Home
last modified time | relevance | path

Searched refs:rRK (Results 1 - 8 of 8) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap.h91 u8 rRK[ERP_MAX_KEY_LEN]; member
H A Deap_server.c472 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init()
473 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP"); in eap_server_erp_init()
477 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
481 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
769 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap.h91 u8 rRK[ERP_MAX_KEY_LEN]; member
251 * hierarchy (rRK and rIK) from full EAP authentication and allows
H A Deap_server.c479 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_server_erp_init()
480 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP"); in eap_server_erp_init()
484 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_server_erp_init()
488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_server_erp_init()
777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in erp_send_finish_reauth()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_i.h298 u8 rRK[ERP_MAX_KEY_LEN]; member
H A Deap.c651 *rrk = erp->rRK; in eap_peer_get_erp_info()
759 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init()
760 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP"); in eap_peer_erp_init()
764 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
768 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
813 /* TODO: check rRK lifetime expiration */ in eap_peer_build_erp_reauth_start()
1926 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_i.h298 u8 rRK[ERP_MAX_KEY_LEN]; member
H A Deap.c659 *rrk = erp->rRK; in eap_peer_get_erp_info()
767 len, sizeof(len), erp->rRK, emsk_len) < 0) { in eap_peer_erp_init()
768 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP"); in eap_peer_erp_init()
772 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len); in eap_peer_erp_init()
776 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_erp_init()
821 /* TODO: check rRK lifetime expiration */ in eap_peer_build_erp_reauth_start()
1971 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len, in eap_peer_finish()

Completed in 14 milliseconds