Searched refs:SNonce (Results 1 - 9 of 9) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ft.c398 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
687 snonce = sm->SNonce;
843 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN);
889 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
890 sm->SNonce, WPA_NONCE_LEN);
895 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
933 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0);
1040 if (os_memcmp(ftie->snonce, sm->SNonce, WPA_NONCE_LEN) != 0) {
1041 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE");
1042 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
[all...]
H A Dwpa_auth_i.h60 u8 SNonce[WPA_NONCE_LEN]; member in struct:wpa_state_machine
H A Dwpa_auth.c926 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0)
930 * WZC) update SNonce for each EAPOL-Key 2/4. This
932 * pending requests, so allow the SNonce to be updated
936 "Process SNonce update from STA "
951 "SNonce did not change", msgtxt);
1193 * pending msg 1/4 to update the SNonce to work around
1228 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN);
1827 sm->wpa_auth->addr, sm->addr, sm->ANonce, sm->SNonce,
3163 * Some deployed supplicant implementations update their SNonce
3165 * handshake and then fail to use the first SNonce whe
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ft.c398 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
687 snonce = sm->SNonce;
843 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN);
889 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
890 sm->SNonce, WPA_NONCE_LEN);
895 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
933 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0);
1040 if (os_memcmp(ftie->snonce, sm->SNonce, WPA_NONCE_LEN) != 0) {
1041 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE");
1042 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
[all...]
H A Dwpa_auth_i.h60 u8 SNonce[WPA_NONCE_LEN]; member in struct:wpa_state_machine
H A Dwpa_auth.c926 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0)
930 * WZC) update SNonce for each EAPOL-Key 2/4. This
932 * pending requests, so allow the SNonce to be updated
936 "Process SNonce update from STA "
951 "SNonce did not change", msgtxt);
1193 * pending msg 1/4 to update the SNonce to work around
1228 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN);
1827 sm->wpa_auth->addr, sm->addr, sm->ANonce, sm->SNonce,
3163 * Some deployed supplicant implementations update their SNonce
3165 * handshake and then fail to use the first SNonce whe
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ft.c398 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
687 snonce = sm->SNonce;
843 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN);
889 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
890 sm->SNonce, WPA_NONCE_LEN);
895 wpa_pmk_r1_to_ptk(pmk_r1, sm->SNonce, sm->ANonce, sm->addr,
933 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0);
1040 if (os_memcmp(ftie->snonce, sm->SNonce, WPA_NONCE_LEN) != 0) {
1041 wpa_printf(MSG_DEBUG, "FT: SNonce mismatch in FTIE");
1042 wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
[all...]
H A Dwpa_auth_i.h60 u8 SNonce[WPA_NONCE_LEN]; member in struct:wpa_state_machine
H A Dwpa_auth.c926 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0)
930 * WZC) update SNonce for each EAPOL-Key 2/4. This
932 * pending requests, so allow the SNonce to be updated
936 "Process SNonce update from STA "
951 "SNonce did not change", msgtxt);
1193 * pending msg 1/4 to update the SNonce to work around
1228 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN);
1827 sm->wpa_auth->addr, sm->addr, sm->ANonce, sm->SNonce,
3163 * Some deployed supplicant implementations update their SNonce
3165 * handshake and then fail to use the first SNonce whe
[all...]

Completed in 152 milliseconds