Searched refs:rIK (Results 1 – 4 of 4) sorted by relevance
/external/wpa_supplicant_8/src/eap_server/ |
D | eap.h | 89 u8 rIK[ERP_MAX_KEY_LEN]; member
|
D | eap_server.c | 481 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init() 486 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rIK", erp->rIK, erp->rIK_len); in eap_server_erp_init() 731 if (hmac_sha256(erp->rIK, erp->rIK_len, in erp_send_finish_reauth() 915 if (hmac_sha256(erp->rIK, erp->rIK_len, hdr, in SM_STATE() 928 if (hmac_sha256(erp->rIK, erp->rIK_len, hdr, in SM_STATE() 940 if (hmac_sha256(erp->rIK, erp->rIK_len, hdr, in SM_STATE()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_i.h | 286 u8 rIK[ERP_MAX_KEY_LEN]; member
|
D | eap.c | 555 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init() 560 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rIK", erp->rIK, erp->rIK_len); in eap_peer_erp_init() 615 if (hmac_sha256(erp->rIK, erp->rIK_len, in eap_peer_erp_reauth_start() 1677 if (hmac_sha256(erp->rIK, erp->rIK_len, (const u8 *) hdr, in eap_peer_finish()
|