/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 304 u8 *eapKeyData; local 309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 312 if (eapKeyData) { 315 eapKeyData, EAP_TLS_KEY_LEN); 320 return eapKeyData; 327 u8 *eapKeyData, *emsk; local 332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 335 if (eapKeyData) { 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap_server.c | 241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 242 sm->eap_if.eapKeyData = NULL; 513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 515 sm->eap_if.eapKeyData = sm->m->getKey( 519 sm->eap_if.eapKeyData = NULL; 663 if (sm->eap_if.eapKeyData) 758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 761 if (!sm->eap_if.eapKeyData) 769 sm->eap_if.eapKeyData, er [all...] |
H A D | eap_server_fast.c | 1558 u8 *eapKeyData; local 1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1564 if (eapKeyData == NULL) 1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { 1568 os_free(eapKeyData); 1573 return eapKeyData; 1580 u8 *eapKeyData; local 1585 eapKeyData = os_malloc(EAP_EMSK_LEN); 1586 if (eapKeyData == NULL) 1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < [all...] |
H A D | eap.h | 60 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_peap.c | 1297 u8 *eapKeyData; local 1314 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1315 if (eapKeyData) { 1316 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1319 eapKeyData, EAP_TLS_KEY_LEN); 1325 return eapKeyData; 1329 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1332 if (eapKeyData) { 1335 eapKeyData, EAP_TLS_KEY_LEN); 1340 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1265 u8 *eapKeyData; local 1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1273 if (eapKeyData) { 1276 eapKeyData, EAP_TLS_KEY_LEN); 1281 return eapKeyData; 1307 u8 *eapKeyData, *emsk; local 1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1315 if (eapKeyData) { 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls.c | 304 u8 *eapKeyData; local 309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 312 if (eapKeyData) { 315 eapKeyData, EAP_TLS_KEY_LEN); 320 return eapKeyData; 327 u8 *eapKeyData, *emsk; local 332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 335 if (eapKeyData) { 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap_server.c | 241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 242 sm->eap_if.eapKeyData = NULL; 513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 515 sm->eap_if.eapKeyData = sm->m->getKey( 519 sm->eap_if.eapKeyData = NULL; 663 if (sm->eap_if.eapKeyData) 758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 761 if (!sm->eap_if.eapKeyData) 769 sm->eap_if.eapKeyData, er [all...] |
H A D | eap_server_fast.c | 1558 u8 *eapKeyData; local 1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1564 if (eapKeyData == NULL) 1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { 1568 os_free(eapKeyData); 1573 return eapKeyData; 1580 u8 *eapKeyData; local 1585 eapKeyData = os_malloc(EAP_EMSK_LEN); 1586 if (eapKeyData == NULL) 1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < [all...] |
H A D | eap.h | 60 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_peap.c | 1297 u8 *eapKeyData; local 1314 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1315 if (eapKeyData) { 1316 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1319 eapKeyData, EAP_TLS_KEY_LEN); 1325 return eapKeyData; 1329 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1332 if (eapKeyData) { 1335 eapKeyData, EAP_TLS_KEY_LEN); 1340 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1265 u8 *eapKeyData; local 1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1273 if (eapKeyData) { 1276 eapKeyData, EAP_TLS_KEY_LEN); 1281 return eapKeyData; 1307 u8 *eapKeyData, *emsk; local 1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1315 if (eapKeyData) { 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls.c | 304 u8 *eapKeyData; local 309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 312 if (eapKeyData) { 315 eapKeyData, EAP_TLS_KEY_LEN); 320 return eapKeyData; 327 u8 *eapKeyData, *emsk; local 332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 335 if (eapKeyData) { 338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap_server.c | 241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 242 sm->eap_if.eapKeyData = NULL; 513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 515 sm->eap_if.eapKeyData = sm->m->getKey( 519 sm->eap_if.eapKeyData = NULL; 663 if (sm->eap_if.eapKeyData) 758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 761 if (!sm->eap_if.eapKeyData) 769 sm->eap_if.eapKeyData, er [all...] |
H A D | eap_server_fast.c | 1558 u8 *eapKeyData; local 1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1564 if (eapKeyData == NULL) 1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { 1568 os_free(eapKeyData); 1573 return eapKeyData; 1580 u8 *eapKeyData; local 1585 eapKeyData = os_malloc(EAP_EMSK_LEN); 1586 if (eapKeyData == NULL) 1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < [all...] |
H A D | eap.h | 60 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server_peap.c | 1297 u8 *eapKeyData; local 1314 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1315 if (eapKeyData) { 1316 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1319 eapKeyData, EAP_TLS_KEY_LEN); 1325 return eapKeyData; 1329 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1332 if (eapKeyData) { 1335 eapKeyData, EAP_TLS_KEY_LEN); 1340 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1265 u8 *eapKeyData; local 1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1273 if (eapKeyData) { 1276 eapKeyData, EAP_TLS_KEY_LEN); 1281 return eapKeyData; 1307 u8 *eapKeyData, *emsk; local 1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1315 if (eapKeyData) { 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 126 * Returns: %TRUE if key material (eapKeyData) is available 131 * getKey - Get EAP method specific keying material (eapKeyData) 135 * Returns: Keying material (eapKeyData) or %NULL if not available 336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 106 if (sm->eapKeyData) { 107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 108 sm->eapKeyData = NULL; 920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 1031 if (sm->eapKeyData != NULL) 1911 sm->eapKeyData = os_malloc(erp->rRK_len); 1912 if (!sm->eapKeyData) 1921 sm->eapKeyData, erp->rRK_len) < 0) { 1927 sm->eapKeyData, sm->eapKeyDataLen); 2938 if (sm->eapKeyData ! [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 126 * Returns: %TRUE if key material (eapKeyData) is available 131 * getKey - Get EAP method specific keying material (eapKeyData) 135 * Returns: Keying material (eapKeyData) or %NULL if not available 336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 106 if (sm->eapKeyData) { 107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 108 sm->eapKeyData = NULL; 920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 1031 if (sm->eapKeyData != NULL) 1911 sm->eapKeyData = os_malloc(erp->rRK_len); 1912 if (!sm->eapKeyData) 1921 sm->eapKeyData, erp->rRK_len) < 0) { 1927 sm->eapKeyData, sm->eapKeyDataLen); 2938 if (sm->eapKeyData ! [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 126 * Returns: %TRUE if key material (eapKeyData) is available 131 * getKey - Get EAP method specific keying material (eapKeyData) 135 * Returns: Keying material (eapKeyData) or %NULL if not available 336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 106 if (sm->eapKeyData) { 107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 108 sm->eapKeyData = NULL; 920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 1031 if (sm->eapKeyData != NULL) 1911 sm->eapKeyData = os_malloc(erp->rRK_len); 1912 if (!sm->eapKeyData) 1921 sm->eapKeyData, erp->rRK_len) < 0) { 1927 sm->eapKeyData, sm->eapKeyDataLen); 2938 if (sm->eapKeyData ! [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 762 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 775 sess->eap_if->eapKeyData, len); 790 sess->eap_if->eapKeyData + len, 791 len, sess->eap_if->eapKeyData,
|