Searched refs:eap_if (Results 1 – 8 of 8) sorted by relevance
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server.c | 225 if (sm->eap_if.eapRestart && !sm->cfg->eap_server && sm->identity) { in SM_STATE() 235 sm->eap_if.eapSuccess = false; in SM_STATE() 236 sm->eap_if.eapFail = false; in SM_STATE() 237 sm->eap_if.eapTimeout = false; in SM_STATE() 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 239 sm->eap_if.eapKeyData = NULL; in SM_STATE() 240 sm->eap_if.eapKeyDataLen = 0; in SM_STATE() 241 os_free(sm->eap_if.eapSessionId); in SM_STATE() 242 sm->eap_if.eapSessionId = NULL; in SM_STATE() 243 sm->eap_if.eapSessionIdLen = 0; in SM_STATE() [all …]
|
H A D | eap_i.h | 125 struct eap_eapol_interface eap_if; member
|
/freebsd/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 109 if (sm->eap_if->eapReqData == NULL || in eapol_auth_tx_req() 110 wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) { in eapol_auth_tx_req() 125 sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData); in eapol_auth_tx_req() 131 wpabuf_head(sm->eap_if->eapReqData), in eapol_auth_tx_req() 132 wpabuf_len(sm->eap_if->eapReqData)); in eapol_auth_tx_req() 134 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY) in eapol_auth_tx_req() 180 if (state->eap_if->retransWhile > 0) { in eapol_port_timers_tick() 181 state->eap_if->retransWhile--; in eapol_port_timers_tick() 182 if (state->eap_if->retransWhile == 0) { in eapol_port_timers_tick() 262 sm->eap_if->eapRestart = true; in SM_STATE() [all …]
|
H A D | eapol_auth_dump.c | 164 _SB(sm->eap_if->eapFail), in eapol_auth_dump_state() 166 _SB(sm->eap_if->eapSuccess), in eapol_auth_dump_state() 167 _SB(sm->eap_if->eapTimeout), in eapol_auth_dump_state() 169 _SB(sm->eap_if->eapKeyAvailable), in eapol_auth_dump_state() 173 _SB(sm->eap_if->portEnabled), in eapol_auth_dump_state() 203 _SB(sm->eap_if->eapRestart), in eapol_auth_dump_state() 234 _SB(sm->eap_if->eapNoReq), in eapol_auth_dump_state() 235 _SB(sm->eap_if->eapReq), in eapol_auth_dump_state() 236 _SB(sm->eap_if->eapResp), in eapol_auth_dump_state()
|
H A D | eapol_auth_sm_i.h | 148 struct eap_eapol_interface *eap_if; member
|
/freebsd/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 266 if (!sm->eap_if->eapKeyData || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 281 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 294 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 312 if (!sm || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 947 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_response() 948 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_response() 978 wpabuf_free(sm->eap_if->eapRespData); in handle_eap_initiate() 979 sm->eap_if->eapRespData = wpabuf_alloc_copy(eap, len); in handle_eap_initiate() 1236 sta->eapol_sm->eap_if->portEnabled = true; in ieee802_1x_receive() 1393 sta->eapol_sm->eap_if->portEnabled = true; in ieee802_1x_new_station() [all …]
|
H A D | wpa_auth_glue.c | 312 sta->eapol_sm->eap_if->eapKeyAvailable = value; in hostapd_wpa_auth_set_eapol() 337 return sta->eapol_sm->eap_if->eapKeyAvailable; in hostapd_wpa_auth_get_eapol()
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_server.c | 75 struct eap_eapol_interface *eap_if; member 654 sess->eap_if = eap_get_interface(sess->eap); in radius_server_get_new_session() 655 sess->eap_if->eapRestart = true; in radius_server_get_new_session() 656 sess->eap_if->portEnabled = true; in radius_server_get_new_session() 906 if (sess->eap_if->eapFail) { in radius_server_encapsulate_eap() 907 sess->eap_if->eapFail = false; in radius_server_encapsulate_eap() 909 } else if (sess->eap_if->eapSuccess) { in radius_server_encapsulate_eap() 910 sess->eap_if->eapSuccess = false; in radius_server_encapsulate_eap() 913 sess->eap_if->eapReq = false; in radius_server_encapsulate_eap() 935 if (sess->eap_if->eapReqData && in radius_server_encapsulate_eap() [all …]
|