@@ -181,7 +181,7 @@ int8_t ws_pae_supp_authenticate(protocol_interface_info_entry_t *interface_ptr,
181
181
}
182
182
183
183
if (ws_pae_supp_nw_keys_valid_check (pae_supp , dest_pan_id ) >= 0 ) {
184
- pae_supp -> auth_completed (interface_ptr , true , NULL );
184
+ pae_supp -> auth_completed (interface_ptr , AUTH_RESULT_OK , NULL );
185
185
return 0 ;
186
186
}
187
187
@@ -792,7 +792,7 @@ void ws_pae_supp_fast_timer(uint16_t ticks)
792
792
if (!pae_supp -> initial_key_timer && !pae_supp -> auth_trickle_running && !running ) {
793
793
tr_debug ("PAE idle" );
794
794
// If not already completed, restart bootstrap
795
- ws_pae_supp_authenticate_response (pae_supp , false );
795
+ ws_pae_supp_authenticate_response (pae_supp , AUTH_RESULT_ERR_UNSPEC );
796
796
797
797
ws_pae_supp_timer_stop (pae_supp );
798
798
}
@@ -812,7 +812,7 @@ void ws_pae_supp_slow_timer(uint16_t seconds)
812
812
}
813
813
// Maximum number of trickle expires, authentication fails
814
814
if (!trickle_running (& pae_supp -> auth_trickle_timer , & pae_supp -> auth_trickle_params )) {
815
- ws_pae_supp_authenticate_response (pae_supp , false );
815
+ ws_pae_supp_authenticate_response (pae_supp , AUTH_RESULT_ERR_UNSPEC );
816
816
}
817
817
}
818
818
@@ -1091,7 +1091,7 @@ static void ws_pae_supp_kmp_api_create_confirm(kmp_api_t *kmp, kmp_result_e resu
1091
1091
1092
1092
// KMP-CREATE.request has failed, authentication error
1093
1093
if (result != KMP_RESULT_OK ) {
1094
- ws_pae_supp_authenticate_response (pae_supp , false );
1094
+ ws_pae_supp_authenticate_response (pae_supp , AUTH_RESULT_ERR_UNSPEC );
1095
1095
}
1096
1096
}
1097
1097
@@ -1127,14 +1127,14 @@ static void ws_pae_supp_kmp_api_finished_indication(kmp_api_t *kmp, kmp_result_e
1127
1127
pae_supp -> nw_key_insert (pae_supp -> interface_ptr , keys -> gtks );
1128
1128
}
1129
1129
1130
- ws_pae_supp_authenticate_response (pae_supp , result );
1130
+ ws_pae_supp_authenticate_response (pae_supp , AUTH_RESULT_OK );
1131
1131
}
1132
1132
1133
1133
/* If initial EAPOL-key message sending fails to tx no acknowledge, indicates failure so
1134
1134
that bootstrap can decide if EAPOL target should be changed */
1135
1135
else if (type > IEEE_802_1X_INITIAL_KEY && result == KMP_RESULT_ERR_TX_NO_ACK ) {
1136
1136
tr_info ("Initial EAPOL-Key TX failure, target: %s" , trace_array (kmp_address_eui_64_get (& pae_supp -> entry .addr ), 8 ));
1137
- ws_pae_supp_authenticate_response (pae_supp , result );
1137
+ ws_pae_supp_authenticate_response (pae_supp , AUTH_RESULT_ERR_TX_NO_ACK );
1138
1138
}
1139
1139
1140
1140
}
0 commit comments