/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
milenage.h | 21 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 27 u8 *auts);
|
hlr_auc_gw.c | 33 * EAP-AKA / UMTS AUTS (re-synchronization): 34 * AKA-AUTS <IMSI> <AUTS> <RAND> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 535 char *auts, *__rand; local 539 /* AKA-AUTS <IMSI> <AUTS> <RAND> */ 541 auts = strchr(imsi, ' '); 542 if (auts == NULL) 544 *auts++ = '\0' [all...] |
milenage.c | 206 * milenage_auts - Milenage AUTS validation 210 * @auts: AUTS = 112-bit authentication token from client 214 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 224 sqn[i] = auts[i] ^ ak[i]; 226 memcmp(mac_s, auts + 6, 8) != 0) 273 * @auts: 112-bit buffer for AUTS 278 u8 *auts) 307 auts[i] = sqn[i] ^ ak[i] 1026 u8 auts[14], sqn[6], _rand[16]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
milenage.h | 21 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 27 u8 *auts);
|
milenage.c | 206 * milenage_auts - Milenage AUTS validation 210 * @auts: AUTS = 112-bit authentication token from client 214 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 224 sqn[i] = auts[i] ^ ak[i]; 226 memcmp(mac_s, auts + 6, 8) != 0) 273 * @auts: 112-bit buffer for AUTS 278 u8 *auts) 307 auts[i] = sqn[i] ^ ak[i] [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 33 * EAP-AKA / UMTS AUTS (re-synchronization): 34 * AKA-AUTS <IMSI> <AUTS> <RAND> 37 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 536 char *auts, *__rand; local 540 /* AKA-AUTS <IMSI> <AUTS> <RAND> */ 542 auts = strchr(imsi, ' '); 543 if (auts == NULL) 545 *auts++ = '\0' [all...] |
/external/wpa_supplicant/ |
pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
eap_sim_common.h | 133 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
pcsc_funcs.c | 1128 * @auts: 14-byte buffer for AUTS 1136 * synchronization failure, the received AUTS value will be written into auts 1142 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1196 os_memcpy(auts, buf + 2, AKA_AUTS_LEN); 1197 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN); [all...] |
eap_aka.c | 34 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 80 data->ik, data->ck, data->auts); 232 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts, 454 "failed (AUTN seq# -> AUTS)");
|
eap_sim_common.c | 542 attr->auts = apos;
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
pcsc_funcs.c | 1128 * @auts: 14-byte buffer for AUTS 1136 * synchronization failure, the received AUTS value will be written into auts 1142 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1196 os_memcpy(auts, buf + 2, AKA_AUTS_LEN); 1197 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 88 size_t identity_len, const u8 *auts,
|
eap_sim_db.c | [all...] |
eap_server_aka.c | 47 int auts_reported; /* whether the current AUTS has been reported to the 923 if (attr->auts == NULL) { 931 /* Avoid re-reporting AUTS when processing pending EAP packet by 932 * maintaining a local flag stating whether this AUTS has already been 936 sm->identity_len, attr->auts, [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 55 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
pcsc_funcs.c | 1128 * @auts: 14-byte buffer for AUTS 1136 * synchronization failure, the received AUTS value will be written into auts 1142 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1196 os_memcpy(auts, buf + 2, AKA_AUTS_LEN); 1197 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 90 size_t identity_len, const u8 *auts,
|
eap_sim_db.c | [all...] |
eap_aka.c | 47 int auts_reported; /* whether the current AUTS has been reported to the 923 if (attr->auts == NULL) { 931 /* Avoid re-reporting AUTS when processing pending EAP packet by 932 * maintaining a local flag stating whether this AUTS has already been 936 sm->identity_len, attr->auts, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 192 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 192 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 41 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 155 data->ik, data->ck, data->auts); 189 data->res, &data->res_len, data->auts); 453 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts, 835 "failed (AUTN seq# -> AUTS)"); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 39 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 153 data->ik, data->ck, data->auts); 187 data->res, &data->res_len, data->auts); 451 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts, 833 "failed (AUTN seq# -> AUTS)"); [all...] |