EAPOL supp: Convert Boolean to C99 bool
Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
37e3501bf7
commit
da8478a1ab
8 changed files with 142 additions and 143 deletions
|
@ -8203,7 +8203,7 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
|
|||
wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME, 43200);
|
||||
wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD, 70);
|
||||
wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT, 60);
|
||||
eapol_sm_notify_logoff(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_logoff(wpa_s->eapol, false);
|
||||
|
||||
radio_remove_works(wpa_s, NULL, 1);
|
||||
wpa_s->ext_work_in_progress = 0;
|
||||
|
@ -10217,9 +10217,9 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
|
|||
reply_len = wpa_supplicant_ctrl_iface_get(wpa_s, buf + 4,
|
||||
reply, reply_size);
|
||||
} else if (os_strcmp(buf, "LOGON") == 0) {
|
||||
eapol_sm_notify_logoff(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_logoff(wpa_s->eapol, false);
|
||||
} else if (os_strcmp(buf, "LOGOFF") == 0) {
|
||||
eapol_sm_notify_logoff(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_logoff(wpa_s->eapol, true);
|
||||
} else if (os_strcmp(buf, "REASSOCIATE") == 0) {
|
||||
if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED)
|
||||
reply_len = -1;
|
||||
|
|
|
@ -644,9 +644,9 @@ static int test_eapol(struct eapol_test_data *e, struct wpa_supplicant *wpa_s,
|
|||
eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
|
||||
|
||||
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, false);
|
||||
/* 802.1X::portControl = Auto */
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, true);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -322,12 +322,12 @@ void wpa_supplicant_mark_disassoc(struct wpa_supplicant *wpa_s)
|
|||
if (bssid_changed)
|
||||
wpas_notify_bssid_changed(wpa_s);
|
||||
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, false);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, false);
|
||||
if (wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_OWE ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_DPP || wpa_s->drv_authorized_port)
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, false);
|
||||
wpa_s->drv_authorized_port = 0;
|
||||
wpa_s->ap_ies_from_associnfo = 0;
|
||||
wpa_s->current_ssid = NULL;
|
||||
|
@ -3033,7 +3033,7 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|||
already_authorized = data && data->assoc_info.authorized;
|
||||
|
||||
/*
|
||||
* Set portEnabled first to FALSE in order to get EAP state machine out
|
||||
* Set portEnabled first to false in order to get EAP state machine out
|
||||
* of the SUCCESS state and eapSuccess cleared. Without this, EAPOL PAE
|
||||
* state machine may transit to AUTHENTICATING state based on obsolete
|
||||
* eapSuccess and then trigger BE_AUTH to SUCCESS and PAE to
|
||||
|
@ -3041,16 +3041,16 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|||
* reset the state.
|
||||
*/
|
||||
if (!ft_completed && !already_authorized) {
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, false);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, false);
|
||||
}
|
||||
if (wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_DPP ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_OWE || ft_completed ||
|
||||
already_authorized || wpa_s->drv_authorized_port)
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, false);
|
||||
/* 802.1X::portControl = Auto */
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, true);
|
||||
wpa_s->eapol_received = 0;
|
||||
if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE ||
|
||||
|
@ -3082,8 +3082,8 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|||
*/
|
||||
wpa_supplicant_cancel_auth_timeout(wpa_s);
|
||||
wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, true);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, true);
|
||||
} else if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK) &&
|
||||
wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt)) {
|
||||
/*
|
||||
|
@ -3092,8 +3092,8 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|||
*/
|
||||
wpa_supplicant_cancel_auth_timeout(wpa_s);
|
||||
wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, true);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, true);
|
||||
} else if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X) &&
|
||||
wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt)) {
|
||||
/*
|
||||
|
@ -3101,7 +3101,7 @@ static void wpa_supplicant_event_assoc(struct wpa_supplicant *wpa_s,
|
|||
* to allow EAPOL supplicant to complete its work without
|
||||
* waiting for WPA supplicant.
|
||||
*/
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, true);
|
||||
}
|
||||
|
||||
wpa_s->last_eapol_matches_bssid = 0;
|
||||
|
@ -4182,8 +4182,8 @@ static void wpa_supplicant_event_port_authorized(struct wpa_supplicant *wpa_s)
|
|||
if (wpa_s->wpa_state == WPA_ASSOCIATED) {
|
||||
wpa_supplicant_cancel_auth_timeout(wpa_s);
|
||||
wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, true);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, true);
|
||||
wpa_s->drv_authorized_port = 1;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -828,7 +828,7 @@ no_fils:
|
|||
" (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
|
||||
wpa_ssid_txt(params.ssid, params.ssid_len), params.freq);
|
||||
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, false);
|
||||
wpa_clear_keys(wpa_s, bss->bssid);
|
||||
wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
|
||||
if (old_ssid != wpa_s->current_ssid)
|
||||
|
|
|
@ -319,14 +319,14 @@ void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s)
|
|||
* per-BSSID EAPOL authentication.
|
||||
*/
|
||||
eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, true);
|
||||
eapol_sm_notify_eap_fail(wpa_s->eapol, false);
|
||||
return;
|
||||
}
|
||||
#endif /* CONFIG_IBSS_RSN */
|
||||
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, false);
|
||||
eapol_sm_notify_eap_fail(wpa_s->eapol, false);
|
||||
|
||||
if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
|
||||
wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE)
|
||||
|
@ -1160,7 +1160,7 @@ int wpa_supplicant_reload_configuration(struct wpa_supplicant *wpa_s)
|
|||
* Clear forced success to clear EAP state for next
|
||||
* authentication.
|
||||
*/
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_eap_success(wpa_s->eapol, false);
|
||||
}
|
||||
eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
|
||||
wpa_sm_set_config(wpa_s->wpa, NULL);
|
||||
|
@ -4751,12 +4751,12 @@ void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
|
|||
wpa_sm_rx_eapol(wpa_s->wpa, src_addr, buf, len);
|
||||
else if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt)) {
|
||||
/*
|
||||
* Set portValid = TRUE here since we are going to skip 4-way
|
||||
* Set portValid = true here since we are going to skip 4-way
|
||||
* handshake processing which would normally set portValid. We
|
||||
* need this to allow the EAPOL state machines to be completed
|
||||
* without going through EAPOL-Key handshake.
|
||||
*/
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, true);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -6185,8 +6185,8 @@ static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
|
|||
}
|
||||
|
||||
/* RSNA Supplicant Key Management - INITIALIZE */
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
|
||||
eapol_sm_notify_portEnabled(wpa_s->eapol, false);
|
||||
eapol_sm_notify_portValid(wpa_s->eapol, false);
|
||||
|
||||
/* Initialize driver interface and register driver event handler before
|
||||
* L2 receive handler so that association events are processed before
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue