HomeSort by relevance Sort by last modified time
    Searched refs:snonce (Results 1 - 20 of 20) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 46 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr,
257 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
263 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
362 /* Generate a new SNonce */
363 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) {
364 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce");
437 if (os_memcmp(ftie->snonce, sm->snonce, WPA_NONCE_LEN) != 0) {
438 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE")
    [all...]
wpa_i.h 26 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
wpa.c 360 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce,
414 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) {
416 "WPA: Failed to get random data for SNonce");
420 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
421 sm->snonce, WPA_NONCE_LEN);
434 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
1143 /* SNonce was successfully used in msg 3/4, so mark it to be renewed
1145 * SNonce will still be used to avoid changing PTK. */
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 51 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr,
228 /* FTIE[SNonce, R0KH-ID] */
234 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
436 /* Generate a new SNonce */
437 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
438 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce");
539 wpa_hexdump(MSG_DEBUG, "FT: SNonce", sm->snonce, WPA_NONCE_LEN);
549 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, ftie->anonce, sm->own_addr
    [all...]
wpa_i.h 30 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
wpa.c 369 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce,
422 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
424 "WPA: Failed to get random data for SNonce");
428 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
429 sm->snonce, WPA_NONCE_LEN);
442 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
1013 /* SNonce was successfully used in msg 3/4, so mark it to be renewed
1015 * SNonce will still be used to avoid changing PTK. */
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.h 276 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie
314 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
wpa_common.c 78 * @nonce1: ANonce or SNonce
79 * @nonce2: SNonce or ANonce
87 * Min(ANonce, SNonce) || Max(ANonce, SNonce))
523 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
534 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce ||
538 os_memcpy(pos, snonce, WPA_NONCE_LEN);
550 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce ||
557 addr[2] = snonce;
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_enrollee.c 55 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
59 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
72 addr[0] = wps->snonce;
88 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
102 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
112 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
wps_i.h 55 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
wps_registrar.c 931 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
933 wpa_hexdump(MSG_DEBUG, "WPS: R-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
935 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
948 addr[0] = wps->snonce;
964 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
978 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
988 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 77 const u8 *anonce, const u8 *snonce,
97 if (snonce)
98 os_memcpy(hdr->snonce, snonce, WPA_NONCE_LEN);
365 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
592 u8 *anonce, *snonce; local
632 snonce = sm->SNonce;
659 snonce = NULL;
661 res = wpa_write_ftie(conf, r0kh_id, r0kh_id_len, anonce, snonce, pos
    [all...]
wpa_auth_i.h 59 u8 SNonce[WPA_NONCE_LEN];
221 const u8 *anonce, const u8 *snonce,
  /external/wpa_supplicant_8/src/common/
wpa_common.h 278 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie
322 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
wpa_common.c 72 * @nonce1: ANonce or SNonce
73 * @nonce2: SNonce or ANonce
81 * Min(ANonce, SNonce) || Max(ANonce, SNonce))
805 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
816 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce ||
820 os_memcpy(pos, snonce, WPA_NONCE_LEN);
832 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce ||
839 addr[2] = snonce;
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 51 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
53 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
55 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
68 addr[0] = wps->snonce;
84 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
98 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
108 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
    [all...]
wps_i.h 54 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
wps_registrar.c     [all...]
  /hardware/broadcom/wlan/bcm4329/dhdutil/include/proto/
802.11.h 1706 uint8 snonce[32]; member in struct:dot11_ft_ie
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
802.11.h 1706 uint8 snonce[32]; member in struct:dot11_ft_ie
    [all...]

Completed in 388 milliseconds