Home
last modified time | relevance | path

Searched refs:keyRun (Results 1 - 12 of 12) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_auth/
H A Deapol_auth_sm.c203 * Clearing keyRun here is not specified in IEEE Std 802.1X-2004, but in SM_STATE()
207 * AUTHENTICATING state to clear keyRun before the IEEE 802.11 RSN in SM_STATE()
209 * AUTHENTICATION2 to INITPMK if keyRun = TRUE has been left from the in SM_STATE()
210 * last association. This can be avoided by clearing keyRun here. in SM_STATE()
212 sm->keyRun = FALSE; in SM_STATE()
332 sm->keyRun = FALSE; in SM_STATE()
351 sm->keyRun = FALSE; in SM_STATE()
508 sm->keyRun = TRUE; in SM_STATE()
679 sm->keyRun && !(sm->flags & EAPOL_SM_USES_WPA)) in SM_STEP()
683 if (!sm->keyTxEnabled || !sm->keyRun) in SM_STEP()
[all...]
H A Deapol_auth_sm_i.h55 Boolean keyRun; member
H A Deapol_auth_dump.c152 "keyRun=%s\n" in eapol_auth_dump_state()
170 _SB(sm->keyDone), _SB(sm->keyRun), in eapol_auth_dump_state()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_auth/
H A Deapol_auth_sm.c204 * Clearing keyRun here is not specified in IEEE Std 802.1X-2004, but in SM_STATE()
208 * AUTHENTICATING state to clear keyRun before the IEEE 802.11 RSN in SM_STATE()
210 * AUTHENTICATION2 to INITPMK if keyRun = true has been left from the in SM_STATE()
211 * last association. This can be avoided by clearing keyRun here. in SM_STATE()
213 sm->keyRun = false; in SM_STATE()
333 sm->keyRun = false; in SM_STATE()
352 sm->keyRun = false; in SM_STATE()
509 sm->keyRun = true; in SM_STATE()
682 sm->keyRun && !(sm->flags & EAPOL_SM_USES_WPA)) in SM_STEP()
686 if (!sm->keyTxEnabled || !sm->keyRun) in SM_STEP()
[all...]
H A Deapol_auth_sm_i.h55 bool keyRun; member
H A Deapol_auth_dump.c152 "keyRun=%s\n" in eapol_auth_dump_state()
170 _SB(sm->keyDone), _SB(sm->keyRun), in eapol_auth_dump_state()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_glue.c214 sta->eapol_sm->keyRun = value ? TRUE : FALSE; in hostapd_wpa_auth_set_eapol()
242 return sta->eapol_sm->keyRun; in hostapd_wpa_auth_get_eapol()
H A Dieee802_1x.c1301 sta->eapol_sm->keyRun = TRUE; in ieee802_1x_new_station()
1324 sta->eapol_sm->keyRun = TRUE; in ieee802_1x_new_station()
1345 sta->eapol_sm->keyRun = TRUE; in ieee802_1x_new_station()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eapol_supp/
H A Deapol_supp_sm.c46 Boolean keyRun; member
293 sm->keyRun = FALSE; in SM_STATE()
491 sm->keyRun = TRUE; in SM_STATE()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eapol_supp/
H A Deapol_supp_sm.c45 bool keyRun; member
311 sm->keyRun = false; in SM_STATE()
514 sm->keyRun = true; in SM_STATE()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dieee802_1x.c1309 sta->eapol_sm->keyRun = true; in ieee802_1x_new_station()
1332 sta->eapol_sm->keyRun = true; in ieee802_1x_new_station()
1353 sta->eapol_sm->keyRun = true; in ieee802_1x_new_station()
H A Dwpa_auth_glue.c309 sta->eapol_sm->keyRun = value; in hostapd_wpa_auth_set_eapol()
336 return sta->eapol_sm->keyRun; in hostapd_wpa_auth_get_eapol()

Completed in 19 milliseconds