/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_fast.c | 1575 u8 *eapKeyData; local 1580 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1581 if (eapKeyData == NULL) 1584 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1587 return eapKeyData; 1594 u8 *eapKeyData; local 1599 eapKeyData = os_malloc(EAP_EMSK_LEN); 1600 if (eapKeyData == NULL) 1603 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1606 return eapKeyData; [all...] |
H A D | eap_peap.c | 1345 u8 *eapKeyData; local 1361 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1362 if (eapKeyData) { 1363 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1366 eapKeyData, EAP_TLS_KEY_LEN); 1372 return eapKeyData; 1376 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1379 if (eapKeyData) { 1382 eapKeyData, EAP_TLS_KEY_LEN); 1387 return eapKeyData; [all...] |
H A D | eap_ttls.c | 1422 u8 *eapKeyData; local 1428 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1432 eapKeyData = eap_ttls_v1_derive_key(sm, data); 1435 if (eapKeyData) { 1438 eapKeyData, EAP_TLS_KEY_LEN); 1443 return eapKeyData;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 228 u8 *eapKeyData; local 233 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 236 if (eapKeyData) { 239 eapKeyData, EAP_TLS_KEY_LEN); 244 return eapKeyData; 251 u8 *eapKeyData, *emsk; local 256 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 259 if (eapKeyData) { 262 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 264 os_free(eapKeyData); [all...] |
H A D | eap.h | 56 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1548 u8 *eapKeyData; local 1553 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1554 if (eapKeyData == NULL) 1557 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1560 return eapKeyData; 1567 u8 *eapKeyData; local 1572 eapKeyData = os_malloc(EAP_EMSK_LEN); 1573 if (eapKeyData == NULL) 1576 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1579 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1307 u8 *eapKeyData; local 1324 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1325 if (eapKeyData) { 1326 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1329 eapKeyData, EAP_TLS_KEY_LEN); 1335 return eapKeyData; 1339 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1342 if (eapKeyData) { 1345 eapKeyData, EAP_TLS_KEY_LEN); 1350 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1143 u8 *eapKeyData; local 1148 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1151 if (eapKeyData) { 1154 eapKeyData, EAP_TLS_KEY_LEN); 1159 return eapKeyData;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 228 u8 *eapKeyData; local 233 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 236 if (eapKeyData) { 239 eapKeyData, EAP_TLS_KEY_LEN); 244 return eapKeyData; 251 u8 *eapKeyData, *emsk; local 256 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 259 if (eapKeyData) { 262 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 264 os_free(eapKeyData); [all...] |
H A D | eap.h | 56 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1548 u8 *eapKeyData; local 1553 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1554 if (eapKeyData == NULL) 1557 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1560 return eapKeyData; 1567 u8 *eapKeyData; local 1572 eapKeyData = os_malloc(EAP_EMSK_LEN); 1573 if (eapKeyData == NULL) 1576 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1579 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1307 u8 *eapKeyData; local 1324 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1325 if (eapKeyData) { 1326 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1329 eapKeyData, EAP_TLS_KEY_LEN); 1335 return eapKeyData; 1339 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1342 if (eapKeyData) { 1345 eapKeyData, EAP_TLS_KEY_LEN); 1350 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1143 u8 *eapKeyData; local 1148 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1151 if (eapKeyData) { 1154 eapKeyData, EAP_TLS_KEY_LEN); 1159 return eapKeyData;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 228 u8 *eapKeyData; local 233 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 236 if (eapKeyData) { 239 eapKeyData, EAP_TLS_KEY_LEN); 244 return eapKeyData; 251 u8 *eapKeyData, *emsk; local 256 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 259 if (eapKeyData) { 262 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 264 os_free(eapKeyData); [all...] |
H A D | eap.h | 56 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1548 u8 *eapKeyData; local 1553 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1554 if (eapKeyData == NULL) 1557 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1560 return eapKeyData; 1567 u8 *eapKeyData; local 1572 eapKeyData = os_malloc(EAP_EMSK_LEN); 1573 if (eapKeyData == NULL) 1576 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1579 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1307 u8 *eapKeyData; local 1324 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1325 if (eapKeyData) { 1326 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1329 eapKeyData, EAP_TLS_KEY_LEN); 1335 return eapKeyData; 1339 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1342 if (eapKeyData) { 1345 eapKeyData, EAP_TLS_KEY_LEN); 1350 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1143 u8 *eapKeyData; local 1148 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1151 if (eapKeyData) { 1154 eapKeyData, EAP_TLS_KEY_LEN); 1159 return eapKeyData;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 129 * Returns: %TRUE if key material (eapKeyData) is available 134 * getKey - Get EAP method specific keying material (eapKeyData) 138 * Returns: Keying material (eapKeyData) or %NULL if not available 305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 299 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 299 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 299 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|