/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tls.c | 254 u8 *eapKeyData; in eap_tls_getKey() local 259 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_getKey() 262 if (eapKeyData) { in eap_tls_getKey() 265 eapKeyData, EAP_TLS_KEY_LEN); in eap_tls_getKey() 270 return eapKeyData; in eap_tls_getKey() 277 u8 *eapKeyData, *emsk; in eap_tls_get_emsk() local 282 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_tls_get_emsk() 285 if (eapKeyData) { in eap_tls_get_emsk() 288 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_tls_get_emsk() 290 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_tls_get_emsk()
|
D | eap_server.c | 240 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 241 sm->eap_if.eapKeyData = NULL; in SM_STATE() 510 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in SM_STATE() 512 sm->eap_if.eapKeyData = sm->m->getKey( in SM_STATE() 516 sm->eap_if.eapKeyData = NULL; in SM_STATE() 660 if (sm->eap_if.eapKeyData) in SM_STATE() 755 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); in erp_send_finish_reauth() 757 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth() 758 if (!sm->eap_if.eapKeyData) in erp_send_finish_reauth() 766 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth() [all …]
|
D | eap_server_ttls.c | 1175 u8 *eapKeyData; in eap_ttls_getKey() local 1180 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_getKey() 1183 if (eapKeyData) { in eap_ttls_getKey() 1186 eapKeyData, EAP_TLS_KEY_LEN); in eap_ttls_getKey() 1191 return eapKeyData; in eap_ttls_getKey() 1217 u8 *eapKeyData, *emsk; in eap_ttls_get_emsk() local 1222 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_ttls_get_emsk() 1225 if (eapKeyData) { in eap_ttls_get_emsk() 1228 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, in eap_ttls_get_emsk() 1230 bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN); in eap_ttls_get_emsk()
|
D | eap_server_peap.c | 1195 u8 *eapKeyData; in eap_peap_getKey() local 1212 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); in eap_peap_getKey() 1213 if (eapKeyData) { in eap_peap_getKey() 1214 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1217 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1223 return eapKeyData; in eap_peap_getKey() 1227 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, in eap_peap_getKey() 1230 if (eapKeyData) { in eap_peap_getKey() 1233 eapKeyData, EAP_TLS_KEY_LEN); in eap_peap_getKey() 1238 return eapKeyData; in eap_peap_getKey()
|
D | eap_server_fast.c | 1553 u8 *eapKeyData; in eap_fast_getKey() local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); in eap_fast_getKey() 1559 if (eapKeyData == NULL) in eap_fast_getKey() 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); in eap_fast_getKey() 1565 return eapKeyData; in eap_fast_getKey() 1572 u8 *eapKeyData; in eap_fast_get_emsk() local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); in eap_fast_get_emsk() 1578 if (eapKeyData == NULL) in eap_fast_get_emsk() 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); in eap_fast_get_emsk() 1584 return eapKeyData; in eap_fast_get_emsk()
|
D | eap.h | 60 u8 *eapKeyData; member
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 98 if (sm->eapKeyData) { in eap_sm_free_key() 99 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); in eap_sm_free_key() 100 sm->eapKeyData = NULL; in eap_sm_free_key() 684 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, in SM_STATE() 795 if (sm->eapKeyData != NULL) in SM_STATE() 1711 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish() 1712 if (!sm->eapKeyData) in eap_peer_finish() 1721 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish() 1727 sm->eapKeyData, sm->eapKeyDataLen); in eap_peer_finish() 2723 if (sm->eapKeyData != NULL) in eap_notify_lower_layer_success() [all …]
|
D | eap_i.h | 323 u8 *eapKeyData; /* peer to lower layer */ member
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 751 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { in radius_server_encapsulate_eap() 764 sess->eap_if->eapKeyData, len); in radius_server_encapsulate_eap() 779 sess->eap_if->eapKeyData + len, in radius_server_encapsulate_eap() 780 len, sess->eap_if->eapKeyData, in radius_server_encapsulate_eap()
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_1x.c | 170 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { in ieee802_1x_tx_key_one() 185 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); in ieee802_1x_tx_key_one() 194 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, in ieee802_1x_tx_key_one() 212 if (sm == NULL || !sm->eap_if->eapKeyData) in ieee802_1x_tx_key() 2311 return sm->eap_if->eapKeyData; in ieee802_1x_get_key()
|