/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_tls.c | 326 u8 *eapKeyData; in eap_tls_getKey() local 342 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey() 345 if (eapKeyData) { in eap_tls_getKey() 348 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey() 349 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_tls_getKey() 354 return eapKeyData; in eap_tls_getKey() 361 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 377 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk() 380 if (eapKeyData) { in eap_tls_get_emsk() 383 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() [all …]
|
D | eap_server_peap.c | 1332 u8 *eapKeyData; in eap_peap_getKey() local 1353 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey() 1354 if (eapKeyData) { in eap_peap_getKey() 1355 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1358 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1366 return eapKeyData; in eap_peap_getKey() 1378 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey() 1381 if (eapKeyData) { in eap_peap_getKey() 1382 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_peap_getKey() 1385 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() [all …]
|
D | eap_server.c | 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 239 sm->eap_if.eapKeyData = NULL; in SM_STATE() 520 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 522 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE() 526 sm->eap_if.eapKeyData = NULL; in SM_STATE() 673 if (sm->eap_if.eapKeyData) in SM_STATE() 769 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in erp_send_finish_reauth() 771 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth() 772 if (!sm->eap_if.eapKeyData) in erp_send_finish_reauth() 780 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth() [all …]
|
D | eap_server_fast.c | 1576 u8 *eapKeyData; in eap_fast_getKey() local 1581 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey() 1582 if (eapKeyData == NULL) in eap_fast_getKey() 1585 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { in eap_fast_getKey() 1586 os_free(eapKeyData); in eap_fast_getKey() 1591 return eapKeyData; in eap_fast_getKey() 1598 u8 *eapKeyData; in eap_fast_get_emsk() local 1603 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk() 1604 if (eapKeyData == NULL) in eap_fast_get_emsk() 1607 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < 0) { in eap_fast_get_emsk() [all …]
|
D | eap_server_ttls.c | 1273 u8 *eapKeyData; in eap_ttls_getKey() local 1290 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey() 1293 if (eapKeyData) { in eap_ttls_getKey() 1296 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey() 1301 return eapKeyData; in eap_ttls_getKey() 1327 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local 1344 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_get_emsk() 1347 if (eapKeyData) { in eap_ttls_get_emsk() 1350 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk() 1352 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_get_emsk()
|
D | eap_server_teap.c | 2004 u8 *eapKeyData; in eap_teap_getKey() local 2009 eapKeyData = os_malloc(EAP_TEAP_KEY_LEN); in eap_teap_getKey() 2010 if (!eapKeyData) in eap_teap_getKey() 2016 eapKeyData) < 0) { in eap_teap_getKey() 2017 os_free(eapKeyData); in eap_teap_getKey() 2022 return eapKeyData; in eap_teap_getKey() 2029 u8 *eapKeyData; in eap_teap_get_emsk() local 2034 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_teap_get_emsk() 2035 if (!eapKeyData) in eap_teap_get_emsk() 2041 eapKeyData) < 0) { in eap_teap_get_emsk() [all …]
|
D | eap.h | 63 u8 *eapKeyData; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_tls.c | 358 u8 *eapKeyData; in eap_tls_getKey() local 374 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey() 377 if (eapKeyData) { in eap_tls_getKey() 380 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey() 381 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_tls_getKey() 386 return eapKeyData; in eap_tls_getKey() 393 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 409 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk() 412 if (eapKeyData) { in eap_tls_get_emsk() 415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() [all …]
|
D | eap_server_peap.c | 1301 u8 *eapKeyData; in eap_peap_getKey() local 1318 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey() 1319 if (eapKeyData) { in eap_peap_getKey() 1320 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1323 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1331 return eapKeyData; in eap_peap_getKey() 1335 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey() 1338 if (eapKeyData) { in eap_peap_getKey() 1339 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_peap_getKey() 1342 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() [all …]
|
D | eap_server.c | 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 239 sm->eap_if.eapKeyData = NULL; in SM_STATE() 513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 515 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE() 519 sm->eap_if.eapKeyData = NULL; in SM_STATE() 666 if (sm->eap_if.eapKeyData) in SM_STATE() 761 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in erp_send_finish_reauth() 763 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth() 764 if (!sm->eap_if.eapKeyData) in erp_send_finish_reauth() 772 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth() [all …]
|
D | eap_server_fast.c | 1558 u8 *eapKeyData; in eap_fast_getKey() local 1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey() 1564 if (eapKeyData == NULL) in eap_fast_getKey() 1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { in eap_fast_getKey() 1568 os_free(eapKeyData); in eap_fast_getKey() 1573 return eapKeyData; in eap_fast_getKey() 1580 u8 *eapKeyData; in eap_fast_get_emsk() local 1585 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk() 1586 if (eapKeyData == NULL) in eap_fast_get_emsk() 1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < 0) { in eap_fast_get_emsk() [all …]
|
D | eap_server_ttls.c | 1265 u8 *eapKeyData; in eap_ttls_getKey() local 1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey() 1273 if (eapKeyData) { in eap_ttls_getKey() 1276 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey() 1281 return eapKeyData; in eap_ttls_getKey() 1307 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local 1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_get_emsk() 1315 if (eapKeyData) { in eap_ttls_get_emsk() 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk() 1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_get_emsk()
|
D | eap_server_teap.c | 1845 u8 *eapKeyData; in eap_teap_getKey() local 1850 eapKeyData = os_malloc(EAP_TEAP_KEY_LEN); in eap_teap_getKey() 1851 if (!eapKeyData) in eap_teap_getKey() 1856 if (eap_teap_derive_eap_msk(data->simck_msk, eapKeyData) < 0) { in eap_teap_getKey() 1857 os_free(eapKeyData); in eap_teap_getKey() 1862 return eapKeyData; in eap_teap_getKey() 1869 u8 *eapKeyData; in eap_teap_get_emsk() local 1874 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_teap_get_emsk() 1875 if (!eapKeyData) in eap_teap_get_emsk() 1880 if (eap_teap_derive_eap_emsk(data->simck_msk, eapKeyData) < 0) { in eap_teap_get_emsk() [all …]
|
D | eap.h | 63 u8 *eapKeyData; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap.c | 108 if (sm->eapKeyData) { in eap_sm_free_key() 109 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); in eap_sm_free_key() 110 sm->eapKeyData = NULL; in eap_sm_free_key() 928 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE() 1039 if (sm->eapKeyData != NULL) in SM_STATE() 1919 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish() 1920 if (!sm->eapKeyData) in eap_peer_finish() 1929 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish() 1935 sm->eapKeyData, sm->eapKeyDataLen); in eap_peer_finish() 2943 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success() [all …]
|
D | eap_i.h | 336 u8 *eapKeyData; /* peer to lower layer */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap.c | 109 if (sm->eapKeyData) { in eap_sm_free_key() 110 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); in eap_sm_free_key() 111 sm->eapKeyData = NULL; in eap_sm_free_key() 937 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE() 1050 if (sm->eapKeyData != NULL) in SM_STATE() 1957 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish() 1958 if (!sm->eapKeyData) in eap_peer_finish() 1967 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish() 1973 sm->eapKeyData, sm->eapKeyDataLen); in eap_peer_finish() 3021 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success() [all …]
|
D | eap_i.h | 336 u8 *eapKeyData; /* peer to lower layer */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 936 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap() 945 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap() 958 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap() 975 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap() 976 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 1103 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap() 1112 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap() 1125 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap() 1142 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap() 1143 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | ieee802_1x.c | 201 if (!sm->eap_if->eapKeyData || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 247 if (!sm || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 2662 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | ieee802_1x.c | 201 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 247 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 2655 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()
|