Searched refs:eapKeyData (Results 26 - 50 of 57) sorted by relevance

123

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_server/
H A Deap_server_peap.c1310 u8 *eapKeyData; local
1326 eapKeyData = os_malloc(EAP_TLS_KEY_LEN);
1327 if (eapKeyData) {
1328 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN);
1331 eapKeyData, EAP_TLS_KEY_LEN);
1337 return eapKeyData;
1341 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1344 if (eapKeyData) {
1347 eapKeyData, EAP_TLS_KEY_LEN);
1352 return eapKeyData;
[all...]
H A Deap_server_ttls.c1375 u8 *eapKeyData; local
1381 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1385 eapKeyData = eap_ttls_v1_derive_key(sm, data);
1388 if (eapKeyData) {
1391 eapKeyData, EAP_TLS_KEY_LEN);
1396 return eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_peer/
H A Deap.c152 os_free(sm->eapKeyData);
153 sm->eapKeyData = NULL;
367 os_free(sm->eapKeyData);
368 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
461 if (sm->eapKeyData != NULL)
1256 os_free(sm->eapKeyData);
1257 sm->eapKeyData = NULL;
1908 if (sm->eapKeyData != NULL)
1923 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The
1930 if (sm == NULL || sm->eapKeyData
[all...]
H A Deap_i.h129 * Returns: %TRUE if key material (eapKeyData) is available
134 * getKey - Get EAP method specific keying material (eapKeyData)
138 * Returns: Keying material (eapKeyData) or %NULL if not available
305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_server/
H A Deap.c142 os_free(sm->eap_if.eapKeyData);
143 sm->eap_if.eapKeyData = NULL;
306 os_free(sm->eap_if.eapKeyData);
308 sm->eap_if.eapKeyData = sm->m->getKey(
312 sm->eap_if.eapKeyData = NULL;
424 if (sm->eap_if.eapKeyData)
568 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData);
570 os_free(sm->eap_if.eapKeyData);
571 sm->eap_if.eapKeyData = NULL;
1263 os_free(sm->eap_if.eapKeyData);
[all...]
H A Deap_fast.c1575 u8 *eapKeyData; local
1580 eapKeyData = os_malloc(EAP_FAST_KEY_LEN);
1581 if (eapKeyData == NULL)
1584 eap_fast_derive_eap_msk(data->simck, eapKeyData);
1587 return eapKeyData;
1594 u8 *eapKeyData; local
1599 eapKeyData = os_malloc(EAP_EMSK_LEN);
1600 if (eapKeyData == NULL)
1603 eap_fast_derive_eap_emsk(data->simck, eapKeyData);
1606 return eapKeyData;
[all...]
H A Deap_peap.c1345 u8 *eapKeyData; local
1361 eapKeyData = os_malloc(EAP_TLS_KEY_LEN);
1362 if (eapKeyData) {
1363 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN);
1366 eapKeyData, EAP_TLS_KEY_LEN);
1372 return eapKeyData;
1376 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1379 if (eapKeyData) {
1382 eapKeyData, EAP_TLS_KEY_LEN);
1387 return eapKeyData;
[all...]
H A Deap_ttls.c1422 u8 *eapKeyData; local
1428 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1432 eapKeyData = eap_ttls_v1_derive_key(sm, data);
1435 if (eapKeyData) {
1438 eapKeyData, EAP_TLS_KEY_LEN);
1443 return eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_server/
H A Deap_server.c143 os_free(sm->eap_if.eapKeyData);
144 sm->eap_if.eapKeyData = NULL;
313 os_free(sm->eap_if.eapKeyData);
315 sm->eap_if.eapKeyData = sm->m->getKey(
319 sm->eap_if.eapKeyData = NULL;
437 if (sm->eap_if.eapKeyData)
584 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData);
586 os_free(sm->eap_if.eapKeyData);
587 sm->eap_if.eapKeyData = NULL;
1282 os_free(sm->eap_if.eapKeyData);
[all...]
H A Deap_server_fast.c1553 u8 *eapKeyData; local
1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN);
1559 if (eapKeyData == NULL)
1562 eap_fast_derive_eap_msk(data->simck, eapKeyData);
1565 return eapKeyData;
1572 u8 *eapKeyData; local
1577 eapKeyData = os_malloc(EAP_EMSK_LEN);
1578 if (eapKeyData == NULL)
1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData);
1584 return eapKeyData;
[all...]
H A Deap_server_peap.c1310 u8 *eapKeyData; local
1326 eapKeyData = os_malloc(EAP_TLS_KEY_LEN);
1327 if (eapKeyData) {
1328 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN);
1331 eapKeyData, EAP_TLS_KEY_LEN);
1337 return eapKeyData;
1341 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1344 if (eapKeyData) {
1347 eapKeyData, EAP_TLS_KEY_LEN);
1352 return eapKeyData;
[all...]
H A Deap_server_ttls.c1375 u8 *eapKeyData; local
1381 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1385 eapKeyData = eap_ttls_v1_derive_key(sm, data);
1388 if (eapKeyData) {
1391 eapKeyData, EAP_TLS_KEY_LEN);
