HomeSort by relevance Sort by last modified time
    Searched refs:snonce (Results 1 - 22 of 22) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 78 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr,
289 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
295 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
543 /* Generate a new SNonce */
544 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) {
545 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce");
618 if (os_memcmp(ftie->snonce, sm->snonce, WPA_NONCE_LEN) != 0) {
619 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE")
    [all...]
wpa_i.h 32 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
wpa.c 364 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce,
417 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) {
419 "WPA: Failed to get random data for SNonce");
423 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
424 sm->snonce, WPA_NONCE_LEN);
437 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
1145 /* SNonce was successfully used in msg 3/4, so mark it to be renewed
1147 * SNonce will still be used to avoid changing PTK. */
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 51 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr,
228 /* FTIE[SNonce, R0KH-ID] */
234 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
436 /* Generate a new SNonce */
437 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
438 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce");
539 wpa_hexdump(MSG_DEBUG, "FT: SNonce", sm->snonce, WPA_NONCE_LEN);
549 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, ftie->anonce, sm->own_addr
    [all...]
wpa_i.h 30 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
wpa.c 369 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce,
422 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
424 "WPA: Failed to get random data for SNonce");
428 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
429 sm->snonce, WPA_NONCE_LEN);
442 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
1013 /* SNonce was successfully used in msg 3/4, so mark it to be renewed
1015 * SNonce will still be used to avoid changing PTK. */
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 276 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie
314 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
wpa_common.c 78 * @nonce1: ANonce or SNonce
79 * @nonce2: SNonce or ANonce
87 * Min(ANonce, SNonce) || Max(ANonce, SNonce))
523 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
534 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce ||
538 os_memcpy(pos, snonce, WPA_NONCE_LEN);
550 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce ||
557 addr[2] = snonce;
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_enrollee.c 55 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
59 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
72 addr[0] = wps->snonce;
88 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
102 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
112 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
wps_i.h 55 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
wps_registrar.c 931 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
933 wpa_hexdump(MSG_DEBUG, "WPS: R-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
935 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
948 addr[0] = wps->snonce;
964 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
978 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
988 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 106 const u8 *anonce, const u8 *snonce,
126 if (snonce)
127 os_memcpy(hdr->snonce, snonce, WPA_NONCE_LEN);
394 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
621 u8 *anonce, *snonce; local
661 snonce = sm->SNonce;
688 snonce = NULL;
690 res = wpa_write_ftie(conf, r0kh_id, r0kh_id_len, anonce, snonce, pos
    [all...]
wpa_auth_i.h 65 u8 SNonce[WPA_NONCE_LEN];
224 const u8 *anonce, const u8 *snonce,
  /external/wpa_supplicant_8/src/common/
wpa_common.h 284 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie
328 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
wpa_common.c 78 * @nonce1: ANonce or SNonce
79 * @nonce2: SNonce or ANonce
87 * Min(ANonce, SNonce) || Max(ANonce, SNonce))
663 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
674 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce ||
678 os_memcpy(pos, snonce, WPA_NONCE_LEN);
690 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce ||
697 addr[2] = snonce;
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 57 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
59 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
61 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
74 addr[0] = wps->snonce;
90 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
104 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
114 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
    [all...]
wps_i.h 60 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
wps_registrar.c     [all...]
  /external/wpa_supplicant/
wpa_i.h 83 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
wpa.c 865 * @nonce1: ANonce or SNonce
866 * @nonce2: SNonce or ANonce
873 * Min(ANonce, SNonce) || Max(ANonce, SNonce))
    [all...]
  /hardware/broadcom/wlan/bcm4329/dhdutil/include/proto/
802.11.h 1706 uint8 snonce[32]; member in struct:dot11_ft_ie
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
802.11.h 1706 uint8 snonce[32]; member in struct:dot11_ft_ie
    [all...]

Completed in 276 milliseconds