Home
last modified time | relevance | path

Searched refs:session_mac (Results 1 – 25 of 44) sorted by relevance

12

/dports/net/hostapd/hostapd-2.9/src/p2p/
H A Dp2p_pd.c374 prov->session_mac); in p2p_build_prov_disc_resp()
423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov()
464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req()
651 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req()
829 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
861 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
890 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req()
1027 sa, adv_mac, session_mac, in p2p_process_prov_disc_req()
1230 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp()
1480 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp()
[all …]
H A Dp2p_parse.c368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute()
370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
H A Dp2p_i.h645 const u8 *session_mac; member
/dports/net/hostapd-devel/hostap-14ab4a816/src/p2p/
H A Dp2p_pd.c374 prov->session_mac); in p2p_build_prov_disc_resp()
423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov()
464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req()
649 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req()
827 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
859 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
888 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req()
1025 sa, adv_mac, session_mac, in p2p_process_prov_disc_req()
1228 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp()
1478 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp()
[all …]
H A Dp2p_parse.c368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute()
370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
H A Dp2p_i.h648 const u8 *session_mac; member
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/p2p/
H A Dp2p_pd.c374 prov->session_mac); in p2p_build_prov_disc_resp()
423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov()
464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req()
651 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req()
829 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
861 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
890 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req()
1027 sa, adv_mac, session_mac, in p2p_process_prov_disc_req()
1230 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp()
1480 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp()
[all …]
H A Dp2p_parse.c368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute()
370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/p2p/
H A Dp2p_pd.c374 prov->session_mac); in p2p_build_prov_disc_resp()
423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov()
464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req()
649 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req()
827 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
859 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
888 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req()
1025 sa, adv_mac, session_mac, in p2p_process_prov_disc_req()
1228 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp()
1478 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp()
[all …]
H A Dp2p_parse.c368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute()
370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/p2p/
H A Dp2p_pd.c374 prov->session_mac); in p2p_build_prov_disc_resp()
423 os_memcpy(tmp->session_mac, session_mac, ETH_ALEN); in p2ps_setup_p2ps_prov()
464 P2PS_PD_REQ_CHECK(1, session_mac); in p2ps_validate_pd_req()
649 os_memcpy(session_mac, msg.session_mac, ETH_ALEN); in p2p_process_prov_disc_req()
827 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
859 session_mac, adv_mac) < 0) { in p2p_process_prov_disc_req()
888 os_memcmp(p2p->p2ps_prov->session_mac, msg.session_mac, ETH_ALEN)) { in p2p_process_prov_disc_req()
1025 sa, adv_mac, session_mac, in p2p_process_prov_disc_req()
1228 if (os_memcmp(p2p->p2ps_prov->session_mac, msg->session_mac, in p2p_validate_p2ps_pd_resp()
1478 p2p->p2ps_prov->session_mac, in p2p_process_prov_disc_resp()
[all …]
H A Dp2p_parse.c368 msg->session_mac = &data[sizeof(u32)]; in p2p_parse_attribute()
370 WPA_GET_LE32(data), MAC2STR(msg->session_mac)); in p2p_parse_attribute()
/dports/security/opensc/OpenSC-0.22.0/src/libopensc/
H A Dsm.h134 unsigned char *session_enc, *session_mac, *session_kek; member
190 unsigned char session_mac[16]; member
214 unsigned char session_mac[16]; member
H A Dcwa14890.c761 memcpy(sm->session_mac, sha_data, 16); /* kmac=16 fsb sha((kifd^kicc)||00000002) */ in cwa_compute_session_keys()
786 sc_log(ctx, "Kmac: %s", sc_dump_hex(sm->session_mac, 16)); in cwa_compute_session_keys()
1517 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[0]),&k1); in cwa_encode_apdu()
1518 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[8]),&k2); in cwa_encode_apdu()
1722 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[0]), &k1); in cwa_decode_response()