1396 return eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_peer/
H A Deap_i.h129 * Returns: %TRUE if key material (eapKeyData) is available
134 * getKey - Get EAP method specific keying material (eapKeyData)
138 * Returns: Keying material (eapKeyData) or %NULL if not available
305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_peer/
H A Deap_i.h129 * Returns: %TRUE if key material (eapKeyData) is available
134 * getKey - Get EAP method specific keying material (eapKeyData)
138 * Returns: Keying material (eapKeyData) or %NULL if not available
305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
H A Deap.c152 os_free(sm->eapKeyData);
153 sm->eapKeyData = NULL;
373 os_free(sm->eapKeyData);
374 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
467 if (sm->eapKeyData != NULL)
1321 os_free(sm->eapKeyData);
1322 sm->eapKeyData = NULL;
1973 if (sm->eapKeyData != NULL)
1988 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The
1995 if (sm == NULL || sm->eapKeyData
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_peer/
H A Deap_i.h129 * Returns: %TRUE if key material (eapKeyData) is available
134 * getKey - Get EAP method specific keying material (eapKeyData)
138 * Returns: Keying material (eapKeyData) or %NULL if not available
305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_peer/
H A Deap_i.h129 * Returns: %TRUE if key material (eapKeyData) is available
134 * getKey - Get EAP method specific keying material (eapKeyData)
138 * Returns: Keying material (eapKeyData) or %NULL if not available
305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
H A Deap.c152 os_free(sm->eapKeyData);
153 sm->eapKeyData = NULL;
373 os_free(sm->eapKeyData);
374 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
467 if (sm->eapKeyData != NULL)
1321 os_free(sm->eapKeyData);
1322 sm->eapKeyData = NULL;
1973 if (sm->eapKeyData != NULL)
1988 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The
1995 if (sm == NULL || sm->eapKeyData
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_peer/
H A Deap_i.h129 * Returns: %TRUE if key material (eapKeyData) is available
134 * getKey - Get EAP method specific keying material (eapKeyData)
138 * Returns: Keying material (eapKeyData) or %NULL if not available
305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
H A Deap.c152 os_free(sm->eapKeyData);
153 sm->eapKeyData = NULL;
373 os_free(sm->eapKeyData);
374 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv,
467 if (sm->eapKeyData != NULL)
1321 os_free(sm->eapKeyData);
1322 sm->eapKeyData = NULL;
1973 if (sm->eapKeyData != NULL)
1988 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The
1995 if (sm == NULL || sm->eapKeyData
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_server/
H A Deap_ttls.c1422 u8 *eapKeyData; local
1428 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1432 eapKeyData = eap_ttls_v1_derive_key(sm, data);
1435 if (eapKeyData) {
1438 eapKeyData, EAP_TLS_KEY_LEN);
1443 return eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_server/
H A Deap_server_ttls.c1375 u8 *eapKeyData; local
1381 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1385 eapKeyData = eap_ttls_v1_derive_key(sm, data);
1388 if (eapKeyData) {
1391 eapKeyData, EAP_TLS_KEY_LEN);
1396 return eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_server/
H A Deap_ttls.c1422 u8 *eapKeyData; local
1428 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
1432 eapKeyData = eap_ttls_v1_derive_key(sm, data);
1435 if (eapKeyData) {
1438 eapKeyData, EAP_TLS_KEY_LEN);
1443 return eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/ap/
H A Dieee802_1x.c160 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) {
161 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting "
175 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32);
184 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len,
304 if (sm == NULL || !sm->eap_if->eapKeyData)
1798 return sm->eap_if->eapKeyData;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/ap/
H A Dieee802_1x.c160 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) {
161 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting "
175 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32);
184 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len,
304 if (sm == NULL || !sm->eap_if->eapKeyData)
1798 return sm->eap_if->eapKeyData;

Completed in 167 milliseconds

123