HomeSort by relevance Sort by last modified time
    Searched refs:inonce (Results 1 - 3 of 3) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 164 wpa_add_kde(pos, RSN_KEY_DATA_NONCE, peerkey->inonce, WPA_NONCE_LEN);
239 os_memcpy(peerkey->inonce, key->key_nonce, WPA_NONCE_LEN);
289 * @inonce: Initiator Nonce
294 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I)
297 const u8 *inonce, const u8 *mac_i, u8 *smkid,
309 addr[3] = inonce;
362 if (random_get_bytes(peerkey->inonce, WPA_NONCE_LEN)) {
364 "RSN: Failed to get random data for INonce (STK)");
368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake",
369 peerkey->inonce, WPA_NONCE_LEN)
    [all...]
peerkey.h 17 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ member in struct:wpa_peerkey
tdls.c 96 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ member in struct:wpa_tdls_peer
380 if (os_memcmp(peer->inonce, peer->rnonce, WPA_NONCE_LEN) < 0) {
381 nonce[0] = peer->inonce;
385 nonce[1] = peer->inonce;
640 os_memset(peer->inonce, 0, WPA_NONCE_LEN);
712 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1032 if (os_get_random(peer->inonce, WPA_NONCE_LEN)) {
1040 peer->inonce, WPA_NONCE_LEN);
1041 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1141 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN)
    [all...]

Completed in 717 milliseconds