local
955 os_memset(&eapfail, 0, sizeof(eapfail));
956 eapfail.code = EAP_CODE_FAILURE;
957 eapfail.identifier = 0;
958 eapfail.length = host_to_be16(sizeof(eapfail));
960 if (!radius_msg_add_eap(msg, (u8 *) &eapfail, sizeof(eapfail)))
    [all...]

Completed in 134 milliseconds