Searched refs:rRK_len (Results 1 – 4 of 4) sorted by relevance
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server.c | 475 erp->rRK_len = emsk_len; in eap_server_erp_init() 476 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init() 478 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init() 480 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_server_erp_init() 484 erp->rIK_len = erp->rRK_len; in eap_server_erp_init() 757 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); in erp_send_finish_reauth() 762 WPA_PUT_BE16(&seed[2], erp->rRK_len); in erp_send_finish_reauth() 763 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth() 766 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { in erp_send_finish_reauth() 768 bin_clear_free(sm->eap_if.eapKeyData, erp->rRK_len); in erp_send_finish_reauth() [all …]
|
D | eap.h | 86 size_t rRK_len; member
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 537 erp->rRK_len = emsk_len; in eap_peer_erp_init() 538 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init() 540 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init() 542 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { in eap_peer_erp_init() 546 erp->rIK_len = erp->rRK_len; in eap_peer_erp_init() 1711 sm->eapKeyData = os_malloc(erp->rRK_len); in eap_peer_finish() 1714 sm->eapKeyDataLen = erp->rRK_len; in eap_peer_finish() 1717 WPA_PUT_BE16(&seed[2], erp->rRK_len); in eap_peer_finish() 1718 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish() 1721 sm->eapKeyData, erp->rRK_len) < 0) { in eap_peer_finish()
|
D | eap_i.h | 283 size_t rRK_len; member
|