HomeSort by relevance Sort by last modified time
    Searched refs:eapKeyData (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/eap_server/
eap_server_tls.c 304 u8 *eapKeyData;
309 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
312 if (eapKeyData) {
315 eapKeyData, EAP_TLS_KEY_LEN);
320 return eapKeyData;
327 u8 *eapKeyData, *emsk;
332 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
335 if (eapKeyData) {
338 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
340 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN)
    [all...]
eap_server.c 241 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
242 sm->eap_if.eapKeyData = NULL;
513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
515 sm->eap_if.eapKeyData = sm->m->getKey(
519 sm->eap_if.eapKeyData = NULL;
663 if (sm->eap_if.eapKeyData)
758 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen);
760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len);
761 if (!sm->eap_if.eapKeyData)
769 sm->eap_if.eapKeyData, erp->rRK_len) < 0)
    [all...]
eap_server_fast.c     [all...]
eap.h 60 u8 *eapKeyData;
eap_server_peap.c     [all...]
eap_server_ttls.c     [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_i.h 126 * Returns: %TRUE if key material (eapKeyData) is available
131 * getKey - Get EAP method specific keying material (eapKeyData)
135 * Returns: Keying material (eapKeyData) or %NULL if not available
336 u8 *eapKeyData; /* peer to lower layer */
eap.c 106 if (sm->eapKeyData) {
107 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen);
108 sm->eapKeyData = NULL;
920 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
1031 if (sm->eapKeyData != NULL)
    [all...]
  /external/wpa_supplicant_8/src/radius/
radius_server.c 762 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) {
775 sess->eap_if->eapKeyData, len);
790 sess->eap_if->eapKeyData + len,
791 len, sess->eap_if->eapKeyData,
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 178 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) {
179 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting "
193 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32);
202 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len,
220 if (sm == NULL || !sm->eap_if->eapKeyData)
    [all...]

Completed in 268 milliseconds