Searched refs:rRK (Results 1 – 8 of 8) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap.h | 91 u8 rRK[ERP_MAX_KEY_LEN]; member
|
D | eap_server.c | 472 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init() 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 769 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap.h | 91 u8 rRK[ERP_MAX_KEY_LEN]; member
|
D | eap_server.c | 479 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init() 484 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init() 488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_i.h | 298 u8 rRK[ERP_MAX_KEY_LEN]; member
|
D | eap.c | 659 *rrk = erp->rRK; in eap_peer_get_erp_info() 767 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 772 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init() 776 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 1964 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_i.h | 298 u8 rRK[ERP_MAX_KEY_LEN]; member
|
D | eap.c | 651 *rrk = erp->rRK; in eap_peer_get_erp_info() 759 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init() 764 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init() 768 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 1926 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
|