/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/wpa_supplicant/ |
H A D | eapol_test.c | 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 371 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx) argument 413 wpa_s->eapol = eapol_sm_init(ctx); 414 if (wpa_s->eapol == NULL) { 426 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 427 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 430 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 432 eapol_sm_notify_portEnabled(wpa_s->eapol, TRUE); 451 eapol_sm_deinit(wpa_s->eapol); [all...] |
H A D | events.c | 74 eapol_sm_invalidate_cached_session(wpa_s->eapol); 102 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 103 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 105 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 125 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 238 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 868 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 869 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 872 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 874 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
H A D | wpa_supplicant.c | 253 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 254 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 258 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 260 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 285 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 348 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 369 eapol_sm_deinit(wpa_s->eapol); 370 wpa_s->eapol = NULL; 570 eapol_sm_invalidate_cached_session(wpa_s->eapol); 581 eapol_sm_notify_eap_success(wpa_s->eapol, FALS [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/wpa_supplicant/ |
H A D | eapol_test.c | 340 if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 349 eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 371 static void eapol_sm_cb(struct eapol_sm *eapol, int success, void *ctx) argument 411 wpa_s->eapol = eapol_sm_init(ctx); 412 if (wpa_s->eapol == NULL) { 424 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 425 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 428 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 430 eapol_sm_notify_portEnabled(wpa_s->eapol, TRUE); 447 eapol_sm_deinit(wpa_s->eapol); [all...] |
H A D | wpa_supplicant.c | 268 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 269 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE); 270 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 275 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 276 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 280 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 282 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 306 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 370 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 394 eapol_sm_deinit(wpa_s->eapol); [all...] |
H A D | events.c | 82 eapol_sm_invalidate_cached_session(wpa_s->eapol); 120 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 121 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 123 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 143 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 256 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 1182 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 1183 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 1186 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 1188 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/wpa_supplicant/ |
H A D | wpa_supplicant.c | 268 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 269 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE); 270 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 275 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 276 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 280 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 282 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 306 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 370 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 394 eapol_sm_deinit(wpa_s->eapol); [all...] |
H A D | events.c | 82 eapol_sm_invalidate_cached_session(wpa_s->eapol); 120 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 121 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 123 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 143 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 256 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 1182 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 1183 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 1186 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 1188 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/ap/ |
H A D | ieee802_1x.c | 297 struct eapol_authenticator *eapol = hapd->eapol_auth; local 323 if (eapol->default_wep_key) { 324 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, 325 eapol->default_wep_key, 1375 struct eapol_authenticator *eapol = hapd->eapol_auth; local 1380 os_free(eapol->default_wep_key); 1381 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len); 1382 if (eapol->default_wep_key == NULL || 1383 os_get_random(eapol->default_wep_key, 1386 os_free(eapol 1413 struct eapol_authenticator *eapol = hapd->eapol_auth; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/ap/ |
H A D | ieee802_1x.c | 297 struct eapol_authenticator *eapol = hapd->eapol_auth; local 323 if (eapol->default_wep_key) { 324 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, 325 eapol->default_wep_key, 1375 struct eapol_authenticator *eapol = hapd->eapol_auth; local 1380 os_free(eapol->default_wep_key); 1381 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len); 1382 if (eapol->default_wep_key == NULL || 1383 os_get_random(eapol->default_wep_key, 1386 os_free(eapol 1413 struct eapol_authenticator *eapol = hapd->eapol_auth; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/wpa_supplicant/ |
