Searched refs:rIK (Results 1 – 4 of 4) sorted by relevance
/external/wpa_supplicant_8/src/eap_server/ |
D | eap.h | 89 u8 rIK[ERP_MAX_KEY_LEN]; member
|
D | eap_server.c | 480 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init() 485 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rIK", erp->rIK, erp->rIK_len); in eap_server_erp_init() 730 if (hmac_sha256(erp->rIK, erp->rIK_len, in erp_send_finish_reauth() 914 if (hmac_sha256(erp->rIK, erp->rIK_len, hdr, in SM_STATE() 927 if (hmac_sha256(erp->rIK, erp->rIK_len, hdr, in SM_STATE() 939 if (hmac_sha256(erp->rIK, erp->rIK_len, hdr, in SM_STATE()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_i.h | 286 u8 rIK[ERP_MAX_KEY_LEN]; member
|
D | eap.c | 542 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init() 547 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rIK", erp->rIK, erp->rIK_len); in eap_peer_erp_init() 602 if (hmac_sha256(erp->rIK, erp->rIK_len, in eap_peer_erp_reauth_start() 1673 if (hmac_sha256(erp->rIK, erp->rIK_len, (const u8 *) hdr, in eap_peer_finish()
|