/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tls.c | 197 u8 *eapKeyData; in eap_tls_getKey() local 202 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_getKey() 205 if (eapKeyData) { in eap_tls_getKey() 208 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey() 213 return eapKeyData; in eap_tls_getKey() 220 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 225 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_get_emsk() 228 if (eapKeyData) { in eap_tls_get_emsk() 231 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 233 os_free(eapKeyData); in eap_tls_get_emsk()
|
D | eap_server_peap.c | 1307 u8 *eapKeyData; in eap_peap_getKey() local 1324 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey() 1325 if (eapKeyData) { in eap_peap_getKey() 1326 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1329 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1335 return eapKeyData; in eap_peap_getKey() 1339 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey() 1342 if (eapKeyData) { in eap_peap_getKey() 1345 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1350 return eapKeyData; in eap_peap_getKey()
|
D | eap_server.c | 145 os_free(sm->eap_if.eapKeyData); in SM_STATE() 146 sm->eap_if.eapKeyData = NULL; in SM_STATE() 315 os_free(sm->eap_if.eapKeyData); in SM_STATE() 317 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE() 321 sm->eap_if.eapKeyData = NULL; in SM_STATE() 439 if (sm->eap_if.eapKeyData) in SM_STATE() 586 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); in SM_STATE() 588 os_free(sm->eap_if.eapKeyData); in SM_STATE() 589 sm->eap_if.eapKeyData = NULL; in SM_STATE() 1292 os_free(sm->eap_if.eapKeyData); in eap_server_sm_deinit()
|
D | eap_server_fast.c | 1548 u8 *eapKeyData; in eap_fast_getKey() local 1553 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey() 1554 if (eapKeyData == NULL) in eap_fast_getKey() 1557 eap_fast_derive_eap_msk(data->simck, eapKeyData); in eap_fast_getKey() 1560 return eapKeyData; in eap_fast_getKey() 1567 u8 *eapKeyData; in eap_fast_get_emsk() local 1572 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk() 1573 if (eapKeyData == NULL) in eap_fast_get_emsk() 1576 eap_fast_derive_eap_emsk(data->simck, eapKeyData); in eap_fast_get_emsk() 1579 return eapKeyData; in eap_fast_get_emsk()
|
D | eap.h | 56 u8 *eapKeyData; member
|
D | eap_server_ttls.c | 1135 u8 *eapKeyData; in eap_ttls_getKey() local 1140 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey() 1143 if (eapKeyData) { in eap_ttls_getKey() 1146 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey() 1151 return eapKeyData; in eap_ttls_getKey()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_tls.c | 203 u8 *eapKeyData; in eap_tls_getKey() local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_getKey() 211 if (eapKeyData) { in eap_tls_getKey() 214 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey() 219 return eapKeyData; in eap_tls_getKey() 226 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_get_emsk() 234 if (eapKeyData) { in eap_tls_get_emsk() 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 239 os_free(eapKeyData); in eap_tls_get_emsk()
|
D | eap_peap.c | 1345 u8 *eapKeyData; in eap_peap_getKey() local 1361 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey() 1362 if (eapKeyData) { in eap_peap_getKey() 1363 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1366 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1372 return eapKeyData; in eap_peap_getKey() 1376 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey() 1379 if (eapKeyData) { in eap_peap_getKey() 1382 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1387 return eapKeyData; in eap_peap_getKey()
|
D | eap.c | 142 os_free(sm->eap_if.eapKeyData); in SM_STATE() 143 sm->eap_if.eapKeyData = NULL; in SM_STATE() 306 os_free(sm->eap_if.eapKeyData); in SM_STATE() 308 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE() 312 sm->eap_if.eapKeyData = NULL; in SM_STATE() 424 if (sm->eap_if.eapKeyData) in SM_STATE() 568 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); in SM_STATE() 570 os_free(sm->eap_if.eapKeyData); in SM_STATE() 571 sm->eap_if.eapKeyData = NULL; in SM_STATE() 1263 os_free(sm->eap_if.eapKeyData); in eap_server_sm_deinit()
|
D | eap_fast.c | 1575 u8 *eapKeyData; in eap_fast_getKey() local 1580 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey() 1581 if (eapKeyData == NULL) in eap_fast_getKey() 1584 eap_fast_derive_eap_msk(data->simck, eapKeyData); in eap_fast_getKey() 1587 return eapKeyData; in eap_fast_getKey() 1594 u8 *eapKeyData; in eap_fast_get_emsk() local 1599 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk() 1600 if (eapKeyData == NULL) in eap_fast_get_emsk() 1603 eap_fast_derive_eap_emsk(data->simck, eapKeyData); in eap_fast_get_emsk() 1606 return eapKeyData; in eap_fast_get_emsk()
|
D | eap.h | 64 u8 *eapKeyData; member
|
D | eap_ttls.c | 1422 u8 *eapKeyData; in eap_ttls_getKey() local 1428 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey() 1432 eapKeyData = eap_ttls_v1_derive_key(sm, data); in eap_ttls_getKey() 1435 if (eapKeyData) { in eap_ttls_getKey() 1438 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey() 1443 return eapKeyData; in eap_ttls_getKey()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 148 os_free(sm->eapKeyData); in SM_STATE() 149 sm->eapKeyData = NULL; in SM_STATE() 371 os_free(sm->eapKeyData); in SM_STATE() 372 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE() 465 if (sm->eapKeyData != NULL) in SM_STATE() 1381 os_free(sm->eapKeyData); in eap_sm_abort() 1382 sm->eapKeyData = NULL; in eap_sm_abort() 2033 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success() 2055 if (sm == NULL || sm->eapKeyData == NULL) { in eap_get_eapKeyData() 2061 return sm->eapKeyData; in eap_get_eapKeyData()
|
D | eap_i.h | 299 u8 *eapKeyData; /* peer to lower layer */ member
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap.c | 152 os_free(sm->eapKeyData); in SM_STATE() 153 sm->eapKeyData = NULL; in SM_STATE() 367 os_free(sm->eapKeyData); in SM_STATE() 368 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE() 461 if (sm->eapKeyData != NULL) in SM_STATE() 1256 os_free(sm->eapKeyData); in eap_sm_abort() 1257 sm->eapKeyData = NULL; in eap_sm_abort() 1908 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success() 1930 if (sm == NULL || sm->eapKeyData == NULL) { in eap_get_eapKeyData() 1936 return sm->eapKeyData; in eap_get_eapKeyData()
|
D | eap_i.h | 305 u8 *eapKeyData; /* peer to lower layer */ member
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 573 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap() 586 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap() 601 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap() 602 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_1x.c | 149 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 164 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 173 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 295 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 1875 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
D | radius_server.c | 387 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap() 397 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap() 398 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
|