/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_i.h | 57 u8 SNonce[WPA_NONCE_LEN]; member
|
D | wpa_auth.c | 941 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN); in wpa_try_alt_snonce() 1106 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) in wpa_receive() 1120 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN); in wpa_receive() 1370 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); in wpa_receive() 2231 sm->SNonce, sm->ANonce, in wpa_derive_ptk() 2326 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN); in fils_auth_pmk_to_ptk() 2543 aad[2] = sm->SNonce; in fils_decrypt_assoc() 2605 aad[3] = sm->SNonce; in fils_encrypt_assoc() 2868 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK) < 0) in SM_STATE() 4926 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN); in wpa_auth_get_fils_aead_params()
|
D | wpa_auth_ft.c | 2150 return wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_auth_derive_ptk_ft() 2489 snonce = sm->SNonce; in wpa_sm_write_assoc_resp_ies() 2914 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 2924 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3006 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3010 if (wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_ft_process_auth_req() 3054 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0); in wpa_ft_process_auth_req() 3193 if (os_memcmp(snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { in wpa_ft_validate_reassoc() 3198 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_validate_reassoc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_i.h | 57 u8 SNonce[WPA_NONCE_LEN]; member
|
D | wpa_auth_ft.c | 2148 return wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_auth_derive_ptk_ft() 2608 snonce = sm->SNonce; in wpa_sm_write_assoc_resp_ies() 3105 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3115 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3195 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3206 if (wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_ft_process_auth_req() 3250 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0, in wpa_ft_process_auth_req() 3394 if (os_memcmp(snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { in wpa_ft_validate_reassoc() 3399 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_validate_reassoc()
|
D | wpa_auth.c | 1001 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN); in wpa_try_alt_snonce() 1173 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) in wpa_receive() 1185 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN); in wpa_receive() 1432 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); in wpa_receive() 2322 sm->SNonce, sm->ANonce, in wpa_derive_ptk() 2423 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN); in fils_auth_pmk_to_ptk() 2640 aad[2] = sm->SNonce; in fils_decrypt_assoc() 2702 aad[3] = sm->SNonce; in fils_encrypt_assoc() 2989 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK, in SM_STATE() 5332 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN); in wpa_auth_get_fils_aead_params()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
D | driver_atheros.c | 1090 os_memcpy(mlme.fils_aad.SNonce, params->fils_snonce, in atheros_sta_auth() 1099 mlme.fils_aad.SNonce, FILS_NONCE_LEN); in atheros_sta_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
D | driver_atheros.c | 1083 os_memcpy(mlme.fils_aad.SNonce, params->fils_snonce, in atheros_sta_auth() 1092 mlme.fils_aad.SNonce, FILS_NONCE_LEN); in atheros_sta_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | ChangeLog | 263 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce 458 * added a workaround for 4-way handshake to update SNonce even after 460 implementations that can change SNonce for each EAP-Key 2/4
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | ChangeLog | 306 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce 501 * added a workaround for 4-way handshake to update SNonce even after 503 implementations that can change SNonce for each EAP-Key 2/4
|