HomeSort by relevance Sort by last modified time
    Searched refs:eapKeyData (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 304 u8 *eapKeyData;
309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
312 if (eapKeyData) {
315 eapKeyData, EAP_TLS_KEY_LEN);
320 return eapKeyData;
327 u8 *eapKeyData, *emsk;
332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
335 if (eapKeyData) {
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN)
    [all...]
eap_server.c 241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
242 sm->eap_if.eapKeyData = NULL;
511 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
513 sm->eap_if.eapKeyData = sm->m->getKey(
517 sm->eap_if.eapKeyData = NULL;
661 if (sm->eap_if.eapKeyData)
756 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
758 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len);
759 if (!sm->eap_if.eapKeyData)
767 sm->eap_if.eapKeyData, erp->rRK_len) < 0)
    [all...]
eap_server_fast.c     [all...]
eap.h 60 u8 *eapKeyData;
eap_server_peap.c     [all...]
eap_server_ttls.c     [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_i.h 124 * Returns: %TRUE if key material (eapKeyData) is available
129 * getKey - Get EAP method specific keying material (eapKeyData)
133 * Returns: Keying material (eapKeyData) or %NULL if not available
323 u8 *eapKeyData; /* peer to lower layer */
eap.c 100 if (sm->eapKeyData) {
101 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen);
102 sm->eapKeyData = NULL;
697 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
808 if (sm->eapKeyData != NULL)
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_server.c 754 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) {
767 sess->eap_if->eapKeyData, len);
782 sess->eap_if->eapKeyData + len,
783 len, sess->eap_if->eapKeyData,
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 176 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) {
177 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting "
191 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32);
200 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len,
218 if (sm == NULL || !sm->eap_if->eapKeyData)
    [all...]

Completed in 66 milliseconds