/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 41 u8 *emsk) 67 &emsk[i * aes_block_size])) 40 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 120 u8 *msk, u8 *emsk, 181 os_memcpy(emsk, pos, EAP_EMSK_LEN); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 227 msk, emsk, sk, *sk_len, 235 u8 *msk, u8 *emsk, 261 msk, emsk, sk, *sk_len, 280 * @emsk: Buffer for 64-byte EMSK 292 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 330 msk, emsk, sk, sk_len, 336 msk, emsk, s 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 197 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 233 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 87 u8 *emsk); 91 u8 *emsk); 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 126 u8 *emsk) 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_fast_common.h | 109 void eap_fast_derive_eap_emsk(const u8 *simck, u8 *emsk);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 226 u8 *eapKeyData, *emsk; local 235 emsk = os_malloc(EAP_EMSK_LEN); 236 if (emsk) 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 241 emsk = NULL; 243 if (emsk) { 246 emsk, EAP_EMSK_LEN); 251 return emsk;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_psk_common.c | 41 u8 *emsk) 67 &emsk[i * aes_block_size])) 40 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 117 u8 *msk, u8 *emsk, 178 os_memcpy(emsk, pos, EAP_EMSK_LEN); 196 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 224 msk, emsk, sk, *sk_len, 232 u8 *msk, u8 *emsk, 258 msk, emsk, sk, *sk_len, 277 * @emsk: Buffer for 64-byte EMSK 289 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 327 msk, emsk, sk, sk_len, 333 msk, emsk, s 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 194 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 230 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 87 u8 *emsk); 91 u8 *emsk); 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 126 u8 *emsk) 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_tls.c | 226 u8 *eapKeyData, *emsk; local 235 emsk = os_malloc(EAP_EMSK_LEN); 236 if (emsk) 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 241 emsk = NULL; 243 if (emsk) { 246 emsk, EAP_EMSK_LEN); 251 return emsk;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 41 u8 *emsk) 67 &emsk[i * aes_block_size])) 40 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 120 u8 *msk, u8 *emsk, 181 os_memcpy(emsk, pos, EAP_EMSK_LEN); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 227 msk, emsk, sk, *sk_len, 235 u8 *msk, u8 *emsk, 261 msk, emsk, sk, *sk_len, 280 * @emsk: Buffer for 64-byte EMSK 292 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 330 msk, emsk, sk, sk_len, 336 msk, emsk, s 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 197 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 233 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 87 u8 *emsk); 91 u8 *emsk); 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 126 u8 *emsk) 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 226 u8 *eapKeyData, *emsk; local 235 emsk = os_malloc(EAP_EMSK_LEN); 236 if (emsk) 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 241 emsk = NULL; 243 if (emsk) { 246 emsk, EAP_EMSK_LEN); 251 return emsk;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_psk_common.c | 41 u8 *emsk) 67 &emsk[i * aes_block_size])) 40 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 117 u8 *msk, u8 *emsk, 178 os_memcpy(emsk, pos, EAP_EMSK_LEN); 196 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 224 msk, emsk, sk, *sk_len, 232 u8 *msk, u8 *emsk, 258 msk, emsk, sk, *sk_len, 277 * @emsk: Buffer for 64-byte EMSK 289 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 327 msk, emsk, sk, sk_len, 333 msk, emsk, s 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 194 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 230 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 87 u8 *emsk); 91 u8 *emsk); 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 126 u8 *emsk) 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_tls.c | 226 u8 *eapKeyData, *emsk; local 235 emsk = os_malloc(EAP_EMSK_LEN); 236 if (emsk) 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 241 emsk = NULL; 243 if (emsk) { 246 emsk, EAP_EMSK_LEN); 251 return emsk;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.c | 41 u8 *emsk) 67 &emsk[i * aes_block_size])) 40 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 120 u8 *msk, u8 *emsk, 181 os_memcpy(emsk, pos, EAP_EMSK_LEN); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 227 msk, emsk, sk, *sk_len, 235 u8 *msk, u8 *emsk, 261 msk, emsk, sk, *sk_len, 280 * @emsk: Buffer for 64-byte EMSK 292 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 330 msk, emsk, sk, sk_len, 336 msk, emsk, s 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 197 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 233 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 87 u8 *emsk); 91 u8 *emsk); 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 126 u8 *emsk) 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_server/ |
H A D | eap_tls.c | 226 u8 *eapKeyData, *emsk; local 235 emsk = os_malloc(EAP_EMSK_LEN); 236 if (emsk) 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 241 emsk = NULL; 243 if (emsk) { 246 emsk, EAP_EMSK_LEN); 251 return emsk;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | eap_psk_common.c | 41 u8 *emsk) 67 &emsk[i * aes_block_size])) 40 eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
|
H A D | eap_gpsk_common.c | 117 u8 *msk, u8 *emsk, 178 os_memcpy(emsk, pos, EAP_EMSK_LEN); 196 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 224 msk, emsk, sk, *sk_len, 232 u8 *msk, u8 *emsk, 258 msk, emsk, sk, *sk_len, 277 * @emsk: Buffer for 64-byte EMSK 289 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 327 msk, emsk, sk, sk_len, 333 msk, emsk, s 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 194 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 230 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_sim_common.h | 87 u8 *emsk); 91 u8 *emsk); 100 u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk); 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 118 u8 *msk, u8 *emsk) 126 u8 *emsk) 114 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_server/ |
H A D | eap_server_tls.c | 226 u8 *eapKeyData, *emsk; local 235 emsk = os_malloc(EAP_EMSK_LEN); 236 if (emsk) 237 os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN, 241 emsk = NULL; 243 if (emsk) { 246 emsk, EAP_EMSK_LEN); 251 return emsk;
|