Searched refs:eapKeyData (Results 1 - 25 of 30) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_tls.c304 u8 *eapKeyData; local
309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
312 if (eapKeyData) {
315 eapKeyData, EAP_TLS_KEY_LEN);
320 return eapKeyData;
327 u8 *eapKeyData, *emsk; local
332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
335 if (eapKeyData) {
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE
[all...]
H A Deap_server.c241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
242 sm->eap_if.eapKeyData = NULL;
513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
515 sm->eap_if.eapKeyData = sm->m->getKey(
519 sm->eap_if.eapKeyData = NULL;
663 if (sm->eap_if.eapKeyData)
758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len);
761 if (!sm->eap_if.eapKeyData)
769 sm->eap_if.eapKeyData, er
[all...]
H A Deap_server_fast.c1558 u8 *eapKeyData; local
1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN);
1564 if (eapKeyData == NULL)
1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) {
1568 os_free(eapKeyData);
1573 return eapKeyData;
1580 u8 *eapKeyData; local
1585 eapKeyData = os_malloc(EAP_EMSK_LEN);
1586 if (eapKeyData == NULL)
1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) <
[all...]
H A Deap.h60 u8 *eapKeyData; member in struct:eap_eapol_interface
H A Deap_server_peap.c1297 u8 *eapKeyData; local
1314 eapKeyData = os_malloc(EAP_TLS_KEY_LEN);
1315 if (eapKeyData) {
1316 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN);
1319 eapKeyData, EAP_TLS_KEY_LEN);
1325 return eapKeyData;
1329 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1332 if (eapKeyData) {
1335 eapKeyData, EAP_TLS_KEY_LEN);
1340 return eapKeyData;
[all...]
H A Deap_server_ttls.c1265 u8 *eapKeyData; local
1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1273 if (eapKeyData) {
1276 eapKeyData, EAP_TLS_KEY_LEN);
1281 return eapKeyData;
1307 u8 *eapKeyData, *emsk; local
1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1315 if (eapKeyData) {
1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_tls.c304 u8 *eapKeyData; local
309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
312 if (eapKeyData) {
315 eapKeyData, EAP_TLS_KEY_LEN);
320 return eapKeyData;
327 u8 *eapKeyData, *emsk; local
332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
335 if (eapKeyData) {
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE
[all...]
H A Deap_server.c241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
242 sm->eap_if.eapKeyData = NULL;
513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
515 sm->eap_if.eapKeyData = sm->m->getKey(
519 sm->eap_if.eapKeyData = NULL;
663 if (sm->eap_if.eapKeyData)
758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len);
761 if (!sm->eap_if.eapKeyData)
769 sm->eap_if.eapKeyData, er
[all...]
H A Deap_server_fast.c1558 u8 *eapKeyData; local
1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN);
1564 if (eapKeyData == NULL)
1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) {
1568 os_free(eapKeyData);
1573 return eapKeyData;
1580 u8 *eapKeyData; local
1585 eapKeyData = os_malloc(EAP_EMSK_LEN);
1586 if (eapKeyData == NULL)
1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) <
[all...]
H A Deap.h60 u8 *eapKeyData; member in struct:eap_eapol_interface
H A Deap_server_peap.c1297 u8 *eapKeyData; local
1314 eapKeyData = os_malloc(EAP_TLS_KEY_LEN);
1315 if (eapKeyData) {
1316 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN);
1319 eapKeyData, EAP_TLS_KEY_LEN);
1325 return eapKeyData;
1329 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1332 if (eapKeyData) {
1335 eapKeyData, EAP_TLS_KEY_LEN);
1340 return eapKeyData;
[all...]
H A Deap_server_ttls.c1265 u8 *eapKeyData; local
1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1273 if (eapKeyData) {
1276 eapKeyData, EAP_TLS_KEY_LEN);
1281 return eapKeyData;
1307 u8 *eapKeyData, *emsk; local
1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1315 if (eapKeyData) {
1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_tls.c304 u8 *eapKeyData; local
309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
312 if (eapKeyData) {
315 eapKeyData, EAP_TLS_KEY_LEN);
320 return eapKeyData;
327 u8 *eapKeyData, *emsk; local
332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
335 if (eapKeyData) {
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE
[all...]
