/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 78 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr, 289 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */ 295 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 543 /* Generate a new SNonce */ 544 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) { 545 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); 618 if (os_memcmp(ftie->snonce, sm->snonce, WPA_NONCE_LEN) != 0) { 619 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE") [all...] |
wpa_i.h | 32 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
|
wpa.c | 364 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce, 417 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) { 419 "WPA: Failed to get random data for SNonce"); 423 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 424 sm->snonce, WPA_NONCE_LEN); 437 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce, 1145 /* SNonce was successfully used in msg 3/4, so mark it to be renewed 1147 * SNonce will still be used to avoid changing PTK. */ [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 51 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr, 228 /* FTIE[SNonce, R0KH-ID] */ 234 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 436 /* Generate a new SNonce */ 437 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) { 438 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); 539 wpa_hexdump(MSG_DEBUG, "FT: SNonce", sm->snonce, WPA_NONCE_LEN); 549 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, ftie->anonce, sm->own_addr [all...] |
wpa_i.h | 30 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
|
wpa.c | 369 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce, 422 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) { 424 "WPA: Failed to get random data for SNonce"); 428 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 429 sm->snonce, WPA_NONCE_LEN); 442 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce, 1013 /* SNonce was successfully used in msg 3/4, so mark it to be renewed 1015 * SNonce will still be used to avoid changing PTK. */ [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 276 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie 314 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
|
wpa_common.c | 78 * @nonce1: ANonce or SNonce 79 * @nonce2: SNonce or ANonce 87 * Min(ANonce, SNonce) || Max(ANonce, SNonce)) 523 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, 534 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce || 538 os_memcpy(pos, snonce, WPA_NONCE_LEN); 550 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce || 557 addr[2] = snonce;
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_enrollee.c | 55 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 59 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 72 addr[0] = wps->snonce; 88 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 102 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 112 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
|
wps_i.h | 55 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
|
wps_registrar.c | 931 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 933 wpa_hexdump(MSG_DEBUG, "WPS: R-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 935 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 948 addr[0] = wps->snonce; 964 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 978 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 988 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN, [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 106 const u8 *anonce, const u8 *snonce, 126 if (snonce) 127 os_memcpy(hdr->snonce, snonce, WPA_NONCE_LEN); 394 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 621 u8 *anonce, *snonce; local 661 snonce = sm->SNonce; 688 snonce = NULL; 690 res = wpa_write_ftie(conf, r0kh_id, r0kh_id_len, anonce, snonce, pos [all...] |
wpa_auth_i.h | 65 u8 SNonce[WPA_NONCE_LEN]; 224 const u8 *anonce, const u8 *snonce,
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 284 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie 328 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
|
wpa_common.c | 78 * @nonce1: ANonce or SNonce 79 * @nonce2: SNonce or ANonce 87 * Min(ANonce, SNonce) || Max(ANonce, SNonce)) 663 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, 674 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce || 678 os_memcpy(pos, snonce, WPA_NONCE_LEN); 690 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce || 697 addr[2] = snonce;
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 57 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 59 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 61 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 74 addr[0] = wps->snonce; 90 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 104 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 114 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN, [all...] |
wps_i.h | 60 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
|
wps_registrar.c | [all...] |
/external/wpa_supplicant/ |
wpa_i.h | 83 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
|
wpa.c | 865 * @nonce1: ANonce or SNonce 866 * @nonce2: SNonce or ANonce 873 * Min(ANonce, SNonce) || Max(ANonce, SNonce)) [all...] |
/hardware/broadcom/wlan/bcm4329/dhdutil/include/proto/ |
802.11.h | 1706 uint8 snonce[32]; member in struct:dot11_ft_ie [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
802.11.h | 1706 uint8 snonce[32]; member in struct:dot11_ft_ie [all...] |