HomeSort by relevance Sort by last modified time
    Searched refs:snonce (Results 1 - 12 of 12) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 45 return wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->snonce, anonce, sm->own_addr,
252 /* FTIE[SNonce, [R1KH-ID,] R0KH-ID ] */
258 os_memcpy(ftie->snonce, sm->snonce, WPA_NONCE_LEN);
351 /* Generate a new SNonce */
352 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) {
353 wpa_printf(MSG_INFO, "FT: Failed to generate a new SNonce");
425 if (os_memcmp(ftie->snonce, sm->snonce, WPA_NONCE_LEN) != 0) {
426 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE")
    [all...]
wpa_i.h 28 u8 snonce[WPA_NONCE_LEN]; member in struct:wpa_sm
wpa.c 438 sm->own_addr, sm->bssid, sm->snonce,
490 if (random_get_bytes(sm->snonce, WPA_NONCE_LEN)) {
492 "WPA: Failed to get random data for SNonce");
496 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
497 sm->snonce, WPA_NONCE_LEN);
538 if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 98 const u8 *anonce, const u8 *snonce,
118 if (snonce)
119 os_memcpy(hdr->snonce, snonce, WPA_NONCE_LEN);
398 return wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
646 u8 *anonce, *snonce; local
685 snonce = sm->SNonce;
712 snonce = NULL;
714 res = wpa_write_ftie(conf, r0kh_id, r0kh_id_len, anonce, snonce, pos
    [all...]
wpa_auth_i.h 60 u8 SNonce[WPA_NONCE_LEN];
251 const u8 *anonce, const u8 *snonce,
wpa_auth.c 46 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce,
859 "WPA: Earlier SNonce did not result in matching MIC");
864 "WPA: Earlier SNonce resulted in matching MIC");
866 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN);
1034 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0)
1038 * WZC) update SNonce for each EAPOL-Key 2/4. This
1040 * pending requests, so allow the SNonce to be updated
1044 "Process SNonce update from STA "
1048 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN);
1061 * Supplicant may still be using the old SNonce sinc
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_enrollee.c 41 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0)
43 wpa_hexdump(MSG_DEBUG, "WPS: E-S1", wps->snonce, WPS_SECRET_NONCE_LEN);
45 wps->snonce + WPS_SECRET_NONCE_LEN, WPS_SECRET_NONCE_LEN);
58 addr[0] = wps->snonce;
74 addr[0] = wps->snonce + WPS_SECRET_NONCE_LEN;
88 wpabuf_put_data(msg, wps->snonce, WPS_SECRET_NONCE_LEN);
98 wpabuf_put_data(msg, wps->snonce + WPS_SECRET_NONCE_LEN,
    [all...]
wps_i.h 57 u8 snonce[2 * WPS_SECRET_NONCE_LEN]; member in struct:wps_data
wps_registrar.c     [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 316 u8 snonce[WPA_NONCE_LEN]; member in struct:rsn_ftie
360 int wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
wpa_common.c 125 * @nonce1: ANonce or SNonce
126 * @nonce2: SNonce or ANonce
135 * Min(ANonce, SNonce) || Max(ANonce, SNonce))
962 int wpa_pmk_r1_to_ptk(const u8 *pmk_r1, const u8 *snonce, const u8 *anonce,
975 * PTK = KDF-PTKLen(PMK-R1, "FT-PTK", SNonce || ANonce ||
979 os_memcpy(pos, snonce, WPA_NONCE_LEN);
996 * PTKName = Truncate-128(SHA-256(PMKR1Name || "FT-PTKN" || SNonce ||
1003 addr[2] = snonce;
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
802.11.h 3317 uint8 snonce[32]; member in struct:dot11_ft_ie
    [all...]

Completed in 456 milliseconds