/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
H A D | eap_server_peap.c | 1178 u8 *eapKeyData; local 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
H A D | eap.h | 59 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server.c | 171 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 172 sm->eap_if.eapKeyData = NULL; 349 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 351 sm->eap_if.eapKeyData = sm->m->getKey( 355 sm->eap_if.eapKeyData = NULL; 486 if (sm->eap_if.eapKeyData) 633 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 635 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 636 sm->eap_if.eapKeyData = NULL; 1355 bin_clear_free(sm->eap_if.eapKeyData, s [all...] |
H A D | eap_server_fast.c | 1551 u8 *eapKeyData; local 1556 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1557 if (eapKeyData == NULL) 1560 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1563 return eapKeyData; 1570 u8 *eapKeyData; local 1575 eapKeyData = os_malloc(EAP_EMSK_LEN); 1576 if (eapKeyData == NULL) 1579 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1582 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1157 u8 *eapKeyData; local 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
H A D | eap_server_peap.c | 1178 u8 *eapKeyData; local 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
H A D | eap.h | 59 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server.c | 171 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 172 sm->eap_if.eapKeyData = NULL; 349 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 351 sm->eap_if.eapKeyData = sm->m->getKey( 355 sm->eap_if.eapKeyData = NULL; 486 if (sm->eap_if.eapKeyData) 633 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 635 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 636 sm->eap_if.eapKeyData = NULL; 1355 bin_clear_free(sm->eap_if.eapKeyData, s [all...] |
H A D | eap_server_fast.c | 1551 u8 *eapKeyData; local 1556 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1557 if (eapKeyData == NULL) 1560 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1563 return eapKeyData; 1570 u8 *eapKeyData; local 1575 eapKeyData = os_malloc(EAP_EMSK_LEN); 1576 if (eapKeyData == NULL) 1579 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1582 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1157 u8 *eapKeyData; local 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
H A D | eap_server_peap.c | 1178 u8 *eapKeyData; local 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
H A D | eap.h | 59 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server.c | 171 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 172 sm->eap_if.eapKeyData = NULL; 349 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 351 sm->eap_if.eapKeyData = sm->m->getKey( 355 sm->eap_if.eapKeyData = NULL; 486 if (sm->eap_if.eapKeyData) 633 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 635 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 636 sm->eap_if.eapKeyData = NULL; 1355 bin_clear_free(sm->eap_if.eapKeyData, s [all...] |
H A D | eap_server_fast.c | 1551 u8 *eapKeyData; local 1556 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1557 if (eapKeyData == NULL) 1560 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1563 return eapKeyData; 1570 u8 *eapKeyData; local 1575 eapKeyData = os_malloc(EAP_EMSK_LEN); 1576 if (eapKeyData == NULL) 1579 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1582 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1157 u8 *eapKeyData; local 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 97 if (sm->eapKeyData) { 98 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 99 sm->eapKeyData = NULL; 418 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 526 if (sm->eapKeyData != NULL) 2208 if (sm->eapKeyData != NULL) 2245 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The 2252 if (sm == NULL || sm->eapKeyData == NULL) { 2258 return sm->eapKeyData;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 97 if (sm->eapKeyData) { 98 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 99 sm->eapKeyData = NULL; 418 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 526 if (sm->eapKeyData != NULL) 2208 if (sm->eapKeyData != NULL) 2245 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The 2252 if (sm == NULL || sm->eapKeyData == NULL) { 2258 return sm->eapKeyData;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 97 if (sm->eapKeyData) { 98 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 99 sm->eapKeyData = NULL; 418 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 526 if (sm->eapKeyData != NULL) 2208 if (sm->eapKeyData != NULL) 2245 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The 2252 if (sm == NULL || sm->eapKeyData == NULL) { 2258 return sm->eapKeyData;
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 736 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 749 sess->eap_if->eapKeyData, len); 764 sess->eap_if->eapKeyData + len, 765 len, sess->eap_if->eapKeyData,
|