/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/src/ |
H A D | ne_privssl.h | 84 void *sign_data; member in struct:ne_ssl_context_s
|
H A D | ne_pkcs11.c | 580 sess->ssl_context->sign_data = provider;
|
H A D | ne_socket.c | 1778 gnutls_sign_callback_set(sock->ssl, ctx->sign_func, ctx->sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/src/ |
H A D | ne_privssl.h | 84 void *sign_data; member in struct:ne_ssl_context_s
|
H A D | ne_pkcs11.c | 580 sess->ssl_context->sign_data = provider;
|
H A D | ne_socket.c | 1778 gnutls_sign_callback_set(sock->ssl, ctx->sign_func, ctx->sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/src/ |
H A D | ne_privssl.h | 84 void *sign_data; member in struct:ne_ssl_context_s
|
H A D | ne_pkcs11.c | 580 sess->ssl_context->sign_data = provider;
|
H A D | ne_socket.c | 1778 gnutls_sign_callback_set(sock->ssl, ctx->sign_func, ctx->sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant-0.7.3/src/eap_common/ |
H A D | ikev2_common.c | 445 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 468 /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */ 470 sign_data = os_malloc(sign_len); 471 if (sign_data == NULL) 473 pos = sign_data; 480 /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */ 484 (const u8 **) &sign_data, &sign_len, auth_data) < 0) 486 os_free(sign_data); 489 os_free(sign_data);
|