On the Use of CSI for the Generation of RF Fingerprints and Secret Keys