/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 398 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 687 snonce = sm->SNonce; 843 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); 889 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", 890 sm->SNonce, WPA_NONCE_LEN); 895 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 933 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0); 1040 if (os_memcmp(ftie->snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { 1041 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE"); 1042 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", [all...] |
H A D | wpa_auth_i.h | 60 u8 SNonce[WPA_NONCE_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 926 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) 930 * WZC) update SNonce for each EAPOL-Key 2/4. This 932 * pending requests, so allow the SNonce to be updated 936 "Process SNonce update from STA " 951 "SNonce did not change", msgtxt); 1193 * pending msg 1/4 to update the SNonce to work around 1228 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); 1827 sm->wpa_auth->addr, sm->addr, sm->ANonce, sm->SNonce, 3163 * Some deployed supplicant implementations update their SNonce 3165 * handshake and then fail to use the first SNonce whe [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 398 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 687 snonce = sm->SNonce; 843 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); 889 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", 890 sm->SNonce, WPA_NONCE_LEN); 895 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 933 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0); 1040 if (os_memcmp(ftie->snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { 1041 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE"); 1042 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", [all...] |
H A D | wpa_auth_i.h | 60 u8 SNonce[WPA_NONCE_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 926 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) 930 * WZC) update SNonce for each EAPOL-Key 2/4. This 932 * pending requests, so allow the SNonce to be updated 936 "Process SNonce update from STA " 951 "SNonce did not change", msgtxt); 1193 * pending msg 1/4 to update the SNonce to work around 1228 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); 1827 sm->wpa_auth->addr, sm->addr, sm->ANonce, sm->SNonce, 3163 * Some deployed supplicant implementations update their SNonce 3165 * handshake and then fail to use the first SNonce whe [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 398 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 687 snonce = sm->SNonce; 843 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); 889 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", 890 sm->SNonce, WPA_NONCE_LEN); 895 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr, 933 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0); 1040 if (os_memcmp(ftie->snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { 1041 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE"); 1042 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce", [all...] |
H A D | wpa_auth_i.h | 60 u8 SNonce[WPA_NONCE_LEN]; member in struct:wpa_state_machine
|
H A D | wpa_auth.c | 926 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) 930 * WZC) update SNonce for each EAPOL-Key 2/4. This 932 * pending requests, so allow the SNonce to be updated 936 "Process SNonce update from STA " 951 "SNonce did not change", msgtxt); 1193 * pending msg 1/4 to update the SNonce to work around 1228 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); 1827 sm->wpa_auth->addr, sm->addr, sm->ANonce, sm->SNonce, 3163 * Some deployed supplicant implementations update their SNonce 3165 * handshake and then fail to use the first SNonce whe [all...] |