Searched refs:eapKeyData (Results 1 - 10 of 10) sorted by relevance
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server.c | 143 os_free(sm->eap_if.eapKeyData); 144 sm->eap_if.eapKeyData = NULL; 313 os_free(sm->eap_if.eapKeyData); 315 sm->eap_if.eapKeyData = sm->m->getKey( 319 sm->eap_if.eapKeyData = NULL; 437 if (sm->eap_if.eapKeyData) 584 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 586 os_free(sm->eap_if.eapKeyData); 587 sm->eap_if.eapKeyData = NULL; 1282 os_free(sm->eap_if.eapKeyData); [all...] |
H A D | eap_server_fast.c | 1553 u8 *eapKeyData; local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1559 if (eapKeyData == NULL) 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1565 return eapKeyData; 1572 u8 *eapKeyData; local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); 1578 if (eapKeyData == NULL) 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1584 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1310 u8 *eapKeyData; local 1326 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1327 if (eapKeyData) { 1328 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1331 eapKeyData, EAP_TLS_KEY_LEN); 1337 return eapKeyData; 1341 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1344 if (eapKeyData) { 1347 eapKeyData, EAP_TLS_KEY_LEN); 1352 return eapKeyData; [all...] |
H A D | eap_server_ttls.c | 1375 u8 *eapKeyData; local 1381 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1385 eapKeyData = eap_ttls_v1_derive_key(sm, data); 1388 if (eapKeyData) { 1391 eapKeyData, EAP_TLS_KEY_LEN); 1396 return eapKeyData;
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_i.h | 129 * Returns: %TRUE if key material (eapKeyData) is available 134 * getKey - Get EAP method specific keying material (eapKeyData) 138 * Returns: Keying material (eapKeyData) or %NULL if not available 305 u8 *eapKeyData; /* peer to lower layer */ member in struct:eap_sm
|
H A D | eap.c | 152 os_free(sm->eapKeyData); 153 sm->eapKeyData = NULL; 373 os_free(sm->eapKeyData); 374 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 467 if (sm->eapKeyData != NULL) 1321 os_free(sm->eapKeyData); 1322 sm->eapKeyData = NULL; 1973 if (sm->eapKeyData != NULL) 1988 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The 1995 if (sm == NULL || sm->eapKeyData [all...] |
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | ieee802_1x.c | 160 if (sm->eap_if->eapKeyData == NULL || sm->eap_if->eapKeyDataLen < 64) { 161 wpa_printf(MSG_ERROR, "No eapKeyData available for encrypting " 175 os_memcpy(ekey + sizeof(key->key_iv), sm->eap_if->eapKeyData, 32); 184 hmac_md5(sm->eap_if->eapKeyData + 32, 32, buf, sizeof(*hdr) + len, 304 if (sm == NULL || !sm->eap_if->eapKeyData) 1798 return sm->eap_if->eapKeyData;
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_server.c | 567 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) { 577 sess->eap_if->eapKeyData + len, 578 len, sess->eap_if->eapKeyData,
|
Completed in 147 milliseconds