/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || 1696 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 1752 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
|
H A D | eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 182 if (data->key_data) { 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 184 data->key_data = NULL; 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 276 if (!data->key_data) { 282 data->key_data, EAP_TLS_KEY_LEN); 284 data->key_data + EAP_TLS_KEY_LEN, 1730 return data->key_data != NULL && data->phase2_success; 1739 if (data->key_data [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || 1696 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 1752 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
|
H A D | eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 182 if (data->key_data) { 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 184 data->key_data = NULL; 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 276 if (!data->key_data) { 282 data->key_data, EAP_TLS_KEY_LEN); 284 data->key_data + EAP_TLS_KEY_LEN, 1730 return data->key_data != NULL && data->phase2_success; 1739 if (data->key_data [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data 250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 || 1696 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN); 1752 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
|
H A D | eap_ttls.c | 57 u8 *key_data; member in struct:eap_ttls_data 182 if (data->key_data) { 183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); 184 data->key_data = NULL; 272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl, 276 if (!data->key_data) { 282 data->key_data, EAP_TLS_KEY_LEN); 284 data->key_data + EAP_TLS_KEY_LEN, 1730 return data->key_data != NULL && data->phase2_success; 1739 if (data->key_data [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 137 u8 *key_data, size_t key_len) 182 os_memcpy((u8 *) (key + 1), key_data, key_len); 134 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
|
H A D | wpa_auth.c | 887 const u8 *eapol_key_ie, *key_data; local 904 key_data = (const u8 *) (key192 + 1); 907 key_data = (const u8 *) (key + 1); 915 "key_data overflow (%d > %lu)", 1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) { 1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length); 1297 wpa_smk_m1(wpa_auth, sm, key, key_data, 1301 wpa_parse_kde_ies(key_data, key_data_length, 1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length); 1422 u8 *key_data; local [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 447 u16 ver, const u8 *key_data, 471 key_data, key_data_len); 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1188 u16 ver, const u8 *key_data, 1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); 1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1368 const u8 *key_data, 1411 os_memcpy(gd->gtk, key_data, key_data_len); 1436 key_data, gd->gtk)) { 1498 const u8 *key_data, 444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1771 u8 *key_data; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 137 u8 *key_data, size_t key_len) 182 os_memcpy((u8 *) (key + 1), key_data, key_len); 134 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
|
H A D | wpa_auth.c | 887 const u8 *eapol_key_ie, *key_data; local 904 key_data = (const u8 *) (key192 + 1); 907 key_data = (const u8 *) (key + 1); 915 "key_data overflow (%d > %lu)", 1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) { 1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length); 1297 wpa_smk_m1(wpa_auth, sm, key, key_data, 1301 wpa_parse_kde_ies(key_data, key_data_length, 1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length); 1422 u8 *key_data; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 447 u16 ver, const u8 *key_data, 471 key_data, key_data_len); 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1188 u16 ver, const u8 *key_data, 1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); 1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1368 const u8 *key_data, 1411 os_memcpy(gd->gtk, key_data, key_data_len); 1436 key_data, gd->gtk)) { 1498 const u8 *key_data, 444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1771 u8 *key_data; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config.c | 58 int key_data; member in struct:parse_data 81 data->key_data ? "[KEY DATA REMOVED]" : value); 85 if (data->key_data) { 2640 if (field->key_data && !get_keys) 2741 if (field->key_data) { 2744 "key_data field to be "
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 137 u8 *key_data, size_t key_len) 182 os_memcpy((u8 *) (key + 1), key_data, key_len); 134 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
|
H A D | wpa_auth.c | 887 const u8 *eapol_key_ie, *key_data; local 904 key_data = (const u8 *) (key192 + 1); 907 key_data = (const u8 *) (key + 1); 915 "key_data overflow (%d > %lu)", 1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) { 1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length); 1297 wpa_smk_m1(wpa_auth, sm, key, key_data, 1301 wpa_parse_kde_ies(key_data, key_data_length, 1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length); 1422 u8 *key_data; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 447 u16 ver, const u8 *key_data, 471 key_data, key_data_len); 472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1188 u16 ver, const u8 *key_data, 1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); 1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 1368 const u8 *key_data, 1411 os_memcpy(gd->gtk, key_data, key_data_len); 1436 key_data, gd->gtk)) { 1498 const u8 *key_data, 444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1771 u8 *key_data; local [all...] |
/external/boringssl/include/openssl/ |
H A D | x509.h | 455 char *key_data; member in struct:private_key_st 456 int key_free; /* true if we should auto free key_data */
|
/external/boringssl/src/include/openssl/ |
H A D | x509.h | 455 char *key_data; member in struct:private_key_st 456 int key_free; /* true if we should auto free key_data */
|