Home
last modified time | relevance | path

Searched refs:eapKeyData (Results 1 – 22 of 22) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_tls.c326 u8 *eapKeyData; in eap_tls_getKey() local
342 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey()
345 if (eapKeyData) { in eap_tls_getKey()
348 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey()
349 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_tls_getKey()
354 return eapKeyData; in eap_tls_getKey()
361 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local
377 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk()
380 if (eapKeyData) { in eap_tls_get_emsk()
383 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk()
[all …]
Deap_server_peap.c1332 u8 *eapKeyData; in eap_peap_getKey() local
1353 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey()
1354 if (eapKeyData) { in eap_peap_getKey()
1355 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1358 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1366 return eapKeyData; in eap_peap_getKey()
1378 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey()
1381 if (eapKeyData) { in eap_peap_getKey()
1382 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_peap_getKey()
1385 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
[all …]
Deap_server.c238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE()
239 sm->eap_if.eapKeyData = NULL; in SM_STATE()
520 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE()
522 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE()
526 sm->eap_if.eapKeyData = NULL; in SM_STATE()
673 if (sm->eap_if.eapKeyData) in SM_STATE()
769 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in erp_send_finish_reauth()
771 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth()
772 if (!sm->eap_if.eapKeyData) in erp_send_finish_reauth()
780 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth()
[all …]
Deap_server_fast.c1576 u8 *eapKeyData; in eap_fast_getKey() local
1581 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey()
1582 if (eapKeyData == NULL) in eap_fast_getKey()
1585 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { in eap_fast_getKey()
1586 os_free(eapKeyData); in eap_fast_getKey()
1591 return eapKeyData; in eap_fast_getKey()
1598 u8 *eapKeyData; in eap_fast_get_emsk() local
1603 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk()
1604 if (eapKeyData == NULL) in eap_fast_get_emsk()
1607 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < 0) { in eap_fast_get_emsk()
[all …]
Deap_server_ttls.c1273 u8 *eapKeyData; in eap_ttls_getKey() local
1290 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey()
1293 if (eapKeyData) { in eap_ttls_getKey()
1296 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey()
1301 return eapKeyData; in eap_ttls_getKey()
1327 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local
1344 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_get_emsk()
1347 if (eapKeyData) { in eap_ttls_get_emsk()
1350 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk()
1352 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_get_emsk()
Deap_server_teap.c2004 u8 *eapKeyData; in eap_teap_getKey() local
2009 eapKeyData = os_malloc(EAP_TEAP_KEY_LEN); in eap_teap_getKey()
2010 if (!eapKeyData) in eap_teap_getKey()
2016 eapKeyData) < 0) { in eap_teap_getKey()
2017 os_free(eapKeyData); in eap_teap_getKey()
2022 return eapKeyData; in eap_teap_getKey()
2029 u8 *eapKeyData; in eap_teap_get_emsk() local
2034 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_teap_get_emsk()
2035 if (!eapKeyData) in eap_teap_get_emsk()
2041 eapKeyData) < 0) { in eap_teap_get_emsk()
[all …]
Deap.h63 u8 *eapKeyData; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_tls.c358 u8 *eapKeyData; in eap_tls_getKey() local
374 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_getKey()
377 if (eapKeyData) { in eap_tls_getKey()
380 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey()
381 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_tls_getKey()
386 return eapKeyData; in eap_tls_getKey()
393 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local
409 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, in eap_tls_get_emsk()
412 if (eapKeyData) { in eap_tls_get_emsk()
415 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk()
[all …]
Deap_server_peap.c1301 u8 *eapKeyData; in eap_peap_getKey() local
1318 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey()
1319 if (eapKeyData) { in eap_peap_getKey()
1320 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1323 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1331 return eapKeyData; in eap_peap_getKey()
1335 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey()
1338 if (eapKeyData) { in eap_peap_getKey()
1339 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); in eap_peap_getKey()
1342 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
[all …]
Deap_server.c238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE()
239 sm->eap_if.eapKeyData = NULL; in SM_STATE()
513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE()
