HomeSort by relevance Sort by last modified time
    Searched refs:auts (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
milenage.h 21 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
27 u8 *auts);
hlr_auc_gw.c 33 * EAP-AKA / UMTS AUTS (re-synchronization):
34 * AKA-AUTS <IMSI> <AUTS> <RAND>
37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
535 char *auts, *__rand; local
539 /* AKA-AUTS <IMSI> <AUTS> <RAND> */
541 auts = strchr(imsi, ' ');
542 if (auts == NULL)
544 *auts++ = '\0'
    [all...]
milenage.c 206 * milenage_auts - Milenage AUTS validation
210 * @auts: AUTS = 112-bit authentication token from client
214 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts,
224 sqn[i] = auts[i] ^ ak[i];
226 memcmp(mac_s, auts + 6, 8) != 0)
273 * @auts: 112-bit buffer for AUTS
278 u8 *auts)
307 auts[i] = sqn[i] ^ ak[i]
1026 u8 auts[14], sqn[6], _rand[16]; local
    [all...]
  /external/wpa_supplicant/
pcsc_funcs.h 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
eap_sim_common.h 133 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
eap_aka.c 34 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data
80 data->ik, data->ck, data->auts);
232 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
454 "failed (AUTN seq# -> AUTS)");
pcsc_funcs.c 1128 * @auts: 14-byte buffer for AUTS
1136 * synchronization failure, the received AUTS value will be written into auts
1142 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1196 os_memcpy(auts, buf + 2, AKA_AUTS_LEN);
1197 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN);
    [all...]
eap_sim_common.c 542 attr->auts = apos;
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.h 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
pcsc_funcs.c 1128 * @auts: 14-byte buffer for AUTS
1136 * synchronization failure, the received AUTS value will be written into auts
1142 unsigned char *ik, unsigned char *ck, unsigned char *auts)
1196 os_memcpy(auts, buf + 2, AKA_AUTS_LEN);
1197 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim_db.h 90 size_t identity_len, const u8 *auts,
eap_sim_db.c     [all...]
eap_aka.c 47 int auts_reported; /* whether the current AUTS has been reported to the
923 if (attr->auts == NULL) {
931 /* Avoid re-reporting AUTS when processing pending EAP packet by
932 * maintaining a local flag stating whether this AUTS has already been
936 sm->identity_len, attr->auts,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 192 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
eap_sim_common.c 825 attr->auts = apos;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 41 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data
155 data->ik, data->ck, data->auts);
189 data->res, &data->res_len, data->auts);
453 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
835 "failed (AUTN seq# -> AUTS)");
    [all...]

Completed in 203 milliseconds