Home
last modified time | relevance | path

Searched refs:rRK_len (Results 1 – 4 of 4) sorted by relevance

/external/wpa_supplicant_8/src/eap_server/
Deap_server.c475 erp->rRK_len = emsk_len; in eap_server_erp_init()
476 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
478 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
480 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init()
484 erp->rIK_len = erp->rRK_len; in eap_server_erp_init()
757 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth()
762 WPA_PUT_BE16(&seed[2], erp->rRK_len); in erp_send_finish_reauth()
763 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
766 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth()
768 bin_clear_free(sm->eap_if.eapKeyData, erp->rRK_len); in erp_send_finish_reauth()
[all …]
Deap.h86 size_t rRK_len; member
/external/wpa_supplicant_8/src/eap_peer/
Deap.c537 erp->rRK_len = emsk_len; in eap_peer_erp_init()
538 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
540 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
542 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init()
546 erp->rIK_len = erp->rRK_len; in eap_peer_erp_init()
1711 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish()
1714 sm->eapKeyDataLen = erp->rRK_len; in eap_peer_finish()
1717 WPA_PUT_BE16(&seed[2], erp->rRK_len); in eap_peer_finish()
1718 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
1721 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish()
Deap_i.h283 size_t rRK_len; member