/external/wpa_supplicant_8/src/crypto/ |
milenage.h | 15 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 21 u8 *auts);
|
milenage.c | 200 * milenage_auts - Milenage AUTS validation 204 * @auts: AUTS = 112-bit authentication token from client 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, 218 sqn[i] = auts[i] ^ ak[i]; 220 os_memcmp_const(mac_s, auts + 6, 8) != 0) 267 * @auts: 112-bit buffer for AUTS 272 u8 *auts) 301 auts[i] = sqn[i] ^ ak[i] [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 24 unsigned char *ik, unsigned char *ck, unsigned char *auts);
|
pcsc_funcs.c | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 90 const char *username, const u8 *auts,
|
eap_server_aka.c | 41 int auts_reported; /* whether the current AUTS has been reported to the 1021 if (attr->auts == NULL) { 1029 /* Avoid re-reporting AUTS when processing pending EAP packet by 1030 * maintaining a local flag stating whether this AUTS has already been 1034 attr->auts, data->rand)) { [all...] |
eap_sim_db.c | [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
TelephonyUtil.java | 369 String auts = makeHex(result, 2, autsLen); local 371 sb.append(":" + auts); 372 Log.v(TAG, "auts:" + auts);
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/util/ |
TelephonyUtilTest.java | 269 private static String create3GSimAuthUmtsAutsResponse(byte[] auts) { 270 byte[] result = new byte[auts.length + 2]; 273 result[idx++] = (byte) auts.length; 274 for (int i = 0; i < auts.length; ++i) { 275 result[idx++] = auts[i]; 356 assertEquals("UMTS-AUTS", response.type);
|
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 30 * EAP-AKA / UMTS AUTS (re-synchronization): 31 * AKA-AUTS <IMSI> <AUTS> <RAND> 34 * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings. 813 char *auts, *__rand; local 819 /* AKA-AUTS <IMSI> <AUTS> <RAND> */ 821 auts = strchr(imsi, ' '); 822 if (auts == NULL) 824 *auts++ = '\0' [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN); 190 if (os_strncmp(resp, "UMTS-AUTS:", 10) == 0) { 192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0) 194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 264 data->ik, data->ck, data->auts); 298 data->res, &data->res_len, data->auts); 590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts, 973 "failed (AUTN seq# -> AUTS)"); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
sta_network.h | 181 const hidl_array<uint8_t, 14>& auts, 285 const std::array<uint8_t, 14>& auts);
|
sta_network.cpp | 66 constexpr char kNetworkEapSimUmtsAutsResponse[] = "UMTS-AUTS"; 621 const hidl_array<uint8_t, 14> &auts, 627 auts); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
eap_sim_common.c | 820 attr->auts = apos;
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
SupplicantStaNetworkHalTest.java | 557 * Tests the parsing of UMTS auts response parameters. 561 final byte[] auts = new byte[]{0x45, 0x45, 0x32, 0x34, 0x45, 0x10, 0x34, 0x12, 0x23, 0x34, 563 String paramsStr = ":" + NativeUtil.hexStringFromByteArray(auts); 568 assertArrayEquals(auts, params); 577 * Tests the parsing of invalid UMTS auts response parameters (invalid auts length). 581 final byte[] auts = new byte[]{0x45, 0x45, 0x32, 0x34, 0x45, 0x10, 0x34, 0x12, 0x23}; 582 String paramsStr = ":" + NativeUtil.hexStringFromByteArray(auts); 587 assertArrayEquals(auts, params); [all...] |
/hardware/interfaces/wifi/supplicant/1.0/ |
ISupplicantStaNetwork.hal | [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
SupplicantStaNetworkHal.java | 78 * Regex pattern for extracting the UMTS sim auts response params from a string. [all...] |