Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:inonce

877  *             Min(INonce, PNonce) || Max(INonce, PNonce))
1084 * EAPOL-Key(S=1, M=1, A=0, I=0, K=0, SM=1, KeyRSC=0, Nonce=INonce,
1136 if (hostapd_get_rand(peerkey->inonce, WPA_NONCE_LEN)) {
1138 "WPA: Failed to get random data for INonce");
1143 inonce, WPA_NONCE_LEN);
1144 wpa_hexdump(MSG_DEBUG, "WPA: INonce for SMK handshake",
2239 peerkey->inonce, WPA_NONCE_LEN);
2319 os_memcpy(peerkey->inonce, key->key_nonce, WPA_NONCE_LEN);
2367 * @inonce: Initiator Nonce
2371 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I)
2374 const u8 *inonce, const u8 *mac_i, u8 *smkid)
2385 addr[3] = inonce;
2433 if (hostapd_get_rand(peerkey->inonce, WPA_NONCE_LEN)) {
2435 "RSN: Failed to get random data for INonce (STK)");
2439 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
2440 peerkey->inonce, WPA_NONCE_LEN);
2441 os_memcpy(msg->key_nonce, peerkey->inonce, WPA_NONCE_LEN);
2496 os_memcpy(msg->key_nonce, peerkey->inonce, WPA_NONCE_LEN);
2539 os_memcmp(peerkey->initiator ? peerkey->inonce :
2563 if (os_memcmp(key->key_nonce, peerkey->inonce, WPA_NONCE_LEN)
2566 "not match with INonce used in SMK M1");
2570 if (os_memcmp(kde.smk + PMK_LEN, peerkey->inonce,
2572 wpa_printf(MSG_INFO, "RSN: INonce in SMK KDE does not "
2609 if (os_memcmp(kde.nonce, peerkey->inonce, WPA_NONCE_LEN) != 0)
2611 wpa_printf(MSG_INFO, "RSN: INonce in SMK M5 did not "
2632 peerkey->inonce, sm->own_addr, peerkey->smkid);
2636 peerkey->inonce, peerkey->addr, peerkey->smkid);
2778 os_memcpy(peerkey->inonce, key->key_nonce, WPA_NONCE_LEN);
2903 if (os_memcmp(peerkey->inonce, key->key_nonce, WPA_NONCE_LEN) != 0) {
2904 wpa_printf(MSG_WARNING, "RSN: INonce from message 1 of STK "
3223 peerkey->inonce, key->key_nonce,