Searched refs:rRK_len (Results 1 – 8 of 8) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server.c | 483 erp->rRK_len = emsk_len; in eap_server_erp_init() 484 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init() 487 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_server_erp_init() 488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 490 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init() 494 erp->rIK_len = erp->rRK_len; in eap_server_erp_init() 771 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth() 776 WPA_PUT_BE16(&seed[2], erp->rRK_len); in erp_send_finish_reauth() 777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth() 780 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth() [all …]
|
D | eap.h | 89 size_t rRK_len; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server.c | 476 erp->rRK_len = emsk_len; in eap_server_erp_init() 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init() 480 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_server_erp_init() 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 483 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init() 487 erp->rIK_len = erp->rRK_len; in eap_server_erp_init() 763 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth() 768 WPA_PUT_BE16(&seed[2], erp->rRK_len); in erp_send_finish_reauth() 769 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth() 772 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth() [all …]
|
D | eap.h | 89 size_t rRK_len; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap.c | 650 *rrk_len = erp->rRK_len; in eap_peer_get_erp_info() 763 erp->rRK_len = emsk_len; in eap_peer_erp_init() 764 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init() 767 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_peer_erp_init() 768 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 770 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init() 774 erp->rIK_len = erp->rRK_len; in eap_peer_erp_init() 1919 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish() 1922 sm->eapKeyDataLen = erp->rRK_len; in eap_peer_finish() 1925 WPA_PUT_BE16(&seed[2], erp->rRK_len); in eap_peer_finish() [all …]
|
D | eap_i.h | 296 size_t rRK_len; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap.c | 658 *rrk_len = erp->rRK_len; in eap_peer_get_erp_info() 771 erp->rRK_len = emsk_len; in eap_peer_erp_init() 772 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init() 775 WPA_PUT_BE16(&ctx[1], erp->rRK_len); in eap_peer_erp_init() 776 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 778 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init() 782 erp->rIK_len = erp->rRK_len; in eap_peer_erp_init() 1957 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish() 1960 sm->eapKeyDataLen = erp->rRK_len; in eap_peer_finish() 1963 WPA_PUT_BE16(&seed[2], erp->rRK_len); in eap_peer_finish() [all …]
|
D | eap_i.h | 296 size_t rRK_len; member
|