Searched refs:nonce (Results 1 - 5 of 5) sorted by relevance

/haiku/src/libs/compat/openbsd_wlan/net80211/
H A Dieee80211_crypto_ccmp.c84 u_int8_t auth[32], nonce[13]; local
125 /* construct CCM nonce */
126 nonce[ 0] = tid;
129 nonce[0] |= 1 << 4; /* 11w: set management bit */
130 IEEE80211_ADDR_COPY(&nonce[1], wh->i_addr2);
131 nonce[ 7] = pn >> 40; /* PN5 */
132 nonce[ 8] = pn >> 32; /* PN4 */
133 nonce[ 9] = pn >> 24; /* PN3 */
134 nonce[10] = pn >> 16; /* PN2 */
135 nonce[1
[all...]
H A Dieee80211_pae_output.c280 /* copy the authenticator's nonce (ANonce) */
281 memcpy(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN);
334 /* copy the supplicant's nonce (SNonce) */
335 memcpy(key->nonce, ic->ic_nonce, EAPOL_KEY_NONCE_LEN);
397 /* use same nonce as in Message 1 */
398 memcpy(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN);
H A Dieee80211_pae_input.c256 /* save authenticator's nonce (ANonce) */
257 memcpy(ni->ni_nonce, key->nonce, EAPOL_KEY_NONCE_LEN);
259 /* generate supplicant's nonce (SNonce) */
305 ni->ni_macaddr, ni->ni_nonce, key->nonce, &tptk);
395 if (memcmp(key->nonce, ni->ni_nonce, EAPOL_KEY_NONCE_LEN) != 0) {
401 ic->ic_myaddr, key->nonce, ic->ic_nonce, &tptk);
542 * used pairwise key. If this attack succeeded, the incremental nonce
H A Dieee80211.h1073 u_int8_t nonce[EAPOL_KEY_NONCE_LEN]; member in struct:ieee80211_eapol_key
/haiku/src/bin/network/ping/
H A Dping6.c149 /* FQDN case, 64 bits of nonce + 32 bits ttl */
223 static u_int8_t nonce[8]; /* nonce field for node information */ variable
793 arc4random_buf(nonce, sizeof(nonce));
1352 memcpy(nip->icmp6_ni_nonce, nonce,
1369 memcpy(nip->icmp6_ni_nonce, nonce,
1384 memcpy(nip->icmp6_ni_nonce, nonce,
1402 memcpy(nip->icmp6_ni_nonce, nonce,
1471 nonce
[all...]

Completed in 156 milliseconds