Searched refs:eap_sake_kdf (Results 1 - 2 of 2) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sake_common.c | 194 * eap_sake_kdf - EAP-SAKE Key Derivation Function (KDF) 209 static int eap_sake_kdf(const u8 *key, size_t key_len, const char *label, in eap_sake_kdf() function 277 if (eap_sake_kdf(root_secret_a, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys() 283 if (eap_sake_kdf(sms_a, EAP_SAKE_SMS_LEN, "Transient EAP Key", in eap_sake_derive_keys() 294 if (eap_sake_kdf(root_secret_b, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys() 300 if (eap_sake_kdf(sms_b, EAP_SAKE_SMS_LEN, "Master Session Key", in eap_sake_derive_keys() 380 ret = eap_sake_kdf(tek_auth, EAP_SAKE_TEK_AUTH_LEN, in eap_sake_compute_mic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sake_common.c | 194 * eap_sake_kdf - EAP-SAKE Key Derivation Function (KDF) 209 static int eap_sake_kdf(const u8 *key, size_t key_len, const char *label, in eap_sake_kdf() function 277 if (eap_sake_kdf(root_secret_a, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys() 283 if (eap_sake_kdf(sms_a, EAP_SAKE_SMS_LEN, "Transient EAP Key", in eap_sake_derive_keys() 294 if (eap_sake_kdf(root_secret_b, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys() 300 if (eap_sake_kdf(sms_b, EAP_SAKE_SMS_LEN, "Master Session Key", in eap_sake_derive_keys() 380 ret = eap_sake_kdf(tek_auth, EAP_SAKE_TEK_AUTH_LEN, in eap_sake_compute_mic()
|
Completed in 2 milliseconds