/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 164 wpa_add_kde(pos, RSN_KEY_DATA_NONCE, peerkey->inonce, WPA_NONCE_LEN); 239 os_memcpy(peerkey->inonce, key->key_nonce, WPA_NONCE_LEN); 289 * @inonce: Initiator Nonce 294 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I) 297 const u8 *inonce, const u8 *mac_i, u8 *smkid, 309 addr[3] = inonce; 362 if (random_get_bytes(peerkey->inonce, WPA_NONCE_LEN)) { 364 "RSN: Failed to get random data for INonce (STK)"); 368 wpa_hexdump(MSG_DEBUG, "RSN: INonce for STK 4-Way Handshake", 369 peerkey->inonce, WPA_NONCE_LEN) [all...] |
peerkey.h | 17 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ member in struct:wpa_peerkey
|
tdls.c | 96 u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ member in struct:wpa_tdls_peer 380 if (os_memcmp(peer->inonce, peer->rnonce, WPA_NONCE_LEN) < 0) { 381 nonce[0] = peer->inonce; 385 nonce[1] = peer->inonce; 640 os_memset(peer->inonce, 0, WPA_NONCE_LEN); 712 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN); 1032 if (os_get_random(peer->inonce, WPA_NONCE_LEN)) { 1040 peer->inonce, WPA_NONCE_LEN); 1041 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN); 1141 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN) [all...] |