void bapRsnEapolHandler( v_PVOID_t pvFsm, tAniPacket *packet, v_BOOL_t fIsAuth ) { int retVal; v_U8_t *dstMac = NULL; v_U8_t *srcMac = NULL; v_U8_t *type = NULL; retVal = aniEapolParse(packet, &dstMac, &srcMac, &type); if ( retVal >= 0 ) { retVal = ANI_OK; // Sanity check that a PAE role has been assigned to it, // and then dispatch to the appropriate handler if( fIsAuth ) { tAuthRsnFsm *fsm = (tAuthRsnFsm *)pvFsm; authEapolHandler( fsm, packet, dstMac, srcMac, type ); } else { tSuppRsnFsm *fsm = (tSuppRsnFsm *)pvFsm; suppEapolHandler(fsm, packet, dstMac, srcMac, type); } // switch statement } // Successfully parsed EAPOL else { VOS_TRACE( VOS_MODULE_ID_BAP, VOS_TRACE_LEVEL_ERROR, "eapolHandler Received bad EAPOL message of len %d (status=%d)\n", aniAsfPacketGetLen(packet), retVal ); } aniAsfPacketFree( packet ); }
void bapRsnEapolHandler( v_PVOID_t pvFsm, tAniPacket *packet, v_BOOL_t fIsAuth ) { int retVal; v_U8_t *dstMac = NULL; v_U8_t *srcMac = NULL; v_U8_t *type = NULL; retVal = aniEapolParse(packet, &dstMac, &srcMac, &type); if ( retVal >= 0 ) { retVal = ANI_OK; if( fIsAuth ) { tAuthRsnFsm *fsm = (tAuthRsnFsm *)pvFsm; authEapolHandler( fsm, packet, dstMac, srcMac, type ); } else { tSuppRsnFsm *fsm = (tSuppRsnFsm *)pvFsm; suppEapolHandler(fsm, packet, dstMac, srcMac, type); } } else { VOS_TRACE( VOS_MODULE_ID_BAP, VOS_TRACE_LEVEL_ERROR, "eapolHandler Received bad EAPOL message of len %d (status=%d)\n", aniAsfPacketGetLen(packet), retVal ); } aniAsfPacketFree( packet ); }