/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap.c | 142 os_free(sm->eap_if.eapKeyData); 143 sm->eap_if.eapKeyData = NULL; 306 os_free(sm->eap_if.eapKeyData); 308 sm->eap_if.eapKeyData = sm->m->getKey( 312 sm->eap_if.eapKeyData = NULL; 424 if (sm->eap_if.eapKeyData) 568 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 570 os_free(sm->eap_if.eapKeyData); 571 sm->eap_if.eapKeyData = NULL; 1263 os_free(sm->eap_if.eapKeyData); [all...] |
H A D | eap_fast.c | 1575 u8 *eapKeyData; local 1580 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1581 if (eapKeyData == NULL) 1584 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1587 return eapKeyData; 1594 u8 *eapKeyData; local 1599 eapKeyData = os_malloc(EAP_EMSK_LEN); 1600 if (eapKeyData == NULL) 1603 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1606 return eapKeyData; [all...] |
H A D | eap_peap.c | 1345 u8 *eapKeyData; local 1361 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1362 if (eapKeyData) { 1363 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1366 eapKeyData, EAP_TLS_KEY_LEN); 1372 return eapKeyData; 1376 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1379 if (eapKeyData) { 1382 eapKeyData, EAP_TLS_KEY_LEN); 1387 return eapKeyData; [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server.c | 143 os_free(sm->eap_if.eapKeyData); 144 sm->eap_if.eapKeyData = NULL; 313 os_free(sm->eap_if.eapKeyData); 315 sm->eap_if.eapKeyData = sm->m->getKey( 319 sm->eap_if.eapKeyData = NULL; 437 if (sm->eap_if.eapKeyData) 584 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 586 os_free(sm->eap_if.eapKeyData); 587 sm->eap_if.eapKeyData = NULL; 1282 os_free(sm->eap_if.eapKeyData); [all...] |
H A D | eap_server_fast.c | 1553 u8 *eapKeyData; local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1559 if (eapKeyData == NULL) 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1565 return eapKeyData; 1572 u8 *eapKeyData; local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); 1578 if (eapKeyData == NULL) 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1584 return eapKeyData; [all...] |
H A D | eap_server_peap.c | 1310 u8 *eapKeyData; local 1326 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1327 if (eapKeyData) { 1328 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1331 eapKeyData, EAP_TLS_KEY_LEN); 1337 return eapKeyData; 1341 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1344 if (eapKeyData) { 1347 eapKeyData, EAP_TLS_KEY_LEN); 1352 return eapKeyData; [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap.c | 142 os_free(sm->eap_if.eapKeyData); 143 sm->eap_if.eapKeyData = NULL; 306 os_free(sm->eap_if.eapKeyData); 308 sm->eap_if.eapKeyData = sm->m->getKey( 312 sm->eap_if.eapKeyData = NULL; 424 if (sm->eap_if.eapKeyData) 568 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 570 os_free(sm->eap_if.eapKeyData); 571 sm->eap_if.eapKeyData = NULL; 1263 os_free(sm->eap_if.eapKeyData); [all...] |
H A D | eap_fast.c | 1575 u8 *eapKeyData; local 1580 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1581 if (eapKeyData == NULL) 1584 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1587 return eapKeyData; 1594 u8 *eapKeyData; local 1599 eapKeyData = os_malloc(EAP_EMSK_LEN); 1600 if (eapKeyData == NULL) 1603 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1606 return eapKeyData; [all...] |
H A D | eap_peap.c | 1345 u8 *eapKeyData; local 1361 eapKeyData = os_malloc(EAP_TLS_KEY_LEN); 1362 if (eapKeyData) { 1363 os_memcpy(eapKeyData, csk, EAP_TLS_KEY_LEN); 1366 eapKeyData, EAP_TLS_KEY_LEN); 1372 return eapKeyData; 1376 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 1379 if (eapKeyData) { 1382 eapKeyData, EAP_TLS_KEY_LEN); 1387 return eapKeyData; [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
H A D | eap_server.c | 143 os_free(sm->eap_if.eapKeyData); 144 sm->eap_if.eapKeyData = NULL; 313 os_free(sm->eap_if.eapKeyData); 315 sm->eap_if.eapKeyData = sm->m->getKey( 319 sm->eap_if.eapKeyData = NULL; 437 if (sm->eap_if.eapKeyData) 584 EAP_COPY(&sm->eap_if.eapKeyData, sm->eap_if.aaaEapKeyData); 586 os_free(sm->eap_if.eapKeyData); 587 sm->eap_if.eapKeyData = NULL; 1282 os_free(sm->eap_if.eapKeyData); [all...] |
H A D | eap_server_fast.c | 1553 u8 *eapKeyData; local 1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN); 1559 if (eapKeyData == NULL) 1562 eap_fast_derive_eap_msk(data->simck, eapKeyData); 1565 return eapKeyData; 1572 u8 *eapKeyData; local 1577 eapKeyData = os_malloc(EAP_EMSK_LEN); 1578 if (eapKeyData == NULL) 1581 eap_fast_derive_eap_emsk(data->simck, eapKeyData); 1584 return eapKeyData; [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_tls.c | 203 u8 *eapKeyData; local 208 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 211 if (eapKeyData) { 214 eapKeyData, EAP_TLS_KEY_LEN); 219 return eapKeyData; 226 u8 *eapKeyData, *emsk; local 231 eapKeyData = eap_server_tls_derive_key(sm, &data->ssl, 234 if (eapKeyData) { 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 239 os_free(eapKeyData); [all...] |
H A D | eap.h | 64 u8 *eapKeyData; member in struct:eap_eapol_interface
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 152 os_free(sm->eapKeyData); 153 sm->eapKeyData = NULL; 367 os_free(sm->eapKeyData); 368 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 461 if (sm->eapKeyData != NULL) 1256 os_free(sm->eapKeyData); 1257 sm->eapKeyData = NULL; 1908 if (sm->eapKeyData != NULL) 1923 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The 1930 if (sm == NULL || sm->eapKeyData [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 152 os_free(sm->eapKeyData); 153 sm->eapKeyData = NULL; 367 os_free(sm->eapKeyData); 368 sm->eapKeyData = sm->m->getKey(sm, sm->eap_method_priv, 461 if (sm->eapKeyData != NULL) 1256 os_free(sm->eapKeyData); 1257 sm->eapKeyData = NULL; 1908 if (sm->eapKeyData != NULL) 1923 * Fetch EAP keying material (MSK, eapKeyData) from the EAP state machine. The 1930 if (sm == NULL || sm->eapKeyData [all...] |