H A D | wpa_supplicant.c | 268 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 269 eapol_sm_notify_eap_success(wpa_s->eapol, TRUE); 270 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 275 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 276 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 280 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 282 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 306 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 370 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 394 eapol_sm_deinit(wpa_s->eapol); [all...] |
H A D | events.c | 82 eapol_sm_invalidate_cached_session(wpa_s->eapol); 120 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 121 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 123 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 143 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 256 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 1182 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 1183 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 1186 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 1188 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/ap/ |
H A D | ieee802_1x.c | 297 struct eapol_authenticator *eapol = hapd->eapol_auth; local 323 if (eapol->default_wep_key) { 324 ieee802_1x_tx_key_one(hapd, sta, eapol->default_wep_key_idx, 1, 325 eapol->default_wep_key, 1375 struct eapol_authenticator *eapol = hapd->eapol_auth; local 1380 os_free(eapol->default_wep_key); 1381 eapol->default_wep_key = os_malloc(hapd->conf->default_wep_key_len); 1382 if (eapol->default_wep_key == NULL || 1383 os_get_random(eapol->default_wep_key, 1386 os_free(eapol 1413 struct eapol_authenticator *eapol = hapd->eapol_auth; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/wpa_supplicant/ |
H A D | events.c | 74 eapol_sm_invalidate_cached_session(wpa_s->eapol); 102 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 103 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 105 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 125 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 238 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 868 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 869 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 872 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 874 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
H A D | wpa_supplicant.c | 253 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 254 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 258 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 260 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 285 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 348 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 369 eapol_sm_deinit(wpa_s->eapol); 370 wpa_s->eapol = NULL; 570 eapol_sm_invalidate_cached_session(wpa_s->eapol); 581 eapol_sm_notify_eap_success(wpa_s->eapol, FALS [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/wpa_supplicant/ |
H A D | events.c | 74 eapol_sm_invalidate_cached_session(wpa_s->eapol); 102 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 103 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 105 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 125 eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1); 238 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 868 eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE); 869 eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 872 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 874 eapol_sm_notify_portEnabled(wpa_s->eapol, TRU [all...] |
H A D | wpa_supplicant.c | 253 eapol_sm_notify_eap_success(wpa_s->eapol, FALSE); 254 eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE); 258 eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized); 260 eapol_sm_notify_portControl(wpa_s->eapol, Auto); 285 eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 348 eapol_sm_register_scard_ctx(wpa_s->eapol, NULL); 369 eapol_sm_deinit(wpa_s->eapol); 370 wpa_s->eapol = NULL; 570 eapol_sm_invalidate_cached_session(wpa_s->eapol); 581 eapol_sm_notify_eap_success(wpa_s->eapol, FALS [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/supp/include/ |
H A D | bcmwpa.h | 20 #include <proto/eapol.h> 151 extern bool BCMROMFN(wpa_make_mic)(eapol_header_t *eapol, uint key_desc, uint8 *mic_key, 155 extern bool BCMROMFN(wpa_check_mic)(eapol_header_t *eapol, uint key_desc, uint8 *mic_key);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/include/ |
H A D | bcmwpa.h | 20 #include <proto/eapol.h> 204 extern bool BCMROMFN(wpa_make_mic)(eapol_header_t *eapol, uint key_desc, uint8 *mic_key, 208 extern bool BCMROMFN(wpa_check_mic)(eapol_header_t *eapol, uint key_desc, uint8 *mic_key);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 178 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 178 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 178 struct eapol_authenticator *eapol; member in struct:eapol_state_machine
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/shared/ |
H A D | bcmwpa.c | 41 #include <proto/eapol.h> 368 BCMROMFN(wpa_make_mic)(eapol_header_t *eapol, uint key_desc, uint8 *mic_key, uchar *mic) argument 372 /* length of eapol pkt from the version field on */ 373 mic_length = 4 + ntoh16_ua((uint8 *)&eapol->length); 378 hmac_md5(&eapol->version, mic_length, mic_key, 382 hmac_sha1(&eapol->version, mic_length, mic_key, 386 aes_cmac_calc(&eapol->version, mic_length, mic_key, 397 BCMROMFN(wpa_check_mic)(eapol_header_t *eapol, uint key_desc, uint8 *mic_key) argument 399 eapol_wpa_key_header_t *body = (eapol_wpa_key_header_t *)eapol->body; 407 if (!wpa_make_mic(eapol, key_des [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 105 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 181 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 105 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol); 181 static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol) argument
|