/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 204 * @auts: AUTS = 112-bit authentication token from client 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, argument 218 sqn[i] = auts[i] ^ ak[i]; 220 os_memcmp_const(mac_s, auts + 6, 8) != 0) 267 * @auts: 112-bit buffer for AUTS 272 u8 *auts) 301 auts[i] = sqn[i] ^ ak[i]; 302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6)) 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 204 * @auts: AUTS = 112-bit authentication token from client 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, argument 218 sqn[i] = auts[i] ^ ak[i]; 220 os_memcmp_const(mac_s, auts + 6, 8) != 0) 267 * @auts: 112-bit buffer for AUTS 272 u8 *auts) 301 auts[i] = sqn[i] ^ ak[i]; 302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6)) 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 204 * @auts: AUTS = 112-bit authentication token from client 208 int milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, argument 218 sqn[i] = auts[i] ^ ak[i]; 220 os_memcmp_const(mac_s, auts + 6, 8) != 0) 267 * @auts: 112-bit buffer for AUTS 272 u8 *auts) 301 auts[i] = sqn[i] ^ ak[i]; 302 if (milenage_f1(opc, k, _rand, sqn, auts_amf, NULL, auts + 6)) 304 wpa_hexdump(MSG_DEBUG, "Milenage: AUTS", auts, 14); 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 813 char *auts, *__rand; local 821 auts = strchr(imsi, ' '); 822 if (auts == NULL) 824 *auts++ = '\0'; 826 __rand = strchr(auts, ' '); 833 imsi, auts, __rand); 835 if (hexstr2bin(auts, _auts, EAP_AKA_AUTS_LEN) ||
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN); 192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0) 194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 264 data->ik, data->ck, data->auts); 298 data->res, &data->res_len, data->auts); 590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 1479 * @auts: AUTS value from the peer 1491 const u8 *auts, const u8 *_rand) 1525 auts, EAP_AKA_AUTS_LEN); 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 1329 * @auts: 14-byte buffer for AUTS 1337 * synchronization failure, the received AUTS value will be written into auts 1343 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1397 os_memcpy(auts, buf + 2, AKA_AUTS_LEN); 1398 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN); 1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN); 192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0) 194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 264 data->ik, data->ck, data->auts); 298 data->res, &data->res_len, data->auts); 590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.c | 1479 * @auts: AUTS value from the peer 1491 const u8 *auts, const u8 *_rand) 1525 auts, EAP_AKA_AUTS_LEN); 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.c | 1329 * @auts: 14-byte buffer for AUTS 1337 * synchronization failure, the received AUTS value will be written into auts 1343 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1397 os_memcpy(auts, buf + 2, AKA_AUTS_LEN); 1398 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN); 1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 33 u8 auts[EAP_AKA_AUTS_LEN]; member in struct:eap_aka_data 142 os_memset(data->auts, 0, EAP_AKA_AUTS_LEN); 192 if (hexstr2bin(pos, data->auts, EAP_AKA_AUTS_LEN) < 0) 194 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: AUTS", data->auts, 264 data->ik, data->ck, data->auts); 298 data->res, &data->res_len, data->auts); 590 eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.c | 1479 * @auts: AUTS value from the peer 1491 const u8 *auts, const u8 *_rand) 1525 auts, EAP_AKA_AUTS_LEN); 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 1329 * @auts: 14-byte buffer for AUTS 1337 * synchronization failure, the received AUTS value will be written into auts 1343 unsigned char *ik, unsigned char *ck, unsigned char *auts) 1397 os_memcpy(auts, buf + 2, AKA_AUTS_LEN); 1398 wpa_hexdump(MSG_DEBUG, "SCARD: AUTS", auts, AKA_AUTS_LEN); 1340 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/wpa_supplicant/hidl/1.0/ |
H A D | sta_network.cpp | 621 const hidl_array<uint8_t, 14> &auts, 627 auts); 1582 const std::array<uint8_t, 14> &auts) 1585 uint32_t auts_hex_len = auts.size() * 2 + 1; 1588 auts_hex.data(), auts_hex.size(), auts.data(), auts.size()); 1600 MSG_DEBUG, "network sim umts auts response param", 620 sendNetworkEapSimUmtsAutsResponse( const hidl_array<uint8_t, 14> &auts, sendNetworkEapSimUmtsAutsResponse_cb _hidl_cb) argument 1581 sendNetworkEapSimUmtsAutsResponseInternal( const std::array<uint8_t, 14> &auts) argument
|