Home
last modified time | relevance | path

Searched refs:rRK_len (Results 1 – 8 of 8) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server.c483 erp->rRK_len = emsk_len; in eap_server_erp_init()
484 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
487 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_server_erp_init()
488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
490 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init()
494 erp->rIK_len = erp->rRK_len; in eap_server_erp_init()
771 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth()
776 WPA_PUT_BE16(&seed[2], erp->rRK_len); in erp_send_finish_reauth()
777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
780 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth()
[all …]
Deap.h89 size_t rRK_len; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server.c476 erp->rRK_len = emsk_len; in eap_server_erp_init()
477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
480 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_server_erp_init()
481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
483 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init()
487 erp->rIK_len = erp->rRK_len; in eap_server_erp_init()
763 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth()
768 WPA_PUT_BE16(&seed[2], erp->rRK_len); in erp_send_finish_reauth()
769 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
772 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth()
[all …]
Deap.h89 size_t rRK_len; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap.c650 *rrk_len = erp->rRK_len; in eap_peer_get_erp_info()
763 erp->rRK_len = emsk_len; in eap_peer_erp_init()
764 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
767 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_peer_erp_init()
768 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
770 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init()
774 erp->rIK_len = erp->rRK_len; in eap_peer_erp_init()
1919 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish()
1922 sm->eapKeyDataLen = erp->rRK_len; in eap_peer_finish()
1925 WPA_PUT_BE16(&seed[2], erp->rRK_len); in eap_peer_finish()
[all …]
Deap_i.h296 size_t rRK_len; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap.c658 *rrk_len = erp->rRK_len; in eap_peer_get_erp_info()
771 erp->rRK_len = emsk_len; in eap_peer_erp_init()
772 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
775 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_peer_erp_init()
776 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
778 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init()
782 erp->rIK_len = erp->rRK_len; in eap_peer_erp_init()
1957 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish()
1960 sm->eapKeyDataLen = erp->rRK_len; in eap_peer_finish()
1963 WPA_PUT_BE16(&seed[2], erp->rRK_len); in eap_peer_finish()
[all …]
Deap_i.h296 size_t rRK_len; member