1723 DES_set_key_unchecked((const_DES_cblock *) & (sm_session->session_mac[8]), &k2); in cwa_decode_response()
/dports/security/opensc/OpenSC-0.22.0/src/smm/
H A Dsm-global-platform.c204 gp_session->session_mac = sc_gp_get_session_key(ctx, gp_session, gp_keyset->mac); in sm_gp_init_session()
206 if (!gp_session->session_enc || !gp_session->session_mac || !gp_session->session_kek) in sm_gp_init_session()
211 … SC_LOG_DEBUG_SM, "SM GP init session: session MAC: %s", sc_dump_hex(gp_session->session_mac, 16)); in sm_gp_init_session()
231 free(gp_session->session_mac); in sm_gp_close_session()
290 rv = sm_gp_get_mac(gp_session->session_mac, &gp_session->mac_icv, raw_apdu, offs, &mac); in sm_gp_external_authentication()
395 rv = sm_gp_get_mac(gp_session->session_mac, &gp_session->mac_icv, buff, 5 + apdu->datalen, &mac); in sm_gp_securize_apdu()
H A Dsm-cwa14890.c200 memcpy(&session_data->session_mac[0], buff, sizeof(session_data->session_mac)); in sm_cwa_init_session_keys()
209 memcpy(&session_data->session_mac[0], buff, sizeof(session_data->session_mac)); in sm_cwa_init_session_keys()
374 rv = sm_cwa_get_mac(ctx, session_data->session_mac, &icv, mac_data, mac_len, &cblock, 0); in sm_cwa_securize_apdu()
H A Dsm-card-iasecc.c526 …SC_LOG_DEBUG_SM, "SKMAC %s", sc_dump_hex(cwa_session->session_mac, sizeof(cwa_session->session_mac in sm_iasecc_get_apdus()
/dports/ftp/libfilezilla/libfilezilla-0.31.1/lib/
H A Dtls_info.cpp65 std::string const& session_mac, in tls_session_info() argument
75 , session_mac_(session_mac) in tls_session_info()
/dports/net/hostapd-devel/hostap-14ab4a816/wpa_supplicant/
H A DREADME-P2P220 <session_mac=initiator mac address>
226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:…
237 session_mac - Mandatory MAC address that owns/initiated the session
246 <session=session id> <session_mac=peer MAC address>
251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:…
262 session_mac - Mandatory MAC address that owns/initiated the session
799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
808 session_mac - always MAC address that owns/initiated the session
816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
826 session_mac - always MAC address that owns/initiated the session
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/wpa_supplicant/
H A DREADME-P2P220 <session_mac=initiator mac address>
226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:…
237 session_mac - Mandatory MAC address that owns/initiated the session
246 <session=session id> <session_mac=peer MAC address>
251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:…
262 session_mac - Mandatory MAC address that owns/initiated the session
799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
808 session_mac - always MAC address that owns/initiated the session
816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
826 session_mac - always MAC address that owns/initiated the session
/dports/security/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A DREADME-P2P220 <session_mac=initiator mac address>
226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:…
237 session_mac - Mandatory MAC address that owns/initiated the session
246 <session=session id> <session_mac=peer MAC address>
251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:…
262 session_mac - Mandatory MAC address that owns/initiated the session
799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
808 session_mac - always MAC address that owns/initiated the session
816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
826 session_mac - always MAC address that owns/initiated the session
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/wpa_supplicant/
H A DREADME-P2P220 <session_mac=initiator mac address>
226 …33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 session_mac=00:11:22:33:44:…
237 session_mac - Mandatory MAC address that owns/initiated the session
246 <session=session id> <session_mac=peer MAC address>
251 …adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_mac=00:11:22:33:44:…
262 session_mac - Mandatory MAC address that owns/initiated the session
799 …3:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
808 session_mac - always MAC address that owns/initiated the session
816 …tatus=0 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 session_mac=00:11:22:33:44:…
826 session_mac - always MAC address that owns/initiated the session
/dports/ftp/libfilezilla/libfilezilla-0.31.1/lib/libfilezilla/
H A Dtls_info.hpp157 std::string const& session_mac,
/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/
H A Dtest_p2ps.py146 session_mac=addr0, method=method, cpt=seeker_cpt,
156 advert_id, advert_mac, session, session_mac =\
200 session_mac=session_mac, status=12,
1000 session_id=1, session_mac=addr1)
1010 session_mac=addr1, status=11, method=0)
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/
H A Dtest_p2ps.py146 session_mac=addr0, method=method, cpt=seeker_cpt,
156 advert_id, advert_mac, session, session_mac =\
200 session_mac=session_mac, status=12,
1000 session_id=1, session_mac=addr1)
1010 session_mac=addr1, status=11, method=0)

12