/external/wpa_supplicant_8/src/crypto/ |
milenage.h | 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 21 u8 *auts);
|
milenage.c | 200 * milenage_auts - Milenage AUTS validation 204 * @auts: AUTS = 112-bit authentication token from client 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 218 sqn[i] = auts[i] ^ ak[i]; 220 memcmp(mac_s, auts + 6, 8) != 0) 267 * @auts: 112-bit buffer for AUTS 272 u8 *auts) 301 auts[i] = sqn[i] ^ ak[i] [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 31 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
pcsc_funcs.c | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 90 const char *username, const u8 *auts,
|
eap_server_aka.c | 41 int auts_reported; /* whether the current AUTS has been reported to the 1021 if (attr->auts == NULL) { 1029 /* Avoid re-reporting AUTS when processing pending EAP packet by 1030 * maintaining a local flag stating whether this AUTS has already been 1034 attr->auts, data->rand)) { [all...] |
eap_sim_db.c | [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 27 * EAP-AKA / UMTS AUTS (re-synchronization): 28 * AKA-AUTS <IMSI> <AUTS> <RAND> 31 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 794 char *auts, *__rand; local 798 /* AKA-AUTS <IMSI> <AUTS> <RAND> */ 800 auts = strchr(imsi, ' '); 801 if (auts == NULL) 803 *auts++ = '\0' [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
eap_sim_common.c | 820 attr->auts = apos;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 157 data->ik, data->ck, data->auts); 191 data->res, &data->res_len, data->auts); 480 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts, 862 "failed (AUTN seq# -> AUTS)"); [all...] |