/external/wpa_supplicant/ |
events.c | 172 * configured to use PC/SC for SIM/USIM access (EAP-SIM or EAP-AKA). 178 int aka = 0, sim = 0, type; local 185 aka = 1; 194 aka = 1; 203 aka = 0; 205 if (!sim && !aka) { 207 "SIM, but neither EAP-SIM nor EAP-AKA are enabled"); 212 "(sim=%d aka=%d) - initialize PCSC", sim, aka); 213 if (sim && aka) [all...] |
eap.c | 855 int aka = 0; local 873 aka = 1; 886 ssid->identity[0] = aka ? '0' : '1'; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
events.c | 183 * configured to use PC/SC for SIM/USIM access (EAP-SIM or EAP-AKA). 189 int aka = 0, sim = 0, type; local 196 aka = 1; 205 aka = 1; 214 aka = 0; 216 if (!sim && !aka) { 218 "SIM, but neither EAP-SIM nor EAP-AKA are enabled"); 223 "(sim=%d aka=%d) - initialize PCSC", sim, aka); 224 if (sim && aka) [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
ClassTest.java | 283 clazz = Mou$$aka.class; 285 assertEquals("Top-level class name must be correct", pkg + "Mou$$aka", clazz.getName()); 286 assertEquals("Top-level class simple name must be correct", "Mou$$aka", clazz.getSimpleName()); 287 assertEquals("Top-level class canonical name must be correct", pkg + "Mou$$aka", clazz.getCanonicalName()); 335 class Mou$$aka {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.c | 14 * This is an example implementation of the EAP-SIM/AKA database/authentication 18 * EAP-SIM/AKA pseudonyms and re-auth identities. It can be used with different 46 int aka; member in struct:eap_sim_db_pending 61 } aka; member in union:eap_sim_db_pending::__anon8508 79 size_t imsi_len, int aka) 85 if (entry->aka == aka && entry->imsi_len == imsi_len && 194 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 195 * AKA-RESP-AUTH <IMSI> FAILURE 220 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.c | 874 int aka = 0; local 892 aka = 1; 905 conf->identity[0] = aka ? '0' : '1'; [all...] |