/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 46 wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr, 255 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */ 261 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN); 354 /* Generate a new SNonce */ 355 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) { 356 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce"); 429 if (os_memcmp(ftie->snonce, sm->snonce, WPA_NONCE_LEN) != 0) { 430 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE") [all...] |
tdls.c | 55 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */ 376 * TPK-Key-Input = SHA-256(min(SNonce, ANonce) || max(SNonce, ANonce)) 712 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN); 943 * FTIE: ANonce=0, SNonce=initiator nonce MIC=0, DataKDs=(RSNIE_I, 1041 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN); 1141 os_memcpy(ftie->Snonce, peer->inonce, WPA_NONCE_LEN); [all...] |
wpa_i.h | 26 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
|
wpa.c | 366 sm->own_addr, sm->bssid, sm->snonce, key->key_nonce, 418 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) { 420 "WPA: Failed to get random data for SNonce"); 424 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce", 425 sm->snonce, WPA_NONCE_LEN); 438 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce, 1097 /* SNonce was successfully used in msg 3/4, so mark it to be renewed 1099 * SNonce will still be used to avoid changing PTK. */ [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 90 const u8 *anonce, const u8 *snonce, 110 if (snonce) 111 os_memcpy(hdr->snonce, snonce, WPA_NONCE_LEN); 379 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 629 u8 *anonce, *snonce; local 669 snonce = sm->SNonce; 696 snonce = NULL; 698 res = wpa_write_ftie(conf, r0kh_id, r0kh_id_len, anonce, snonce, pos [all...] |
wpa_auth_i.h | 60 u8 SNonce[WPA_NONCE_LEN]; 223 const u8 *anonce, const u8 *snonce,
|
wpa_auth.c | 885 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) 889 * WZC) update SNonce for each EAPOL-Key 2/4. This 891 * pending requests, so allow the SNonce to be updated 895 "Process SNonce update from STA " 910 "SNonce did not change", msgtxt); 1129 * pending msg 1/4 to update the SNonce to work around 1164 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 74 * @nonce1: ANonce or SNonce 75 * @nonce2: SNonce or ANonce 83 * Min(ANonce, SNonce) || Max(ANonce, SNonce)) 809 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce, 820 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce || 824 os_memcpy(pos, snonce, WPA_NONCE_LEN); 836 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce || 843 addr[2] = snonce; [all...] |
wpa_common.h | 292 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie 336 void wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
|
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 41 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) 43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN); 45 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN); 58 addr[0] = wps->snonce; 74 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN; 88 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN); 98 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN, [all...] |
wps_i.h | 57 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
|
wps_registrar.c | [all...] |
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 528 if not self.challenge.get('snonce'): 557 request_digest = "%s:%s:%s:%s:%s" % (method, request_uri, cnonce, self.challenge['snonce'], headers_val) 559 headers['Authorization'] = 'HMACDigest username="%s", realm="%s", snonce="%s", cnonce="%s", uri="%s", created="%s", response="%s", headers="%s"' % ( 562 self.challenge['snonce'], [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 528 if not self.challenge.get('snonce'): 557 request_digest = "%s:%s:%s:%s:%s" % (method, request_uri, cnonce, self.challenge['snonce'], headers_val) 559 headers['Authorization'] = 'HMACDigest username="%s", realm="%s", snonce="%s", cnonce="%s", uri="%s", created="%s", response="%s", headers="%s"' % ( 562 self.challenge['snonce'], [all...] |
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 33 * added a workaround for 4-way handshake to update SNonce even after 35 implementations that can change SNonce for each EAP-Key 2/4 [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
802.11.h | 3317 uint8 snonce[32]; member in struct:dot11_ft_ie [all...] |