HomeSort by relevance Sort by last modified time
    Searched defs:sres (Results 1 - 9 of 9) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.c 237 * @sres: Buffer for SRES = 32-bit SRES
241 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc)
253 os_memcpy(sres, res, 4);
256 sres[i] = res[i] ^ res[i + 4];
1114 u8 sres[4], kc[8]; local
    [all...]
hlr_auc_gw.c 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
40 * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex
61 u8 sres[4]; member in struct:gsm_triplet
133 /* Parse IMSI:Kc:SRES:RAND */
185 /* SRES */
188 printf("%s:%d - Invalid SRES (%s)\n", fname, line,
194 if (strlen(pos) != 8 || hexstr2bin(pos, g->sres, 4)) {
195 printf("%s:%d - Invalid SRES (%s)\n", fname, line,
419 u8 _rand[16], sres[4], kc[8]; local
423 gsm_milenage(m->opc, m->ki, _rand, sres, kc)
    [all...]
  /external/wpa_supplicant/
eap_sim.c 32 u8 sres[3][EAP_SIM_SRES_LEN]; member in struct:eap_sim_data
113 data->sres[0], data->kc[0]) ||
115 data->sres[1], data->kc[1]) ||
118 data->sres[2], data->kc[2]))) {
124 /* These hardcoded Kc and SRES values are used for testing. RAND to
135 os_memcpy(data->sres[i], "\xd1\xd2\xd3\xd4",
141 os_memcpy(data->sres[i], "\xe1\xe2\xe3\xe4",
147 os_memcpy(data->sres[i], "\xf1\xf2\xf3\xf4",
318 (u8 *) data->sres,
eapol_test.c 719 unsigned char sres[4]; local
759 if (scard_gsm_auth(scard, _rand, sres, kc))
763 if (scard_gsm_auth(scard, _rand, sres, kc))
824 unsigned char sres[4]; local
859 if (scard_gsm_auth(scard, _rand, sres, kc))
862 /* IMSI:Kc:SRES:RAND */
870 printf("%02X", sres[j]);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim.c 32 u8 sres[EAP_SIM_MAX_CHAL][EAP_SIM_SRES_LEN]; member in struct:eap_sim_data
473 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
518 (u8 *) data->sres,
eap_sim_db.c 50 u8 sres[EAP_SIM_MAX_CHAL][EAP_SIM_SRES_LEN]; member in struct:eap_sim_db_pending::__anon8508::__anon8509
116 * SIM-RESP-AUTH <IMSI> Kc(i):SRES(i):RAND(i) ...
118 * (IMSI = ASCII string, Kc/SRES/RAND = hex string)
157 if (hexstr2bin(start, entry->u.sim.sres[num_chal],
528 * @sres: Buffer for SRES values
549 u8 *_rand, u8 *kc, u8 *sres,
602 os_memcpy(sres, entry->u.sim.sres,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/
eapol_test.c 795 unsigned char sres[4]; local
835 if (scard_gsm_auth(scard, _rand, sres, kc))
839 if (scard_gsm_auth(scard, _rand, sres, kc))
900 unsigned char sres[4]; local
935 if (scard_gsm_auth(scard, _rand, sres, kc))
938 /* IMSI:Kc:SRES:RAND */
946 printf("%02X", sres[j]);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sim.c 34 u8 sres[3][EAP_SIM_SRES_LEN]; member in struct:eap_sim_data
157 data->sres[0], data->kc[0]) ||
159 data->sres[1], data->kc[1]) ||
162 data->sres[2], data->kc[2]))) {
195 data->sres[i], data->kc[i])) {
203 wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES",
204 data->sres[i], EAP_SIM_SRES_LEN);
213 /* These hardcoded Kc and SRES values are used for testing. RAND to
220 wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES "
228 os_memcpy(data->sres[i], "\xd1\xd2\xd3\xd4"
    [all...]
  /external/bluetooth/hcidump/parser/
lmp.c 89 printf(" SRES ");
98 printf(" SRES ");
150 static inline void sres(struct frame *frm) function
196 return "sres";
1193 sres(frm);

Completed in 161 milliseconds