Home
last modified time | relevance | path

Searched refs:rRK (Results 1 – 8 of 8) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap.h91 u8 rRK[ERP_MAX_KEY_LEN]; member
Deap_server.c472 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init()
477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
769 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap.h91 u8 rRK[ERP_MAX_KEY_LEN]; member
Deap_server.c479 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init()
484 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_i.h298 u8 rRK[ERP_MAX_KEY_LEN]; member
Deap.c659 *rrk = erp->rRK; in eap_peer_get_erp_info()
767 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init()
772 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
776 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
1964 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_i.h298 u8 rRK[ERP_MAX_KEY_LEN]; member
Deap.c651 *rrk = erp->rRK; in eap_peer_get_erp_info()
759 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init()
764 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
768 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
1926 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()