Lines Matching full:snonce
55 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */
376 * TPK-Key-Input = SHA-256(min(SNonce, ANonce) || max(SNonce, ANonce))
712 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
943 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I,
1041 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1141 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1225 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN);
1671 if (os_memcmp(peer->inonce, ftie->Snonce, WPA_NONCE_LEN) != 0) {
1675 * same INonce (SNonce in FTIE). However, if the TPK M1 is
1681 os_memcpy(peer->inonce, ftie->Snonce, WPA_NONCE_LEN);
1976 if (!os_memcmp(peer->inonce, ftie->Snonce, WPA_NONCE_LEN) == 0) {
1977 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M2 does "
1978 "not match with FTIE SNonce used in TPK M1");
2143 if (!os_memcmp(peer->inonce, ftie->Snonce, WPA_NONCE_LEN) == 0) {
2144 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M3 does not "
2145 "match with FTIE SNonce used in TPK M1");