Lines Matching refs:data

45 static void eap_tls_state(struct eap_tls_data *data, int state)
48 eap_tls_state_txt(data->state),
50 data->state = state;
56 struct eap_tls_data *data;
58 data = os_zalloc(sizeof(*data));
59 if (data == NULL)
61 data->state = START;
63 if (eap_server_tls_ssl_init(sm, &data->ssl, 1)) {
65 eap_tls_reset(sm, data);
69 data->eap_type = EAP_TYPE_TLS;
71 return data;
78 struct eap_tls_data *data;
80 data = os_zalloc(sizeof(*data));
81 if (data == NULL)
83 data->state = START;
85 if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {
87 eap_tls_reset(sm, data);
91 data->eap_type = EAP_UNAUTH_TLS_TYPE;
92 return data;
99 struct eap_tls_data *data = priv;
100 if (data == NULL)
102 eap_server_tls_ssl_deinit(sm, &data->ssl);
103 os_free(data);
108 struct eap_tls_data *data, u8 id)
112 req = eap_tls_msg_alloc(data->eap_type, 1, EAP_CODE_REQUEST, id);
116 eap_tls_state(data, FAILURE);
122 eap_tls_state(data, CONTINUE);
130 struct eap_tls_data *data = priv;
133 if (data->ssl.state == FRAG_ACK) {
134 return eap_server_tls_build_ack(id, data->eap_type, 0);
137 if (data->ssl.state == WAIT_FRAG_ACK) {
138 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0,
143 switch (data->state) {
145 return eap_tls_build_start(sm, data, id);
147 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn))
148 data->established = 1;
152 __func__, data->state);
156 res = eap_server_tls_build_msg(&data->ssl, data->eap_type, 0, id);
159 if (data->established && data->ssl.state != WAIT_FRAG_ACK) {
163 eap_tls_state(data, SUCCESS);
173 struct eap_tls_data *data = priv;
177 if (data->eap_type == EAP_UNAUTH_TLS_TYPE)
182 pos = eap_hdr_validate(EAP_VENDOR_IETF, data->eap_type,
196 struct eap_tls_data *data = priv;
197 if (data->state == SUCCESS && wpabuf_len(data->ssl.tls_in) == 0) {
202 if (eap_server_tls_phase1(sm, &data->ssl) < 0)
203 eap_tls_state(data, FAILURE);
210 struct eap_tls_data *data = priv;
211 if (eap_server_tls_process(sm, &data->ssl, respData, data,
212 data->eap_type, NULL, eap_tls_process_msg) <
214 eap_tls_state(data, FAILURE);
220 struct eap_tls_data *data = priv;
221 return data->state == SUCCESS || data->state == FAILURE;
227 struct eap_tls_data *data = priv;
230 if (data->state != SUCCESS)
233 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
250 struct eap_tls_data *data = priv;
253 if (data->state != SUCCESS)
256 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
282 struct eap_tls_data *data = priv;
283 return data->state == SUCCESS;