| /external/wpa_supplicant_8/src/eap_server/ |
| eap_server_tls.c | 254 u8 *eapKeyData; 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 262 if (eapKeyData) { 265 eapKeyData, EAP_TLS_KEY_LEN); 270 return eapKeyData; 277 u8 *eapKeyData, *emsk; 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 285 if (eapKeyData) { 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 290 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN) [all...] |
| eap_server_peap.c | 1195 u8 *eapKeyData; 1212 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1213 if (eapKeyData) { 1214 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1217 eapKeyData, EAP_TLS_KEY_LEN); 1223 return eapKeyData; 1227 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1230 if (eapKeyData) { 1233 eapKeyData, EAP_TLS_KEY_LEN); 1238 return eapKeyData; [all...] |
| eap_server.c | 240 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 241 sm->eap_if.eapKeyData = NULL; 510 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 512 sm->eap_if.eapKeyData = sm->m->getKey( 516 sm->eap_if.eapKeyData = NULL; 660 if (sm->eap_if.eapKeyData) 755 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 757 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 758 if (!sm->eap_if.eapKeyData) 766 sm->eap_if.eapKeyData, erp->rRK_len) < 0) [all...] |
| eap.h | 60 u8 *eapKeyData;
|
| eap_server_fast.c | [all...] |
| eap_server_ttls.c | 1175 u8 *eapKeyData; 1180 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1183 if (eapKeyData) { 1186 eapKeyData, EAP_TLS_KEY_LEN); 1191 return eapKeyData; [all...] |
| /external/wpa_supplicant_8/src/eap_peer/ |
| eap_i.h | 124 * Returns: %TRUE if key material (eapKeyData) is available 129 * getKey - Get EAP method specific keying material (eapKeyData) 133 * Returns: Keying material (eapKeyData) or %NULL if not available 323 u8 *eapKeyData; /* peer to lower layer */
|
| eap.c | 98 if (sm->eapKeyData) { 99 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 100 sm->eapKeyData = NULL; 684 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 795 if (sm->eapKeyData != NULL) [all...] |
| /external/wpa_supplicant_8/src/radius/ |
| radius_server.c | 751 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 764 sess->eap_if->eapKeyData, len); 779 sess->eap_if->eapKeyData + len, 780 len, sess->eap_if->eapKeyData, [all...] |
| /external/wpa_supplicant_8/src/ap/ |
| ieee802_1x.c | 170 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { 171 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting " 185 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 194 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, 212 if (sm == NULL || !sm->eap_if->eapKeyData) [all...] |