Lines Matching defs:eap_sm
307 struct eap_sm { struct
308 enum {
313 } EAP_state;
315 enum eap_type selectedMethod;
316 EapMethodState methodState;
317 int lastId;
318 struct wpabuf *lastRespData;
319 EapDecision decision;
321 bool rxReq;
322 bool rxSuccess;
323 bool rxFailure;
324 int reqId;
325 enum eap_type reqMethod;
326 int reqVendor;
327 u32 reqVendorMethod;
328 bool ignore;
330 int ClientTimeout;
333 bool allowNotifications; /* peer state machine <-> methods */
334 struct wpabuf *eapRespData; /* peer to lower layer */
335 bool eapKeyAvailable; /* peer to lower layer */
336 u8 *eapKeyData; /* peer to lower layer */
337 size_t eapKeyDataLen; /* peer to lower layer */
338 u8 *eapSessionId; /* peer to lower layer */
339 size_t eapSessionIdLen; /* peer to lower layer */
340 const struct eap_method *m; /* selected EAP method */
342 bool changed;
343 void *eapol_ctx;
344 const struct eapol_callbacks *eapol_cb;
345 void *eap_method_priv;
346 int init_phase2;
347 int fast_reauth;
348 bool reauthInit; /* send EAP-Identity/Re-auth */
349 u32 erp_seq;
351 bool rxResp /* LEAP only */;
352 bool leap_done;
353 bool peap_done;
354 u8 req_sha1[20]; /* SHA1() of the current EAP packet */
355 u8 last_sha1[20]; /* SHA1() of the previously received EAP packet; used
358 void *msg_ctx;
359 void *scard_ctx;
360 void *ssl_ctx;
361 void *ssl_ctx2;
363 unsigned int workaround;
366 u8 *peer_challenge, *auth_challenge;
371 bool eap_fast_mschapv2;
373 int num_rounds;
374 int num_rounds_short;
375 int force_disabled;
399 const u8 * eap_get_config_identity(struct eap_sm *sm, size_t *len); argument