/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls.c | 254 u8 *eapKeyData; 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 os_free(eapKeyData); [all...] |
eap_server_peap.c | 1178 u8 *eapKeyData; 1195 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1196 if (eapKeyData) { 1197 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1200 eapKeyData, EAP_TLS_KEY_LEN); 1206 return eapKeyData; 1210 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1213 if (eapKeyData) { 1216 eapKeyData, EAP_TLS_KEY_LEN); 1221 return eapKeyData; [all...] |
eap.h | 59 u8 *eapKeyData;
|
eap_server.c | 171 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 172 sm->eap_if.eapKeyData = NULL; 349 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 351 sm->eap_if.eapKeyData = sm->m->getKey( 355 sm->eap_if.eapKeyData = NULL; 486 if (sm->eap_if.eapKeyData) 633 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 635 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 636 sm->eap_if.eapKeyData = NULL; [all...] |
eap_server_fast.c | [all...] |
eap_server_ttls.c | 1157 u8 *eapKeyData; 1162 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1165 if (eapKeyData) { 1168 eapKeyData, EAP_TLS_KEY_LEN); 1173 return eapKeyData;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_i.h | 123 * Returns: %TRUE if key material (eapKeyData) is available 128 * getKey - Get EAP method specific keying material (eapKeyData) 132 * Returns: Keying material (eapKeyData) or %NULL if not available 312 u8 *eapKeyData; /* peer to lower layer */
|
eap.c | 97 if (sm->eapKeyData) { 98 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 99 sm->eapKeyData = NULL; 418 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 526 if (sm->eapKeyData != NULL) [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 736 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 749 sess->eap_if->eapKeyData, len); 764 sess->eap_if->eapKeyData + len, 765 len, sess->eap_if->eapKeyData, [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 156 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { 157 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting " 171 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 180 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, 198 if (sm == NULL || !sm->eap_if->eapKeyData) [all...] |