/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap.h | 86 size_t rRK_len; member in struct:eap_server_erp_key
|
H A D | eap_server.c | 476 erp->rRK_len = emsk_len; 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 480 WPA_PUT_BE16(&ctx[1], erp->rRK_len); 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 483 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { 487 erp->rIK_len = erp->rRK_len; 760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 765 WPA_PUT_BE16(&seed[2], erp->rRK_len); 766 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 769 sm->eap_if.eapKeyData, erp->rRK_len) < [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap.h | 86 size_t rRK_len; member in struct:eap_server_erp_key
|
H A D | eap_server.c | 476 erp->rRK_len = emsk_len; 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 480 WPA_PUT_BE16(&ctx[1], erp->rRK_len); 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 483 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { 487 erp->rIK_len = erp->rRK_len; 760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 765 WPA_PUT_BE16(&seed[2], erp->rRK_len); 766 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 769 sm->eap_if.eapKeyData, erp->rRK_len) < [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 86 size_t rRK_len; member in struct:eap_server_erp_key
|
H A D | eap_server.c | 476 erp->rRK_len = emsk_len; 477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 480 WPA_PUT_BE16(&ctx[1], erp->rRK_len); 481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 483 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { 487 erp->rIK_len = erp->rRK_len; 760 sm->eap_if.eapKeyData = os_malloc(erp->rRK_len); 765 WPA_PUT_BE16(&seed[2], erp->rRK_len); 766 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 769 sm->eap_if.eapKeyData, erp->rRK_len) < [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 283 size_t rRK_len; member in struct:eap_erp_key
|
H A D | eap.c | 550 erp->rRK_len = emsk_len; 551 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 554 WPA_PUT_BE16(&ctx[1], erp->rRK_len); 555 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 557 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { 561 erp->rIK_len = erp->rRK_len; 1730 sm->eapKeyData = os_malloc(erp->rRK_len); 1733 sm->eapKeyDataLen = erp->rRK_len; 1736 WPA_PUT_BE16(&seed[2], erp->rRK_len); 1737 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 283 size_t rRK_len; member in struct:eap_erp_key
|
H A D | eap.c | 550 erp->rRK_len = emsk_len; 551 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 554 WPA_PUT_BE16(&ctx[1], erp->rRK_len); 555 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 557 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { 561 erp->rIK_len = erp->rRK_len; 1730 sm->eapKeyData = os_malloc(erp->rRK_len); 1733 sm->eapKeyDataLen = erp->rRK_len; 1736 WPA_PUT_BE16(&seed[2], erp->rRK_len); 1737 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 283 size_t rRK_len; member in struct:eap_erp_key
|
H A D | eap.c | 550 erp->rRK_len = emsk_len; 551 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); 554 WPA_PUT_BE16(&ctx[1], erp->rRK_len); 555 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, 557 ctx, sizeof(ctx), erp->rIK, erp->rRK_len) < 0) { 561 erp->rIK_len = erp->rRK_len; 1730 sm->eapKeyData = os_malloc(erp->rRK_len); 1733 sm->eapKeyDataLen = erp->rRK_len; 1736 WPA_PUT_BE16(&seed[2], erp->rRK_len); 1737 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, [all...] |