Home
last modified time | relevance | path

Searched refs:eapKeyData (Results 1 – 19 of 19) sorted by relevance

/external/wpa_supplicant_8/src/eap_server/
Deap_server_tls.c197 u8 *eapKeyData; in eap_tls_getKey() local
202 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_getKey()
205 if (eapKeyData) { in eap_tls_getKey()
208 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey()
213 return eapKeyData; in eap_tls_getKey()
220 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local
225 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_get_emsk()
228 if (eapKeyData) { in eap_tls_get_emsk()
231 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk()
233 os_free(eapKeyData); in eap_tls_get_emsk()
Deap_server_peap.c1307 u8 *eapKeyData; in eap_peap_getKey() local
1324 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey()
1325 if (eapKeyData) { in eap_peap_getKey()
1326 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1329 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1335 return eapKeyData; in eap_peap_getKey()
1339 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey()
1342 if (eapKeyData) { in eap_peap_getKey()
1345 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1350 return eapKeyData; in eap_peap_getKey()
Deap_server.c145 os_free(sm->eap_if.eapKeyData); in SM_STATE()
146 sm->eap_if.eapKeyData = NULL; in SM_STATE()
315 os_free(sm->eap_if.eapKeyData); in SM_STATE()
317 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE()
321 sm->eap_if.eapKeyData = NULL; in SM_STATE()
439 if (sm->eap_if.eapKeyData) in SM_STATE()
586 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); in SM_STATE()
588 os_free(sm->eap_if.eapKeyData); in SM_STATE()
589 sm->eap_if.eapKeyData = NULL; in SM_STATE()
1292 os_free(sm->eap_if.eapKeyData); in eap_server_sm_deinit()
Deap_server_fast.c1548 u8 *eapKeyData; in eap_fast_getKey() local
1553 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey()
1554 if (eapKeyData == NULL) in eap_fast_getKey()
1557 eap_fast_derive_eap_msk(data->simck, eapKeyData); in eap_fast_getKey()
1560 return eapKeyData; in eap_fast_getKey()
1567 u8 *eapKeyData; in eap_fast_get_emsk() local
1572 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk()
1573 if (eapKeyData == NULL) in eap_fast_get_emsk()
1576 eap_fast_derive_eap_emsk(data->simck, eapKeyData); in eap_fast_get_emsk()
1579 return eapKeyData; in eap_fast_get_emsk()
Deap.h56 u8 *eapKeyData; member
Deap_server_ttls.c1135 u8 *eapKeyData; in eap_ttls_getKey() local
1140 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey()
1143 if (eapKeyData) { in eap_ttls_getKey()
1146 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey()
1151 return eapKeyData; in eap_ttls_getKey()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_tls.c203 u8 *eapKeyData; in eap_tls_getKey() local
208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_getKey()
211 if (eapKeyData) { in eap_tls_getKey()
214 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey()
219 return eapKeyData; in eap_tls_getKey()
226 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local
231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_get_emsk()
234 if (eapKeyData) { in eap_tls_get_emsk()
237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk()
239 os_free(eapKeyData); in eap_tls_get_emsk()
Deap_peap.c1345 u8 *eapKeyData; in eap_peap_getKey() local
1361 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey()
1362 if (eapKeyData) { in eap_peap_getKey()
1363 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1366 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1372 return eapKeyData; in eap_peap_getKey()
1376 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey()
1379 if (eapKeyData) { in eap_peap_getKey()
1382 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey()
1387 return eapKeyData; in eap_peap_getKey()
Deap.c142 os_free(sm->eap_if.eapKeyData); in SM_STATE()
143 sm->eap_if.eapKeyData = NULL; in SM_STATE()
306 os_free(sm->eap_if.eapKeyData); in SM_STATE()
308 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE()
312 sm->eap_if.eapKeyData = NULL; in SM_STATE()
424 if (sm->eap_if.eapKeyData) in SM_STATE()
568 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); in SM_STATE()
570 os_free(sm->eap_if.eapKeyData); in SM_STATE()
571 sm->eap_if.eapKeyData = NULL; in SM_STATE()
1263 os_free(sm->eap_if.eapKeyData); in eap_server_sm_deinit()
Deap_fast.c1575 u8 *eapKeyData; in eap_fast_getKey() local
1580 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey()
1581 if (eapKeyData == NULL) in eap_fast_getKey()
1584 eap_fast_derive_eap_msk(data->simck, eapKeyData); in eap_fast_getKey()
1587 return eapKeyData; in eap_fast_getKey()
1594 u8 *eapKeyData; in eap_fast_get_emsk() local
1599 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk()
1600 if (eapKeyData == NULL) in eap_fast_get_emsk()
1603 eap_fast_derive_eap_emsk(data->simck, eapKeyData); in eap_fast_get_emsk()
1606 return eapKeyData; in eap_fast_get_emsk()
Deap.h64 u8 *eapKeyData; member
Deap_ttls.c1422 u8 *eapKeyData; in eap_ttls_getKey() local
1428 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey()
1432 eapKeyData = eap_ttls_v1_derive_key(sm, data); in eap_ttls_getKey()
1435 if (eapKeyData) { in eap_ttls_getKey()
1438 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey()
1443 return eapKeyData; in eap_ttls_getKey()
/external/wpa_supplicant_8/src/eap_peer/
Deap.c148 os_free(sm->eapKeyData); in SM_STATE()
149 sm->eapKeyData = NULL; in SM_STATE()
371 os_free(sm->eapKeyData); in SM_STATE()
372 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE()
465 if (sm->eapKeyData != NULL) in SM_STATE()
1381 os_free(sm->eapKeyData); in eap_sm_abort()
1382 sm->eapKeyData = NULL; in eap_sm_abort()
2033 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success()
2055 if (sm == NULL || sm->eapKeyData == NULL) { in eap_get_eapKeyData()
2061 return sm->eapKeyData; in eap_get_eapKeyData()
Deap_i.h299 u8 *eapKeyData; /* peer to lower layer */ member
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap.c152 os_free(sm->eapKeyData); in SM_STATE()
153 sm->eapKeyData = NULL; in SM_STATE()
367 os_free(sm->eapKeyData); in SM_STATE()
368 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE()
461 if (sm->eapKeyData != NULL) in SM_STATE()
1256 os_free(sm->eapKeyData); in eap_sm_abort()
1257 sm->eapKeyData = NULL; in eap_sm_abort()
1908 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success()
1930 if (sm == NULL || sm->eapKeyData == NULL) { in eap_get_eapKeyData()
1936 return sm->eapKeyData; in eap_get_eapKeyData()
Deap_i.h305 u8 *eapKeyData; /* peer to lower layer */ member
/external/wpa_supplicant_8/src/radius/
Dradius_server.c573 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap()
586 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap()
601 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap()
602 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
/external/wpa_supplicant_8/src/ap/
Dieee802_1x.c149 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one()
164 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one()
173 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one()
295 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key()
1875 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
Dradius_server.c387 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap()
397 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap()
398 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()