Searched defs:key_data (Results 26 - 43 of 43) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data
250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 ||
1696 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
1752 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
H A Deap_ttls.c57 u8 *key_data; member in struct:eap_ttls_data
182 if (data->key_data) {
183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
184 data->key_data = NULL;
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
276 if (!data->key_data) {
282 data->key_data, EAP_TLS_KEY_LEN);
284 data->key_data + EAP_TLS_KEY_LEN,
1730 return data->key_data != NULL && data->phase2_success;
1739 if (data->key_data
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_fast.c55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data
250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 ||
1696 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
1752 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
H A Deap_ttls.c57 u8 *key_data; member in struct:eap_ttls_data
182 if (data->key_data) {
183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
184 data->key_data = NULL;
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
276 if (!data->key_data) {
282 data->key_data, EAP_TLS_KEY_LEN);
284 data->key_data + EAP_TLS_KEY_LEN,
1730 return data->key_data != NULL && data->phase2_success;
1739 if (data->key_data
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_fast.c55 u8 key_data[EAP_FAST_KEY_LEN]; member in struct:eap_fast_data
250 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
261 if (eap_fast_derive_eap_msk(data->simck, data->key_data) < 0 ||
1696 os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
1752 os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
H A Deap_ttls.c57 u8 *key_data; member in struct:eap_ttls_data
182 if (data->key_data) {
183 bin_clear_free(data->key_data, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
184 data->key_data = NULL;
272 data->key_data = eap_peer_tls_derive_key(sm, &data->ssl,
276 if (!data->key_data) {
282 data->key_data, EAP_TLS_KEY_LEN);
284 data->key_data + EAP_TLS_KEY_LEN,
1730 return data->key_data != NULL && data->phase2_success;
1739 if (data->key_data
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.c137 u8 *key_data, size_t key_len)
182 os_memcpy((u8 *) (key + 1), key_data, key_len);
134 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
H A Dwpa_auth.c887 const u8 *eapol_key_ie, *key_data; local
904 key_data = (const u8 *) (key192 + 1);
907 key_data = (const u8 *) (key + 1);
915 "key_data overflow (%d > %lu)",
1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length);
1297 wpa_smk_m1(wpa_auth, sm, key, key_data,
1301 wpa_parse_kde_ies(key_data, key_data_length,
1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length);
1422 u8 *key_data; local
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c447 u16 ver, const u8 *key_data,
471 key_data, key_data_len);
472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1188 u16 ver, const u8 *key_data,
1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len);
1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1368 const u8 *key_data,
1411 os_memcpy(gd->gtk, key_data, key_data_len);
1436 key_data, gd->gtk)) {
1498 const u8 *key_data,
444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1771 u8 *key_data; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.c137 u8 *key_data, size_t key_len)
182 os_memcpy((u8 *) (key + 1), key_data, key_len);
134 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
H A Dwpa_auth.c887 const u8 *eapol_key_ie, *key_data; local
904 key_data = (const u8 *) (key192 + 1);
907 key_data = (const u8 *) (key + 1);
915 "key_data overflow (%d > %lu)",
1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length);
1297 wpa_smk_m1(wpa_auth, sm, key, key_data,
1301 wpa_parse_kde_ies(key_data, key_data_length,
1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length);
1422 u8 *key_data; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c447 u16 ver, const u8 *key_data,
471 key_data, key_data_len);
472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1188 u16 ver, const u8 *key_data,
1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len);
1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1368 const u8 *key_data,
1411 os_memcpy(gd->gtk, key_data, key_data_len);
1436 key_data, gd->gtk)) {
1498 const u8 *key_data,
444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1771 u8 *key_data; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dconfig.c58 int key_data; member in struct:parse_data
81 data->key_data ? "[KEY DATA REMOVED]" : value);
85 if (data->key_data) {
2640 if (field->key_data && !get_keys)
2741 if (field->key_data) {
2744 "key_data field to be "
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.c137 u8 *key_data, size_t key_len)
182 os_memcpy((u8 *) (key + 1), key_data, key_len);
134 ieee802_1x_tx_key_one(struct hostapd_data *hapd, struct sta_info *sta, int idx, int broadcast, u8 *key_data, size_t key_len) argument
H A Dwpa_auth.c887 const u8 *eapol_key_ie, *key_data; local
904 key_data = (const u8 *) (key192 + 1);
907 key_data = (const u8 *) (key + 1);
915 "key_data overflow (%d > %lu)",
1125 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
1282 wpa_smk_error(wpa_auth, sm, key_data, key_data_length);
1297 wpa_smk_m1(wpa_auth, sm, key, key_data,
1301 wpa_parse_kde_ies(key_data, key_data_length,
1340 wpa_smk_m3(wpa_auth, sm, key, key_data, key_data_length);
1422 u8 *key_data; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c447 u16 ver, const u8 *key_data,
471 key_data, key_data_len);
472 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1188 u16 ver, const u8 *key_data,
1200 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len);
1201 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
1368 const u8 *key_data,
1411 os_memcpy(gd->gtk, key_data, key_data_len);
1436 key_data, gd->gtk)) {
1498 const u8 *key_data,
444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1771 u8 *key_data; local
[all...]
/external/boringssl/include/openssl/
H A Dx509.h455 char *key_data; member in struct:private_key_st
456 int key_free; /* true if we should auto free key_data */
/external/boringssl/src/include/openssl/
H A Dx509.h455 char *key_data; member in struct:private_key_st
456 int key_free; /* true if we should auto free key_data */

Completed in 346 milliseconds

12