515 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE()
519 sm->eap_if.eapKeyData = NULL; in SM_STATE()
666 if (sm->eap_if.eapKeyData) in SM_STATE()
761 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in erp_send_finish_reauth()
763 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth()
764 if (!sm->eap_if.eapKeyData) in erp_send_finish_reauth()
772 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth()
[all …]
Deap_server_fast.c1558 u8 *eapKeyData; in eap_fast_getKey() local
1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey()
1564 if (eapKeyData == NULL) in eap_fast_getKey()
1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { in eap_fast_getKey()
1568 os_free(eapKeyData); in eap_fast_getKey()
1573 return eapKeyData; in eap_fast_getKey()
1580 u8 *eapKeyData; in eap_fast_get_emsk() local
1585 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk()
1586 if (eapKeyData == NULL) in eap_fast_get_emsk()
1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < 0) { in eap_fast_get_emsk()
[all …]
Deap_server_ttls.c1265 u8 *eapKeyData; in eap_ttls_getKey() local
1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey()
1273 if (eapKeyData) { in eap_ttls_getKey()
1276 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey()
1281 return eapKeyData; in eap_ttls_getKey()
1307 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local
1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_get_emsk()
1315 if (eapKeyData) { in eap_ttls_get_emsk()
1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk()
1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_get_emsk()
Deap_server_teap.c1845 u8 *eapKeyData; in eap_teap_getKey() local
1850 eapKeyData = os_malloc(EAP_TEAP_KEY_LEN); in eap_teap_getKey()
1851 if (!eapKeyData) in eap_teap_getKey()
1856 if (eap_teap_derive_eap_msk(data->simck_msk, eapKeyData) < 0) { in eap_teap_getKey()
1857 os_free(eapKeyData); in eap_teap_getKey()
1862 return eapKeyData; in eap_teap_getKey()
1869 u8 *eapKeyData; in eap_teap_get_emsk() local
1874 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_teap_get_emsk()
1875 if (!eapKeyData) in eap_teap_get_emsk()
1880 if (eap_teap_derive_eap_emsk(data->simck_msk, eapKeyData) < 0) { in eap_teap_get_emsk()
[all …]
Deap.h63 u8 *eapKeyData; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap.c108 if (sm->eapKeyData) { in eap_sm_free_key()
109 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); in eap_sm_free_key()
110 sm->eapKeyData = NULL; in eap_sm_free_key()
928 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE()
1039 if (sm->eapKeyData != NULL) in SM_STATE()
1919 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish()
1920 if (!sm->eapKeyData) in eap_peer_finish()
1929 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish()
1935 sm->eapKeyData, sm->eapKeyDataLen); in eap_peer_finish()
2943 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success()
[all …]
Deap_i.h336 u8 *eapKeyData; /* peer to lower layer */ member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap.c109 if (sm->eapKeyData) { in eap_sm_free_key()
110 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); in eap_sm_free_key()
111 sm->eapKeyData = NULL; in eap_sm_free_key()
937 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE()
1050 if (sm->eapKeyData != NULL) in SM_STATE()
1957 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish()
1958 if (!sm->eapKeyData) in eap_peer_finish()
1967 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish()
1973 sm->eapKeyData, sm->eapKeyDataLen); in eap_peer_finish()
3021 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success()
[all …]
Deap_i.h336 u8 *eapKeyData; /* peer to lower layer */ member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius_server.c936 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap()
945 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
958 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
975 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap()
976 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius_server.c1103 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap()
1112 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
1125 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
1142 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap()
1143 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_1x.c201 if (!sm->eap_if->eapKeyData || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one()
216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one()
229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one()
247 if (!sm || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key()
2662 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dieee802_1x.c201 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one()
216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one()
229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one()
247 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key()
2655 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()