/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls.c | 358 u8 *eapKeyData; local 374 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, 377 if (eapKeyData) { 380 eapKeyData, EAP_TLS_KEY_LEN); 381 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); 386 return eapKeyData; 393 u8 *eapKeyData, *emsk; local 409 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, label, 412 if (eapKeyData) { 415 os_memcpy(emsk, eapKeyData [all...] |
H A D | eap_server_peap.c | 1301 u8 *eapKeyData; local 1318 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1319 if (eapKeyData) { 1320 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1323 eapKeyData, EAP_TLS_KEY_LEN); 1331 return eapKeyData; 1335 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1338 if (eapKeyData) { 1339 os_memset(eapKeyData + EAP_TLS_KEY_LEN, 0, EAP_EMSK_LEN); 1342 eapKeyData, EAP_TLS_KEY_LE 1354 u8 *eapKeyData, *emsk; local [all...] |
H A D | eap_server.c | 238 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 239 sm->eap_if.eapKeyData = NULL; 513 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 515 sm->eap_if.eapKeyData = sm->m->getKey( 519 sm->eap_if.eapKeyData = NULL; 666 if (sm->eap_if.eapKeyData) 761 bin_clear_free(sm->eap_if.eapKeyData, sm->eap_if.eapKeyDataLen); 763 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 764 if (!sm->eap_if.eapKeyData) 772 sm->eap_if.eapKeyData, er [all...] |
H A D | eap_server_fast.c | 1558 u8 *eapKeyData; local 1563 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1564 if (eapKeyData == NULL) 1567 if (eap_fast_derive_eap_msk(data->simck, eapKeyData) < 0) { 1568 os_free(eapKeyData); 1573 return eapKeyData; 1580 u8 *eapKeyData; local 1585 eapKeyData = os_malloc(EAP_EMSK_LEN); 1586 if (eapKeyData == NULL) 1589 if (eap_fast_derive_eap_emsk(data->simck, eapKeyData) < [all...] |
H A D | eap_server_ttls.c | 1265 u8 *eapKeyData; local 1270 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1273 if (eapKeyData) { 1276 eapKeyData, EAP_TLS_KEY_LEN); 1281 return eapKeyData; 1307 u8 *eapKeyData, *emsk; local 1312 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1315 if (eapKeyData) { 1318 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 1320 bin_clear_free(eapKeyData, EAP_TLS_KEY_LE [all...] |
H A D | eap_server_teap.c | 1845 u8 *eapKeyData; local 1850 eapKeyData = os_malloc(EAP_TEAP_KEY_LEN); 1851 if (!eapKeyData) 1856 if (eap_teap_derive_eap_msk(data->simck_msk, eapKeyData) < 0) { 1857 os_free(eapKeyData); 1862 return eapKeyData; 1869 u8 *eapKeyData; local 1874 eapKeyData = os_malloc(EAP_EMSK_LEN); 1875 if (!eapKeyData) 1880 if (eap_teap_derive_eap_emsk(data->simck_msk, eapKeyData) < [all...] |
H A D | eap.h | 63 u8 *eapKeyData; member in struct:eap_eapol_interface
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_i.h | 126 * Returns: %TRUE if key material (eapKeyData) is available 131 * getKey - Get EAP method specific keying material (eapKeyData) 135 * Returns: Keying material (eapKeyData) or %NULL if not available 336 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 108 if (sm->eapKeyData) { 109 bin_clear_free(sm->eapKeyData, sm->eapKeyDataLen); 110 sm->eapKeyData = NULL; 928 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 1039 if (sm->eapKeyData != NULL) 1919 sm->eapKeyData = os_malloc(erp->rRK_len); 1920 if (!sm->eapKeyData) 1929 sm->eapKeyData, erp->rRK_len) < 0) { 1935 sm->eapKeyData, sm->eapKeyDataLen); 2943 if (sm->eapKeyData ! [all...] |
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius_server.c | 1103 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 1112 sess->eap_if->eapKeyData, len); 1125 sess->eap_if->eapKeyData, len); 1142 sess->eap_if->eapKeyData + len, 1143 len, sess->eap_if->eapKeyData,
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 201 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { 202 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting " 216 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 229 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, 247 if (sm == NULL || !sm->eap_if->eapKeyData) 2655 return sm->eap_if->eapKeyData;
|