/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tls.c | 203 u8 *eapKeyData; 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
eap.h | 64 u8 *eapKeyData;
|
eap.c | 142 os_free(sm->eap_if.eapKeyData); 143 sm->eap_if.eapKeyData = NULL; 306 os_free(sm->eap_if.eapKeyData); 308 sm->eap_if.eapKeyData = sm->m->getKey( 312 sm->eap_if.eapKeyData = NULL; 424 if (sm->eap_if.eapKeyData) 568 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 570 os_free(sm->eap_if.eapKeyData); 571 sm->eap_if.eapKeyData = NULL; 1263 os_free(sm->eap_if.eapKeyData); [all...] |
eap_fast.c | [all...] |
eap_peap.c | [all...] |
eap_ttls.c | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 203 u8 *eapKeyData; 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
eap.h | 64 u8 *eapKeyData;
|
eap_server.c | 143 os_free(sm->eap_if.eapKeyData); 144 sm->eap_if.eapKeyData = NULL; 313 os_free(sm->eap_if.eapKeyData); 315 sm->eap_if.eapKeyData = sm->m->getKey( 319 sm->eap_if.eapKeyData = NULL; 437 if (sm->eap_if.eapKeyData) 584 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 586 os_free(sm->eap_if.eapKeyData); 587 sm->eap_if.eapKeyData = NULL; [all...] |
eap_server_fast.c | [all...] |
eap_server_peap.c | [all...] |
eap_server_ttls.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.c | 152 os_free(sm->eapKeyData); 153 sm->eapKeyData = NULL; 367 os_free(sm->eapKeyData); 368 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 461 if (sm->eapKeyData != NULL) [all...] |
eap_i.h | 129 * Returns: %TRUE if key material (eapKeyData) is available 134 * getKey - Get EAP method specific keying material (eapKeyData) 138 * Returns: Keying material (eapKeyData) or %NULL if not available 305 u8 *eapKeyData; /* peer to lower layer */
|
/external/wpa_supplicant/ |
eap_i.h | 130 * Returns: %TRUE if key material (eapKeyData) is available 135 * getKey - Get EAP method specific keying material (eapKeyData) 139 * Returns: Keying material (eapKeyData) or %NULL if not available 308 u8 *eapKeyData; /* peer to lower layer */
|
eap.c | 123 os_free(sm->eapKeyData); 124 sm->eapKeyData = NULL; 340 os_free(sm->eapKeyData); 341 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 447 if (sm->eapKeyData != NULL) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_i.h | 129 * Returns: %TRUE if key material (eapKeyData) is available 134 * getKey - Get EAP method specific keying material (eapKeyData) 138 * Returns: Keying material (eapKeyData) or %NULL if not available 305 u8 *eapKeyData; /* peer to lower layer */
|
eap.c | 153 os_free(sm->eapKeyData); 154 sm->eapKeyData = NULL; 376 os_free(sm->eapKeyData); 377 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 470 if (sm->eapKeyData != NULL) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 195 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { 196 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting " 210 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 219 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, 341 if (sm == NULL || !sm->eap_if->eapKeyData) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_server.c | 387 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 397 sess->eap_if->eapKeyData + len, 398 len, sess->eap_if->eapKeyData,
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 575 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 585 sess->eap_if->eapKeyData + len, 586 len, sess->eap_if->eapKeyData, [all...] |