Lines Matching full:scard
443 ctx->scard_ctx = wpa_s->scard;
472 eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
502 scard_deinit(wpa_s->scard);
830 struct scard_data *scard;
859 scard = scard_init(SCARD_TRY_BOTH);
860 if (scard == NULL)
862 if (scard_set_pin(scard, "1234")) {
864 scard_deinit(scard);
869 if (scard_get_imsi(scard, imsi, &len))
871 wpa_hexdump_ascii(MSG_DEBUG, "SCARD: IMSI", (u8 *) imsi, len);
874 wpa_printf(MSG_DEBUG, "SCARD: MNC length %d",
875 scard_get_mnc_len(scard));
878 if (scard_gsm_auth(scard, _rand, sres, kc))
882 if (scard_gsm_auth(scard, _rand, sres, kc))
887 if (scard_gsm_auth(scard, rand_[i], sres_[i], kc_[i]))
914 res = scard_umts_auth(scard, aka_rand, aka_autn, aka_res, &aka_res_len,
930 scard_deinit(scard);
939 struct scard_data *scard;
959 scard = scard_init(SCARD_GSM_SIM_ONLY);
960 if (scard == NULL) {
964 if (scard_set_pin(scard, argv[0])) {
966 scard_deinit(scard);
971 if (scard_get_imsi(scard, imsi, &len)) {
972 scard_deinit(scard);
978 if (scard_gsm_auth(scard, _rand, sres, kc))
996 scard_deinit(scard);
1019 "eapol_test scard\n"
1172 if (argc > optind && os_strcmp(argv[optind], "scard") == 0) {