/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_sim_db.c | 58 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon10837::__anon10839 244 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN)) 1154 * @ck: Buffer for CK value 1176 u8 *ck, u8 *res, size_t *res_len, 1226 os_memcpy(ck, entry->u.aka.ck, EAP_AKA_CK_LEN); 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 188 data->mk, data->ck, data->ick) < 0) 214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 155 data->ik, data->ck, data->auts); 188 data->ik, data->ck, 202 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 870 data->ck, data->k_encr, data->k_aut, 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_server/ |
H A D | eap_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_sim_db.c | 58 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon521::__anon523 244 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN)) 1154 * @ck: Buffer for CK value 1176 u8 *ck, u8 *res, size_t *res_len, 1226 os_memcpy(ck, entry->u.aka.ck, EAP_AKA_CK_LEN); 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/hlr_auc_gw/ |
H A D | hlr_auc_gw.c | 476 u8 ck[EAP_AKA_CK_LEN]; local 492 autn, ik, ck, res, &res_len); 500 memset(ck, '4', EAP_AKA_CK_LEN); 520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
|
H A D | milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len) 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 243 u8 res[8], ck[16], ik[16]; local 246 if (milenage_f2345(opc, k, _rand, res, ck, i 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | eap_pax.c | 44 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 186 data->mk, data->ck, data->ick) < 0) 212 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 283 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_aka.c | 29 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 153 data->ik, data->ck, data->auts); 186 data->ik, data->ck, 200 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 850 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 868 data->ck, data->k_encr, data->k_aut, 871 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 46 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 188 data->mk, data->ck, data->ick) < 0) 214 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 285 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 155 data->ik, data->ck, data->auts); 188 data->ik, data->ck, 202 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 870 data->ck, data->k_encr, data->k_aut, 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_server/ |
H A D | eap_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/hlr_auc_gw/ |
H A D | hlr_auc_gw.c | 476 u8 ck[EAP_AKA_CK_LEN]; local 492 autn, ik, ck, res, &res_len); 500 memset(ck, '4', EAP_AKA_CK_LEN); 520 pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
|
H A D | milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len) 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 243 u8 res[8], ck[16], ik[16]; local 246 if (milenage_f2345(opc, k, _rand, res, ck, i 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | eap_pax.c | 44 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 186 data->mk, data->ck, data->ick) < 0) 212 eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 283 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
H A D | eap_aka.c | 29 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 153 data->ik, data->ck, data->auts); 186 data->ik, data->ck, 200 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 850 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 868 data->ck, data->k_encr, data->k_aut, 871 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_pax.c | 42 u8 ck[EAP_PAX_CK_LEN]; member in struct:eap_pax_data 151 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 390 data->rand.e, data->mk, data->ck, 399 eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/video/omap/ |
H A D | dispc.c | 609 static int omap_dispc_set_color_key(struct omapfb_color_key *ck) argument 614 switch (ck->channel_out) { 628 switch (ck->key_type) { 645 dispc_write_reg(tr_reg, ck->trans_key); 646 dispc_write_reg(df_reg, ck->background); 649 dispc.color_key = *ck; 654 static int omap_dispc_get_color_key(struct omapfb_color_key *ck) argument 656 *ck = dispc.color_key;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/video/omap/ |
H A D | dispc.c | 609 static int omap_dispc_set_color_key(struct omapfb_color_key *ck) argument 614 switch (ck->channel_out) { 628 switch (ck->key_type) { 645 dispc_write_reg(tr_reg, ck->trans_key); 646 dispc_write_reg(df_reg, ck->background); 649 dispc.color_key = *ck; 654 static int omap_dispc_get_color_key(struct omapfb_color_key *ck) argument 656 *ck = dispc.color_key;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 31 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 155 data->ik, data->ck, data->auts); 188 data->ik, data->ck, 202 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 852 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 870 data->ck, data->k_encr, data->k_aut, 873 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_peer/ |
H A D | eap_aka.c | 29 u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN]; member in struct:eap_aka_data 153 data->ik, data->ck, data->auts); 186 data->ik, data->ck, 200 os_memset(data->ck, '4', EAP_AKA_CK_LEN); 850 eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik, 868 data->ck, data->k_encr, data->k_aut, 871 eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.c | 88 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 95 u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) 127 if (ck) { 132 if (aes_128_encrypt_block(k, tmp1, ck)) 135 ck[i] ^= opc[i]; 175 * @ck: Buffer for CK = 128-bit confidentiality key (f3), or %NULL 181 u8 *ck, u8 *res, size_t *res_len) 191 milenage_f2345(opc, k, _rand, res, ck, ik, ak, NULL)) { 243 u8 res[8], ck[16], ik[16]; local 246 if (milenage_f2345(opc, k, _rand, res, ck, i 94 milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, u8 *res, u8 *ck, u8 *ik, u8 *ak, u8 *akstar) argument 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.c | 58 u8 ck[EAP_AKA_CK_LEN]; member in struct:eap_sim_db_pending::__anon10613::__anon10615 244 if (hexstr2bin(start, entry->u.aka.ck, EAP_AKA_CK_LEN)) 1154 * @ck: Buffer for CK value 1176 u8 *ck, u8 *res, size_t *res_len, 1226 os_memcpy(ck, entry->u.aka.ck, EAP_AKA_CK_LEN); 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|