HomeSort by: relevance | last modified time | path
    Searched refs:rRK (Results 1 - 4 of 4) sorted by relevancy

  /src/external/bsd/wpa/dist/src/eap_peer/
eap_i.h 298 u8 rRK[ERP_MAX_KEY_LEN];
eap.c 623 u16 *erp_next_seq_num, const u8 **rrk,
660 *rrk = erp->rRK;
768 len, sizeof(len), erp->rRK, emsk_len) < 0) {
769 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP");
773 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len);
777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
822 /* TODO: check rRK lifetime expiration */
1996 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap.h 91 u8 rRK[ERP_MAX_KEY_LEN];
259 * hierarchy (rRK and rIK) from full EAP authentication and allows
eap_server.c 479 len, sizeof(len), erp->rRK, emsk_len) < 0) {
480 wpa_printf(MSG_DEBUG, "EAP: Could not derive rRK for ERP");
484 wpa_hexdump_key(MSG_DEBUG, "EAP: ERP rRK", erp->rRK, erp->rRK_len);
488 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,
777 if (hmac_sha256_kdf(erp->rRK, erp->rRK_len,

Completed in 30 milliseconds