Searched refs:SNonce (Results 1 – 5 of 5) sorted by relevance
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_i.h | 57 u8 SNonce[WPA_NONCE_LEN]; member
|
H A D | wpa_auth_ft.c | 2161 return wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_auth_derive_ptk_ft() 2660 snonce = sm->SNonce; in wpa_sm_write_assoc_resp_ies() 3335 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3346 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3357 os_memcpy(sm->SNonce, ftie->snonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3361 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_process_auth_req() 3372 if (wpa_pmk_r1_to_ptk(pmk_r1, pmk_r1_len, sm->SNonce, sm->ANonce, in wpa_ft_process_auth_req() 3426 sm->ANonce, sm->SNonce, pos, end - pos, NULL, 0, in wpa_ft_process_auth_req() 3562 if (os_memcmp(parse.fte_snonce, sm->SNonce, WPA_NONCE_LEN) != 0) { in wpa_ft_validate_reassoc() 3567 sm->SNonce, WPA_NONCE_LEN); in wpa_ft_validate_reassoc()
|
H A D | wpa_auth.c | 1367 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN); 1472 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) { 1484 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN); 1889 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN); 2883 sm->SNonce, sm->ANonce, 3037 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN); 3254 aad[2] = sm->SNonce; 3316 aad[3] = sm->SNonce; 3690 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK, 6791 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN);
|
/freebsd/contrib/wpa/src/drivers/ |
H A D | driver_atheros.c | 1084 os_memcpy(mlme.fils_aad.SNonce, params->fils_snonce, in atheros_sta_auth() 1093 mlme.fils_aad.SNonce, FILS_NONCE_LEN); in atheros_sta_auth()
|
/freebsd/contrib/wpa/hostapd/ |
H A D | ChangeLog | 343 * extend EAPOL-Key msg 1/4 retry workaround for changing SNonce 538 * added a workaround for 4-way handshake to update SNonce even after 540 implementations that can change SNonce for each EAP-Key 2/4
|