Home
last modified time | relevance | path

Searched refs:SNonce (Results 1 – 10 of 10) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_i.h57 u8 SNonce[WPA_NONCE_LEN]; member
Dwpa_auth.c941 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN); in wpa_try_alt_snonce()
1106 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) in wpa_receive()
1120 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN); in wpa_receive()
1370 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); in wpa_receive()
2231 sm->SNonce, sm->ANonce, in wpa_derive_ptk()
2326 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN); in fils_auth_pmk_to_ptk()
2543 aad[2] = sm->SNonce; in fils_decrypt_assoc()
2605 aad[3] = sm->SNonce; in fils_encrypt_assoc()
2868 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK) < 0) in SM_STATE()
4926 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN); in wpa_auth_get_fils_aead_params()
Dwpa_auth_ft.c2150 return wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_auth_derive_ptk_ft()
2489 snonce = sm->SNonce; in wpa_sm_write_assoc_resp_ies()
2914 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req()
2924 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req()
3006 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req()
3010 if (wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_ft_process_auth_req()
3054 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0); in wpa_ft_process_auth_req()
3193 if (os_memcmp(snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { in wpa_ft_validate_reassoc()
3198 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_validate_reassoc()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth_i.h57 u8 SNonce[WPA_NONCE_LEN]; member
Dwpa_auth_ft.c2148 return wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_auth_derive_ptk_ft()
2608 snonce = sm->SNonce; in wpa_sm_write_assoc_resp_ies()
3105 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req()
3115 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req()
3195 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req()
3206 if (wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_ft_process_auth_req()
3250 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0, in wpa_ft_process_auth_req()
3394 if (os_memcmp(snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { in wpa_ft_validate_reassoc()
3399 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_validate_reassoc()
Dwpa_auth.c1001 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN); in wpa_try_alt_snonce()
1173 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) in wpa_receive()
1185 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN); in wpa_receive()
1432 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); in wpa_receive()
2322 sm->SNonce, sm->ANonce, in wpa_derive_ptk()
2423 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN); in fils_auth_pmk_to_ptk()
2640 aad[2] = sm->SNonce; in fils_decrypt_assoc()
2702 aad[3] = sm->SNonce; in fils_encrypt_assoc()
2989 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK, in SM_STATE()
5332 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN); in wpa_auth_get_fils_aead_params()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
Ddriver_atheros.c1090 os_memcpy(mlme.fils_aad.SNonce, params->fils_snonce, in atheros_sta_auth()
1099 mlme.fils_aad.SNonce, FILS_NONCE_LEN); in atheros_sta_auth()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/
Ddriver_atheros.c1083 os_memcpy(mlme.fils_aad.SNonce, params->fils_snonce, in atheros_sta_auth()
1092 mlme.fils_aad.SNonce, FILS_NONCE_LEN); in atheros_sta_auth()
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
DChangeLog263 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce
458 * added a workaround for 4-way handshake to update SNonce even after
460 implementations that can change SNonce for each EAP-Key 2/4
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
DChangeLog306 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce
501 * added a workaround for 4-way handshake to update SNonce even after
503 implementations that can change SNonce for each EAP-Key 2/4