/dports/net/hostapd/hostapd-2.9/src/p2p/ |
H A D | p2p_pd.c | 374 prov->session_mac); in p2p_build_prov_disc_resp() 423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov() 464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req() 651 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req() 829 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 861 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 890 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req() 1027 sa, adv_mac, session_mac, in p2p_process_prov_disc_req() 1230 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp() 1480 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp() [all …]
|
H A D | p2p_parse.c | 368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute() 370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
|
H A D | p2p_i.h | 645 const u8 *session_mac; member
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/p2p/ |
H A D | p2p_pd.c | 374 prov->session_mac); in p2p_build_prov_disc_resp() 423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov() 464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req() 649 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req() 827 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 859 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 888 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req() 1025 sa, adv_mac, session_mac, in p2p_process_prov_disc_req() 1228 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp() 1478 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp() [all …]
|
H A D | p2p_parse.c | 368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute() 370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
|
H A D | p2p_i.h | 648 const u8 *session_mac; member
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_pd.c | 374 prov->session_mac); in p2p_build_prov_disc_resp() 423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov() 464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req() 651 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req() 829 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 861 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 890 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req() 1027 sa, adv_mac, session_mac, in p2p_process_prov_disc_req() 1230 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp() 1480 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp() [all …]
|
H A D | p2p_parse.c | 368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute() 370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_pd.c | 374 prov->session_mac); in p2p_build_prov_disc_resp() 423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov() 464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req() 649 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req() 827 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 859 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 888 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req() 1025 sa, adv_mac, session_mac, in p2p_process_prov_disc_req() 1228 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp() 1478 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp() [all …]
|
H A D | p2p_parse.c | 368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute() 370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/p2p/ |
H A D | p2p_pd.c | 374 prov->session_mac); in p2p_build_prov_disc_resp() 423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov() 464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req() 649 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req() 827 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 859 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req() 888 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req() 1025 sa, adv_mac, session_mac, in p2p_process_prov_disc_req() 1228 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp() 1478 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp() [all …]
|
H A D | p2p_parse.c | 368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute() 370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
|
/dports/security/opensc/OpenSC-0.22.0/src/libopensc/ |
H A D | sm.h | 134 unsigned char *session_enc, *session_mac, *session_kek; member 190 unsigned char session_mac[16]; member 214 unsigned char session_mac[16]; member
|
H A D | cwa14890.c | 761 memcpy(sm->session_mac, sha_data, 16); /* kmac=16 fsb sha((kifd^kicc)||00000002) */ in cwa_compute_session_keys() 786 sc_log(ctx, "Kmac: %s", sc_dump_hex(sm->session_mac, 16)); in cwa_compute_session_keys() 1517 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[0]),&k1); in cwa_encode_apdu() 1518 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[8]),&k2); in cwa_encode_apdu() 1722 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[0]), &k1); in cwa_decode_response() 1723 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[8]), &k2); in cwa_decode_response()
|
/dports/security/opensc/OpenSC-0.22.0/src/smm/ |
H A D | sm-global-platform.c | 204 gp_session->session_mac = sc_gp_get_session_key(ctx, gp_session, gp_keyset->mac); in sm_gp_init_session() 206 if (!gp_session->session_enc || !gp_session->session_mac || !gp_session->session_kek) in sm_gp_init_session() 211 … SC_LOG_DEBUG_SM, "SM GP init session: session MAC: %s", sc_dump_hex(gp_session->session_mac, 16)); in sm_gp_init_session() 231 free(gp_session->session_mac); in sm_gp_close_session() 290 rv = sm_gp_get_mac(gp_session->session_mac, &gp_session->mac_icv, raw_apdu, offs, &mac); in sm_gp_external_authentication() 395 rv = sm_gp_get_mac(gp_session->session_mac, &gp_session->mac_icv, buff, 5 + apdu->datalen, &mac); in sm_gp_securize_apdu()
|
H A D | sm-cwa14890.c | 200 memcpy(&session_data->session_mac[0], buff, sizeof(session_data->session_mac)); in sm_cwa_init_session_keys() 209 memcpy(&session_data->session_mac[0], buff, sizeof(session_data->session_mac)); in sm_cwa_init_session_keys() 374 rv = sm_cwa_get_mac(ctx, session_data->session_mac, &icv, mac_data, mac_len, &cblock, 0); in sm_cwa_securize_apdu()
|
H A D | sm-card-iasecc.c | 526 …SC_LOG_DEBUG_SM, "SKMAC %s", sc_dump_hex(cwa_session->session_mac, sizeof(cwa_session->session_mac… in sm_iasecc_get_apdus()
|
/dports/ftp/libfilezilla/libfilezilla-0.31.1/lib/ |
H A D | tls_info.cpp | 65 std::string const& session_mac, in tls_session_info() argument 75 , session_mac_(session_mac) in tls_session_info()
|
/dports/net/hostapd-devel/hostap-14ab4a816/wpa_supplicant/ |
H A D | README-P2P | 220 <session_mac=initiator mac address> 226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:… 237 session_mac - Mandatory MAC address that owns/initiated the session 246 <session=session id> <session_mac=peer MAC address> 251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:… 262 session_mac - Mandatory MAC address that owns/initiated the session 799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 808 session_mac - always MAC address that owns/initiated the session 816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 826 session_mac - always MAC address that owns/initiated the session
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | README-P2P | 220 <session_mac=initiator mac address> 226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:… 237 session_mac - Mandatory MAC address that owns/initiated the session 246 <session=session id> <session_mac=peer MAC address> 251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:… 262 session_mac - Mandatory MAC address that owns/initiated the session 799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 808 session_mac - always MAC address that owns/initiated the session 816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 826 session_mac - always MAC address that owns/initiated the session
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | README-P2P | 220 <session_mac=initiator mac address> 226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:… 237 session_mac - Mandatory MAC address that owns/initiated the session 246 <session=session id> <session_mac=peer MAC address> 251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:… 262 session_mac - Mandatory MAC address that owns/initiated the session 799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 808 session_mac - always MAC address that owns/initiated the session 816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 826 session_mac - always MAC address that owns/initiated the session
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/wpa_supplicant/ |
H A D | README-P2P | 220 <session_mac=initiator mac address> 226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:… 237 session_mac - Mandatory MAC address that owns/initiated the session 246 <session=session id> <session_mac=peer MAC address> 251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:… 262 session_mac - Mandatory MAC address that owns/initiated the session 799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 808 session_mac - always MAC address that owns/initiated the session 816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:… 826 session_mac - always MAC address that owns/initiated the session
|
/dports/ftp/libfilezilla/libfilezilla-0.31.1/lib/libfilezilla/ |
H A D | tls_info.hpp | 157 std::string const& session_mac,
|
/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_p2ps.py | 146 session_mac=addr0, method=method, cpt=seeker_cpt, 156 advert_id, advert_mac, session, session_mac =\ 200 session_mac=session_mac, status=12, 1000 session_id=1, session_mac=addr1) 1010 session_mac=addr1, status=11, method=0)
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_p2ps.py | 146 session_mac=addr0, method=method, cpt=seeker_cpt, 156 advert_id, advert_mac, session, session_mac =\ 200 session_mac=session_mac, status=12, 1000 session_id=1, session_mac=addr1) 1010 session_mac=addr1, status=11, method=0)
|