/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
H A D | eap.h | 59 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1551 u8 *eapKeyData; local 1556 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1557 if (eapKeyData == NULL) 1560 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1563 return eapKeyData; 1570 u8 *eapKeyData; local 1575 eapKeyData = os_malloc(EAP_EMSK_LEN); 1576 if (eapKeyData == NULL) 1579 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1582 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1178 u8 *eapKeyData; local 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1157 u8 *eapKeyData; local 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
H A D | eap.h | 59 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1551 u8 *eapKeyData; local 1556 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1557 if (eapKeyData == NULL) 1560 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1563 return eapKeyData; 1570 u8 *eapKeyData; local 1575 eapKeyData = os_malloc(EAP_EMSK_LEN); 1576 if (eapKeyData == NULL) 1579 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1582 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1178 u8 *eapKeyData; local 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1157 u8 *eapKeyData; local 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
H A D | eap.h | 59 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1551 u8 *eapKeyData; local 1556 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1557 if (eapKeyData == NULL) 1560 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1563 return eapKeyData; 1570 u8 *eapKeyData; local 1575 eapKeyData = os_malloc(EAP_EMSK_LEN); 1576 if (eapKeyData == NULL) 1579 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1582 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1178 u8 *eapKeyData; local 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1157 u8 *eapKeyData; local 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|