Lines Matching defs:eap_sm
307 struct eap_sm { struct
308 enum {
313 } EAP_state;
315 EapType selectedMethod;
316 EapMethodState methodState;
317 int lastId;
318 struct wpabuf *lastRespData;
319 EapDecision decision;
321 Boolean rxReq;
322 Boolean rxSuccess;
323 Boolean rxFailure;
324 int reqId;
325 EapType reqMethod;
326 int reqVendor;
327 u32 reqVendorMethod;
328 Boolean ignore;
330 int ClientTimeout;
333 Boolean allowNotifications; /* peer state machine <-> methods */
334 struct wpabuf *eapRespData; /* peer to lower layer */
335 Boolean eapKeyAvailable; /* peer to lower layer */
336 u8 *eapKeyData; /* peer to lower layer */
337 size_t eapKeyDataLen; /* peer to lower layer */
338 u8 *eapSessionId; /* peer to lower layer */
339 size_t eapSessionIdLen; /* peer to lower layer */
340 const struct eap_method *m; /* selected EAP method */
342 Boolean changed;
343 void *eapol_ctx;
344 const struct eapol_callbacks *eapol_cb;
345 void *eap_method_priv;
346 int init_phase2;
347 int fast_reauth;
348 Boolean reauthInit; /* send EAP-Identity/Re-auth */
349 u32 erp_seq;
351 Boolean rxResp /* LEAP only */;
352 Boolean leap_done;
353 Boolean peap_done;
354 u8 req_sha1[20]; /* SHA1() of the current EAP packet */
355 u8 last_sha1[20]; /* SHA1() of the previously received EAP packet; used
358 void *msg_ctx;
359 void *scard_ctx;
360 void *ssl_ctx;
361 void *ssl_ctx2;
363 unsigned int workaround;
388 const u8 * eap_get_config_identity(struct eap_sm *sm, size_t *len); argument