/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap.h | 60 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1553 u8 *eapKeyData; local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1559 if (eapKeyData == NULL) 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1565 return eapKeyData; 1572 u8 *eapKeyData; local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); 1578 if (eapKeyData == NULL) 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1584 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1195 u8 *eapKeyData; local 1212 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1213 if (eapKeyData) { 1214 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1217 eapKeyData, EAP_TLS_KEY_LEN); 1223 return eapKeyData; 1227 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1230 if (eapKeyData) { 1233 eapKeyData, EAP_TLS_KEY_LEN); 1238 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1175 u8 *eapKeyData; local 1180 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1183 if (eapKeyData) { 1186 eapKeyData, EAP_TLS_KEY_LEN); 1191 return eapKeyData; 1217 u8 *eapKeyData, *emsk; local 1222 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1225 if (eapKeyData) { 1228 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1230 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap.h | 60 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1553 u8 *eapKeyData; local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1559 if (eapKeyData == NULL) 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1565 return eapKeyData; 1572 u8 *eapKeyData; local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); 1578 if (eapKeyData == NULL) 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1584 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1195 u8 *eapKeyData; local 1212 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1213 if (eapKeyData) { 1214 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1217 eapKeyData, EAP_TLS_KEY_LEN); 1223 return eapKeyData; 1227 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1230 if (eapKeyData) { 1233 eapKeyData, EAP_TLS_KEY_LEN); 1238 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1175 u8 *eapKeyData; local 1180 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1183 if (eapKeyData) { 1186 eapKeyData, EAP_TLS_KEY_LEN); 1191 return eapKeyData; 1217 u8 *eapKeyData, *emsk; local 1222 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1225 if (eapKeyData) { 1228 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1230 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 254 u8 *eapKeyData; local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap.h | 60 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_fast.c | 1553 u8 *eapKeyData; local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1559 if (eapKeyData == NULL) 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1565 return eapKeyData; 1572 u8 *eapKeyData; local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); 1578 if (eapKeyData == NULL) 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1584 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1195 u8 *eapKeyData; local 1212 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1213 if (eapKeyData) { 1214 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1217 eapKeyData, EAP_TLS_KEY_LEN); 1223 return eapKeyData; 1227 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1230 if (eapKeyData) { 1233 eapKeyData, EAP_TLS_KEY_LEN); 1238 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1175 u8 *eapKeyData; local 1180 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1183 if (eapKeyData) { 1186 eapKeyData, EAP_TLS_KEY_LEN); 1191 return eapKeyData; 1217 u8 *eapKeyData, *emsk; local 1222 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1225 if (eapKeyData) { 1228 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1230 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 124 * Returns: %TRUE if key material (eapKeyData) is available 129 * getKey - Get EAP method specific keying material (eapKeyData) 133 * Returns: Keying material (eapKeyData) or %NULL if not available 323 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 124 * Returns: %TRUE if key material (eapKeyData) is available 129 * getKey - Get EAP method specific keying material (eapKeyData) 133 * Returns: Keying material (eapKeyData) or %NULL if not available 323 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 124 * Returns: %TRUE if key material (eapKeyData) is available 129 * getKey - Get EAP method specific keying material (eapKeyData) 133 * Returns: Keying material (eapKeyData) or %NULL if not available 323 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|