/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap.h | 86 size_t rRK_len; member in struct:eap_server_erp_key
|
H A D | eap_server.c | 476 erp->rRK_len = emsk_len; 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 479 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 481 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { 485 erp->rIK_len = erp->rRK_len; 758 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 763 WPA_PUT_BE16(&seed[2], erp->rRK_len); 764 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 767 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { 769 bin_clear_free(sm->eap_if.eapKeyData, erp->rRK_len); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap.h | 86 size_t rRK_len; member in struct:eap_server_erp_key
|
H A D | eap_server.c | 476 erp->rRK_len = emsk_len; 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 479 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 481 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { 485 erp->rIK_len = erp->rRK_len; 758 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 763 WPA_PUT_BE16(&seed[2], erp->rRK_len); 764 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 767 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { 769 bin_clear_free(sm->eap_if.eapKeyData, erp->rRK_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 86 size_t rRK_len; member in struct:eap_server_erp_key
|
H A D | eap_server.c | 476 erp->rRK_len = emsk_len; 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 479 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 481 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { 485 erp->rIK_len = erp->rRK_len; 758 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 763 WPA_PUT_BE16(&seed[2], erp->rRK_len); 764 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 767 sm->eap_if.eapKeyData, erp->rRK_len) < 0) { 769 bin_clear_free(sm->eap_if.eapKeyData, erp->rRK_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 283 size_t rRK_len; member in struct:eap_erp_key
|
H A D | eap.c | 550 erp->rRK_len = emsk_len; 551 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 553 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 555 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { 559 erp->rIK_len = erp->rRK_len; 1715 sm->eapKeyData = os_malloc(erp->rRK_len); 1718 sm->eapKeyDataLen = erp->rRK_len; 1721 WPA_PUT_BE16(&seed[2], erp->rRK_len); 1722 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 1725 sm->eapKeyData, erp->rRK_len) < [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 283 size_t rRK_len; member in struct:eap_erp_key
|
H A D | eap.c | 550 erp->rRK_len = emsk_len; 551 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 553 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 555 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { 559 erp->rIK_len = erp->rRK_len; 1715 sm->eapKeyData = os_malloc(erp->rRK_len); 1718 sm->eapKeyDataLen = erp->rRK_len; 1721 WPA_PUT_BE16(&seed[2], erp->rRK_len); 1722 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 1725 sm->eapKeyData, erp->rRK_len) < [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 283 size_t rRK_len; member in struct:eap_erp_key
|
H A D | eap.c | 550 erp->rRK_len = emsk_len; 551 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 553 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 555 len, sizeof(len), erp->rIK, erp->rRK_len) < 0) { 559 erp->rIK_len = erp->rRK_len; 1715 sm->eapKeyData = os_malloc(erp->rRK_len); 1718 sm->eapKeyDataLen = erp->rRK_len; 1721 WPA_PUT_BE16(&seed[2], erp->rRK_len); 1722 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 1725 sm->eapKeyData, erp->rRK_len) < [all...] |