H A Deap_server.c241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
242 sm->eap_if.eapKeyData = NULL;
513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
515 sm->eap_if.eapKeyData = sm->m->getKey(
519 sm->eap_if.eapKeyData = NULL;
663 if (sm->eap_if.eapKeyData)
758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len);
761 if (!sm->eap_if.eapKeyData)
769 sm->eap_if.eapKeyData, er
[all...]
H A Deap_server_fast.c1558 u8 *eapKeyData; local
1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN);
1564 if (eapKeyData == NULL)
1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) {
1568 os_free(eapKeyData);
1573 return eapKeyData;
1580 u8 *eapKeyData; local
1585 eapKeyData = os_malloc(EAP_EMSK_LEN);
1586 if (eapKeyData == NULL)
1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) <
[all...]
H A Deap.h60 u8 *eapKeyData; member in struct:eap_eapol_interface
H A Deap_server_peap.c1297 u8 *eapKeyData; local
1314 eapKeyData = os_malloc(EAP_TLS_KEY_LEN);
1315 if (eapKeyData) {
1316 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN);
1319 eapKeyData, EAP_TLS_KEY_LEN);
1325 return eapKeyData;
1329 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1332 if (eapKeyData) {
1335 eapKeyData, EAP_TLS_KEY_LEN);
1340 return eapKeyData;
[all...]
H A Deap_server_ttls.c1265 u8 *eapKeyData; local
1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1273 if (eapKeyData) {
1276 eapKeyData, EAP_TLS_KEY_LEN);
1281 return eapKeyData;
1307 u8 *eapKeyData, *emsk; local
1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1315 if (eapKeyData) {
1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_i.h126 * Returns: %TRUE if key material (eapKeyData) is available
131 * getKey - Get EAP method specific keying material (eapKeyData)
135 * Returns: Keying material (eapKeyData) or %NULL if not available
336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
H A Deap.c106 if (sm->eapKeyData) {
107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen);
108 sm->eapKeyData = NULL;
920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
1031 if (sm->eapKeyData != NULL)
1911 sm->eapKeyData = os_malloc(erp->rRK_len);
1912 if (!sm->eapKeyData)
1921 sm->eapKeyData, erp->rRK_len) < 0) {
1927 sm->eapKeyData, sm->eapKeyDataLen);
2938 if (sm->eapKeyData !
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_i.h126 * Returns: %TRUE if key material (eapKeyData) is available
131 * getKey - Get EAP method specific keying material (eapKeyData)
135 * Returns: Keying material (eapKeyData) or %NULL if not available
336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
H A Deap.c106 if (sm->eapKeyData) {
107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen);
108 sm->eapKeyData = NULL;
920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
1031 if (sm->eapKeyData != NULL)
1911 sm->eapKeyData = os_malloc(erp->rRK_len);
1912 if (!sm->eapKeyData)
1921 sm->eapKeyData, erp->rRK_len) < 0) {
1927 sm->eapKeyData, sm->eapKeyDataLen);
2938 if (sm->eapKeyData !
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_i.h126 * Returns: %TRUE if key material (eapKeyData) is available
131 * getKey - Get EAP method specific keying material (eapKeyData)
135 * Returns: Keying material (eapKeyData) or %NULL if not available
336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
H A Deap.c106 if (sm->eapKeyData) {
107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen);
108 sm->eapKeyData = NULL;
920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
1031 if (sm->eapKeyData != NULL)
1911 sm->eapKeyData = os_malloc(erp->rRK_len);
1912 if (!sm->eapKeyData)
1921 sm->eapKeyData, erp->rRK_len) < 0) {
1927 sm->eapKeyData, sm->eapKeyDataLen);
2938 if (sm->eapKeyData !
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c762 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) {
775 sess->eap_if->eapKeyData, len);
790 sess->eap_if->eapKeyData + len,
791 len, sess->eap_if->eapKeyData,

Completed in 1293 milliseconds

12