/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 46 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr, 255 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */ 261 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 354 /* Generate a new SNonce */ 355 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) { 356 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); 429 if (os_memcmp(ftie->snonce, sm->snonce, WPA_NONCE_LEN) != 0) { 430 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE") [all...] |
wpa_i.h | 26 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
|
wpa.c | 366 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce, 420 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) { 422 "WPA: Failed to get random data for SNonce"); 426 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 427 sm->snonce, WPA_NONCE_LEN); 440 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce, 1103 /* SNonce was successfully used in msg 3/4, so mark it to be renewed 1105 * SNonce will still be used to avoid changing PTK. */ [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 51 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr, 228 /* FTIE[SNonce, R0KH-ID] */ 234 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 436 /* Generate a new SNonce */ 437 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) { 438 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); 539 wpa_hexdump(MSG_DEBUG, "FT: SNonce", sm->snonce, WPA_NONCE_LEN); 549 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, ftie->anonce, sm->own_addr [all...] |
wpa_i.h | 30 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
|
wpa.c | 369 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce, 422 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) { 424 "WPA: Failed to get random data for SNonce"); 428 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 429 sm->snonce, WPA_NONCE_LEN); 442 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce, 1013 /* SNonce was successfully used in msg 3/4, so mark it to be renewed 1015 * SNonce will still be used to avoid changing PTK. */ [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 276 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie 314 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
|
wpa_common.c | 78 * @nonce1: ANonce or SNonce 79 * @nonce2: SNonce or ANonce 87 * Min(ANonce, SNonce) || Max(ANonce, SNonce)) 523 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, 534 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce || 538 os_memcpy(pos, snonce, WPA_NONCE_LEN); 550 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce || 557 addr[2] = snonce;
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_enrollee.c | 55 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 57 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 59 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 72 addr[0] = wps->snonce; 88 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 102 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 112 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
|
wps_i.h | 55 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
|
wps_registrar.c | 931 if (os_get_random(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 933 wpa_hexdump(MSG_DEBUG, "WPS: R-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 935 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 948 addr[0] = wps->snonce; 964 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 978 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 988 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN, [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 90 const u8 *anonce, const u8 *snonce, 110 if (snonce) 111 os_memcpy(hdr->snonce, snonce, WPA_NONCE_LEN); 378 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 628 u8 *anonce, *snonce; local 668 snonce = sm->SNonce; 695 snonce = NULL; 697 res = wpa_write_ftie(conf, r0kh_id, r0kh_id_len, anonce, snonce, pos [all...] |
wpa_auth_i.h | 59 u8 SNonce[WPA_NONCE_LEN]; 224 const u8 *anonce, const u8 *snonce,
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 282 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie 326 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
|
wpa_common.c | 74 * @nonce1: ANonce or SNonce 75 * @nonce2: SNonce or ANonce 83 * Min(ANonce, SNonce) || Max(ANonce, SNonce)) 809 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, 820 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce || 824 os_memcpy(pos, snonce, WPA_NONCE_LEN); 836 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce || 843 addr[2] = snonce;
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 51 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 53 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 55 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 68 addr[0] = wps->snonce; 84 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 98 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 108 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN, [all...] |
wps_i.h | 57 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
|
wps_registrar.c | [all...] |
/hardware/broadcom/wlan/bcm4329/dhdutil/include/proto/ |
802.11.h | 1706 uint8 snonce[32]; member in struct:dot11_ft_ie [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
802.11.h | 1788 uint8 snonce[32]; member in struct:dot11_ft_ie [all...] |